Free FC0-U61 Exam Braindumps (page: 48)

Page 47 of 131

Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing?

  1. Implement the solution.
  2. Identify the problem.
  3. Verify system functionality.
  4. Establish a theory of the cause.

Answer(s): B



A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis?

  1. Loss of revenue in case of a breach
  2. Difficulty of integration
  3. Training involved for IT staff and users
  4. Amount of equipment that will be replaced

Answer(s): A



A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.)

  1. Logs
  2. Password
  3. Receipt
  4. Encryption
  5. Database
  6. Software token

Answer(s): B,F



A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST describes the fact that the operation is only performed if the input is correct?

  1. Looping
  2. Branching
  3. Reuse
  4. Modeling

Answer(s): B






Post your Comments and Discuss CompTIA FC0-U61 exam with other Community members:

FC0-U61 Discussions & Posts