FC0-U61 CompTIA Exam Questions

FriendlyBamboo avatar
FriendlyBamboo
·
·
Download

Start Quiz

Study Flashcards

128 Questions

A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two)

VGA

A programmer uses DML to modify:

data

A technician is concerned about sensitive data transmitted over the Internet being intercepted during a MITM attack. What should the technician enable to reduce the risk?

TLS

Given the pseudocode provided, what is the output of the code?

10

A developer needs to add a table to a database. Which of the following database activities should the user perform?

CREATE

Which of the following is primarily a confidentiality concern?

Eavesdropping

A software developer wants to protect a document with step-by-step instructions on how to use software. What should the developer use to BEST protect the document?

Copyright

Which of the following database concepts would MOST likely use a CSV file?

Data importing

A help desk technician wants to find out if a colleague has encountered the same issue before. What should the technician do FIRST?

Check Knowledge Base

Which of the following BEST describes the practice of providing user credentials when logging onto the network?

Input

Which of the following allows wireless devices to communicate to a wired network?

Access point

Which of the following computing devices provides a centralized means to distribute services on a LAN?

Server

What describes something in a database that refers to the unique identifier in the parent table?

Foreign key

For which of the following is a relational database management system MOST commonly used?

Storing information

Which of the following BEST describes an application running on a typical operating system?

Process

What action would BEST improve the signal strength of a weak wireless access point broadcast signal?

Ensure sources of EMI are removed

A user is getting an error message when trying to access a website. What troubleshooting step is the technician using by browsing to the same site?

Duplicate the problem

A user is attempting to print to a wireless printer but encounters an error. What should the user do to correct the issue?

Ensure both devices are connected to the LAN

What relational database construct is used to ensure valid values are entered for a column?

Constraint

What should be set up to ensure data on a laptop cannot be accessed by unauthorized parties, even if the laptop is stolen?

Encryption

Which of the following is an example of a program that directly manages hardware for storage, networking, and virtual machines?

A Type 1 hypervisor

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Document the solution and cause

Which of the following is a value that uniquely identifies a database record?

Primary key

A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?

SELECT

Which of the following statements BEST describes binary?

A notational system used to represent an 'on' or 'off' state

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe MOST likely use to accomplish this?

Variable

An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?

Document the findings

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

Authentication

Which of the following is an advantage of installing an application to the cloud?

Data is not stored locally

A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?

A security method of allowing connections

A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?

If

A UPS provides protection against:

Power outages

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Optical drive

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?

Establish a plan of action

Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output?

Waffles

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

Driver

Which of the following BEST describes a kilobyte?

A kilobyte is a measurement of storage (e.g., 100KB)

Which of the following security concerns is a threat to confidentiality?

Replay attack

Ann, the president of a company, needs Internet connectivity for her home in a remote location with no existing infrastructure. Which Internet service type should she MOST likely use?

Satellite

Which of the following is MOST likely used to represent international text data?

Unicode

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

prioritization

Which of the following operating systems do not require extensions on files to execute a program? (Choose two)

Linux

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

802.11b

Which of the following is an example of multifactor authentication?

Smart card and PIN

Which of the following language types would a web developer MOST likely use to create a website?

Interpreted

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Algorithm

A startup company has created a logo and wants to ensure no other entity can use it. Which of the following should the company use to BEST protect the logo? (Choose two)

Copyright

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Full disk encryption

In which of the following situations should there be some expectation of privacy?

Submitting personal information on a school enrollment site

Which of the following data types should a developer use when creating a variable to hold a postal code?

String

Which of the following is the closest to machine language?

Assembly languages

A function is BEST used for enabling programs to:

be divided into reusable components

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

1.22Gbps

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

172.16.2.189

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

Server

A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?

Database

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

Open source software

A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe. What does the x86 part likely indicate?

32-bit architecture

Which of the following are the basic computing operations?

Input, process, output, and storage

Which of the following would work BEST stored as a flat file rather than stored in a database?

Contact list

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Data definition

An employee uses spreadsheet software and connects to a remote database to pull data for a report. Which type of application architecture did the employee use?

Client-server application

Ann, a user, is experiencing difficulty getting her IP-based security camera to function after a power interruption. What is the MOST likely problem?

Ann's Internet connection and wireless router are still down.

A programmer needs to store output in a place that can be accessed quickly. The data does not need to remain persistent. What is the BEST option for storing the data?

Flat file

Which intellectual property concept BEST represents a legally protected slogan of a business?

