FC0-U61 CompTIA Exam Questions
128 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two)

  • VGA (correct)
  • RJ45
  • HDMI
  • USB (correct)
  • Bluetooth
  • FireWire
  • A programmer uses DML to modify:

  • data (correct)
  • permissions
  • les
  • backups
  • A technician is concerned about sensitive data transmitted over the Internet being intercepted during a MITM attack. What should the technician enable to reduce the risk?

  • TLS (correct)
  • DLP
  • ACL
  • IPS
  • Given the pseudocode provided, what is the output of the code?

    <p>10</p> Signup and view all the answers

    A developer needs to add a table to a database. Which of the following database activities should the user perform?

    <p>CREATE</p> Signup and view all the answers

    Which of the following is primarily a confidentiality concern?

    <p>Eavesdropping</p> Signup and view all the answers

    A software developer wants to protect a document with step-by-step instructions on how to use software. What should the developer use to BEST protect the document?

    <p>Copyright</p> Signup and view all the answers

    Which of the following database concepts would MOST likely use a CSV file?

    <p>Data importing</p> Signup and view all the answers

    A help desk technician wants to find out if a colleague has encountered the same issue before. What should the technician do FIRST?

    <p>Check Knowledge Base</p> Signup and view all the answers

    Which of the following BEST describes the practice of providing user credentials when logging onto the network?

    <p>Input</p> Signup and view all the answers

    Which of the following allows wireless devices to communicate to a wired network?

    <p>Access point</p> Signup and view all the answers

    Which of the following computing devices provides a centralized means to distribute services on a LAN?

    <p>Server</p> Signup and view all the answers

    What describes something in a database that refers to the unique identifier in the parent table?

    <p>Foreign key</p> Signup and view all the answers

    For which of the following is a relational database management system MOST commonly used?

    <p>Storing information</p> Signup and view all the answers

    Which of the following BEST describes an application running on a typical operating system?

    <p>Process</p> Signup and view all the answers

    What action would BEST improve the signal strength of a weak wireless access point broadcast signal?

    <p>Ensure sources of EMI are removed</p> Signup and view all the answers

    A user is getting an error message when trying to access a website. What troubleshooting step is the technician using by browsing to the same site?

    <p>Duplicate the problem</p> Signup and view all the answers

    A user is attempting to print to a wireless printer but encounters an error. What should the user do to correct the issue?

    <p>Ensure both devices are connected to the LAN</p> Signup and view all the answers

    What relational database construct is used to ensure valid values are entered for a column?

    <p>Constraint</p> Signup and view all the answers

    What should be set up to ensure data on a laptop cannot be accessed by unauthorized parties, even if the laptop is stolen?

    <p>Encryption</p> Signup and view all the answers

    Which of the following is an example of a program that directly manages hardware for storage, networking, and virtual machines?

    <p>A Type 1 hypervisor</p> Signup and view all the answers

    Which of the following actions is the FINAL step in the standard troubleshooting methodology?

    <p>Document the solution and cause</p> Signup and view all the answers

    Which of the following is a value that uniquely identifies a database record?

    <p>Primary key</p> Signup and view all the answers

    A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?

    <p>SELECT</p> Signup and view all the answers

    Which of the following statements BEST describes binary?

    <p>A notational system used to represent an 'on' or 'off' state</p> Signup and view all the answers

    Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe MOST likely use to accomplish this?

    <p>Variable</p> Signup and view all the answers

    An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?

    <p>Document the findings</p> Signup and view all the answers

    A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

    <p>Authentication</p> Signup and view all the answers

    Which of the following is an advantage of installing an application to the cloud?

    <p>Data is not stored locally</p> Signup and view all the answers

    A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?

    <p>A security method of allowing connections</p> Signup and view all the answers

    A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?

    <p>If</p> Signup and view all the answers

    A UPS provides protection against:

    <p>Power outages</p> Signup and view all the answers

    A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

    <p>Optical drive</p> Signup and view all the answers

    A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?

    <p>Establish a plan of action</p> Signup and view all the answers

    Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output?

    <p>Waffles</p> Signup and view all the answers

    A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

    <p>Driver</p> Signup and view all the answers

    Which of the following BEST describes a kilobyte?