Trademark

What is a wireless communication that requires devices to be within 6 inches of each other to transfer information?

NFC

The IT department has established a new password policy. Which practices are being employed? (Choose two.)

Password complexity

Which method would MOST likely prevent malware sent via email from infecting a computer?

Patching

A user wants to use a laptop outside the house and remain connected to the Internet. What would be the BEST choice to accomplish this task?

WLAN card

If Joe's password for a social media site is compromised, what is Joe MOST likely performing when believing his email and banking accounts may also be compromised?

Password reuse

A technician is securing a new wireless network. What protocol would be the MOST secure to prevent unauthorized access?

WPA2

Which network protocols would MOST likely be used when sending and receiving Internet email? (Choose two.)

SMTP

A database administrator finds that a table is not needed in a relational database. What command is used to completely remove the table and its data?

DROP

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?

Wireless router

The computer language that is closest to machine code is:

Assembly language

Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?

Record

Which of the following is an example of an interpreted language?

Python

An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?

Proxy settings

Which of the following filesystems would a Linux computer MOST likely use?

ext4

Which of the following concerns does installing cross-platform software address?

Compatibility

Which of the following requires the MOST frequent updating to remain effective?

Antivirus

Which of the following BEST explains the use of float over integer to store monetary values?

It supports decimals

An IP address is 32 bits long. If converted to bytes, it would be:

4 bytes

Which of the following BEST describes the purpose of a vector in programming?

Storing a collection of data

Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?

Open

Which of the following statements BEST represents what 'x86.exe' means in the installation process?

x86 only supports an installation on a 32-bit CPU architecture.

Which of the following would be used to send messages using the SMTP protocol?

Email software

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?

Managed relational database

A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?

One-tier

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

Configure prompting before downloading content.

A global variable called 'age' will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?

Integer

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Customer date of birth

Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?

Data capture and collections

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Database software

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

Configure the browser proxy settings.

A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?

Intranet application

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)

Mouse

Which of the following would be considered the BEST method of securely distributing medical records?

Encrypted flash drive

Which of the following should have the HIGHEST expectation of privacy?

A locally stored word processing document

A company wants its employees to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?

POP3

Which of the following storage devices have a spinning disk? (Choose two)

HDD

Which of the following computer components allows for communication over a computer network?

NIC

A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?

Satellite

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Role-based access control

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Processing

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?

Concurrent license

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

Proxy server

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?

Private

A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?

IMPORT

Which of the following would a company consider an asset?

Information residing on backup tapes

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Written policy

Given the input (userin) of analyst, to which of the following would the clearance variable be set?

restricted

Which of the following is a reason why complex passwords are required?

To prevent someone from guessing them

A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?

Duplicate the problem

Which of the following storage types is MOST vulnerable to magnetic damage?

HDD

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?

Attribute

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?

The router is operating on a different channel.

Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

15

Which of the following are the primary functions of an operating system? (Choose two.)

Provide system resources.

SQL databases use primary and foreign keys to enable which of the following?

Relationships

Which of the following is a logical structure for storing files?

Folder

Which of the following is both an input and output device?

Microphone

A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?

Document lessons learned.

A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?

Password expiration

A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?

Failover

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?

Checking certificate validity

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Host Firewall

Which of the following contains exactly four copper wires?

RJ11

Study Notes

Computer Systems and Security

  • Confidentiality is primarily a concern of eavesdropping.
  • A software developer can use a copyright to protect a document with step-by-step instructions on how to use the software.
  • A CSV file is most likely used for data importing.

Help Desk and Troubleshooting

  • When encountering an issue, a help desk technician should first check the Knowledge Base.
  • A technician can use duplication to troubleshoot an issue by browsing to the same site as the user to see if the issue can be replicated.

Networking and Communication

  • A wireless access point allows wireless devices to communicate with a wired network.
  • An access point can improve the signal strength by removing sources of EMI.
  • A server provides a centralized means of distributing services to a group of clients on a LAN.

Database Systems

  • A relational database management system is commonly used for storing information.
  • A foreign key in a database refers to the unique identifier in the parent table.
  • Constraints are used in relational databases to ensure valid values are entered for a column.

Operating Systems and Programming

  • An application running on a typical operating system is described as a process.
  • Java is a compiled language.
  • A variable is used to store a number that changes over the duration of a program's run.

Security and Data Protection

  • Encryption should be set up to ensure data cannot be accessed by anyone, even if the laptop is stolen.
  • Non-repudiation is an example of a regulation requiring new applicants to provide a scan of their retinas.

Cloud Computing

  • An advantage of installing an application to the cloud is that data is not stored locally.

IT and Computing Concepts

  • A UPS provides protection against power outages.
  • If-else statements are used in programming to choose between different options based on an input.### Troubleshooting
  • When troubleshooting a problem, after confirming a theory, the next step is to implement the solution.
  • A technician should document lessons learned after implementing a solution.

Programming and Coding

  • The pseudocode "If the Breakfast program ran on Sunday" would output "Waffles".
  • A kilobyte is a measurement of storage (e.g., 100KB).
  • Open source software allows developers to modify the original code and release their own version of the application.
  • The basic computing operations are Input, Process, Output, and Storage.

Security

  • A replay attack is a threat to confidentiality.
  • Implementing a password policy that includes password complexity, password history, and password expiration can improve security.
  • Patching can prevent malware sent as compromised files via email from infecting a person's computer.
  • WPA2 is the most secure protocol for wireless networks.

Networking

  • WLAN (Wireless Local Area Network) is the best choice for connecting to the Internet while outdoors.
  • SMTP (Simple Mail Transfer Protocol) and POP3 (Post Office Protocol version 3) are protocols used for sending and receiving internet email.
  • Satellite Internet is the most suitable option for remote locations with no existing infrastructure.

Hardware and Software

  • A USB cable is needed to connect a printer to a workstation.
  • A driver is required for a workstation to recognize a printer.
  • DVI (Digital Visual Interface) is used to connect a display to a workstation.
  • Unicode is used to represent international text data.

Database and Storage

  • A flat file is the best option for storing output that does not need to remain persistent.
  • A relational database is suitable for storing data that needs to be accessed quickly.
  • The command "DROP" is used to completely remove a table and its data from a relational database.

IT and Ethics

  • A technician granting permission for a user to access data in a database is an example of data definition.
  • Client-server architecture is used when a user connects to a remote database to pull data for a report.
  • Password reuse can compromise email and banking accounts if a password is compromised.### Computer Systems and Programming
  • A developer creates step-by-step instructions/procedures and conditional statements for a computer program to solve problems, which is known as developing an algorithm.
  • A company can protect its logo by registering it as a trademark to prevent others from using it for any purpose.

Data and Security

  • Full disk encryption is the best way to keep data on a laptop safe if the laptop is lost or stolen.
  • A string data type is best used when creating a variable to hold a postal code.
  • Assembly language is closest to machine language.

Networking and Internet

  • A valid IP address is 172.16.2.189.
  • A database is the best place to store data that needs to be analyzed, such as sales, inventory, marketing, and compensation data.
  • SMTP protocol is used to send messages using email software.
  • Configuring prompting before downloading content can help prevent malware infections caused by Internet browsing.

Information and Data Management

  • A company should handle customer data of birth in a sensitive manner.
  • Database software is the best application to use when multiple people need to edit a list at the same time.

Hardware and Software

  • A workstation is the best device for a game developer who needs high-end specifications that can be upgraded.
  • x86.exe installation file is specific to 32-bit CPU architecture.
  • Email software is used to send messages using the SMTP protocol.

Security and Privacy

  • Trademark is used to protect a company's logo from being used by others.
  • Encrypting data is the best method of securely distributing medical records.
  • A user has a high expectation of privacy when storing a locally stored word processing document.
  • Role-based access control is used to assign permissions and authorize a user based on job title or function.
  • A concurrent license allows a certain number of users to use the software at any point in time.

Computer Components and Peripherals

  • A NIC (Network Interface Card) is a computer component that allows for communication over a computer network.
  • A satellite connection is the best option for Internet service in a remote location.
  • A GPU (Graphics Processing Unit) performs processing on a graphics card.

Software and Licensing

  • A concurrent license allows a certain number of users to use the software at any point in time.
  • A company can assign permissions and authorize a user based on job title or function using role-based access control.

Data Storage and Management

  • A corrupted cache is the most likely cause of a website displaying outdated information.
  • IMPORT is the action used to populate a database with large amounts of data from an external source.

Business and Ethics

  • A company should handle customer data of birth in a sensitive manner.
  • A written policy is the best way to document a change in a company's policy, such as allowing staff to work from home.

Practice quiz for CompTIA FC0-U61 certification exam, covering various topics in IT and computer systems.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free
Use Quizgecko on...
Browser
Browser