    <p>A kilobyte is a measurement of storage (e.g., 100KB)</p> Signup and view all the answers

    Which of the following security concerns is a threat to confidentiality?

    <p>Replay attack</p> Signup and view all the answers

    Ann, the president of a company, needs Internet connectivity for her home in a remote location with no existing infrastructure. Which Internet service type should she MOST likely use?

    <p>Satellite</p> Signup and view all the answers

    Which of the following is MOST likely used to represent international text data?

    <p>Unicode</p> Signup and view all the answers

    For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

    <p>prioritization</p> Signup and view all the answers

    Which of the following operating systems do not require extensions on files to execute a program? (Choose two)

    <p>Linux</p> Signup and view all the answers

    A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

    <p>802.11b</p> Signup and view all the answers

    Which of the following is an example of multifactor authentication?

    <p>Smart card and PIN</p> Signup and view all the answers

    Which of the following language types would a web developer MOST likely use to create a website?

    <p>Interpreted</p> Signup and view all the answers

    A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

    <p>Algorithm</p> Signup and view all the answers

    A startup company has created a logo and wants to ensure no other entity can use it. Which of the following should the company use to BEST protect the logo? (Choose two)

    <p>Copyright</p> Signup and view all the answers

    Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

    <p>Full disk encryption</p> Signup and view all the answers

    In which of the following situations should there be some expectation of privacy?

    <p>Submitting personal information on a school enrollment site</p> Signup and view all the answers

    Which of the following data types should a developer use when creating a variable to hold a postal code?

    <p>String</p> Signup and view all the answers

    Which of the following is the closest to machine language?

    <p>Assembly languages</p> Signup and view all the answers

    A function is BEST used for enabling programs to:

    <p>be divided into reusable components</p> Signup and view all the answers

    When transferring a file across the network, which of the following would be the FASTEST transfer rate?

    <p>1.22Gbps</p> Signup and view all the answers

    A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

    <p>172.16.2.189</p> Signup and view all the answers

    A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

    <p>Server</p> Signup and view all the answers

    A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?

    <p>Database</p> Signup and view all the answers

    Which of the following software license models allows a developer to modify the original code and release its own version of the application?

    <p>Open source software</p> Signup and view all the answers

    A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe. What does the x86 part likely indicate?

    <p>32-bit architecture</p> Signup and view all the answers

    Which of the following are the basic computing operations?

    <p>Input, process, output, and storage</p> Signup and view all the answers

    Which of the following would work BEST stored as a flat file rather than stored in a database?

    <p>Contact list</p> Signup and view all the answers

    An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

    <p>Data definition</p> Signup and view all the answers

    An employee uses spreadsheet software and connects to a remote database to pull data for a report. Which type of application architecture did the employee use?

    <p>Client-server application</p> Signup and view all the answers

    Ann, a user, is experiencing difficulty getting her IP-based security camera to function after a power interruption. What is the MOST likely problem?

    <p>Ann's Internet connection and wireless router are still down.</p> Signup and view all the answers

    A programmer needs to store output in a place that can be accessed quickly. The data does not need to remain persistent. What is the BEST option for storing the data?

    <p>Flat file</p> Signup and view all the answers

    Which intellectual property concept BEST represents a legally protected slogan of a business?

    <p>Trademark</p> Signup and view all the answers

    What is a wireless communication that requires devices to be within 6 inches of each other to transfer information?

    <p>NFC</p> Signup and view all the answers

    The IT department has established a new password policy. Which practices are being employed? (Choose two.)

    <p>Password complexity</p> Signup and view all the answers

    Which method would MOST likely prevent malware sent via email from infecting a computer?

    <p>Patching</p> Signup and view all the answers

    A user wants to use a laptop outside the house and remain connected to the Internet. What would be the BEST choice to accomplish this task?

    <p>WLAN card</p> Signup and view all the answers

    If Joe's password for a social media site is compromised, what is Joe MOST likely performing when believing his email and banking accounts may also be compromised?

    <p>Password reuse</p> Signup and view all the answers

    A technician is securing a new wireless network. What protocol would be the MOST secure to prevent unauthorized access?

    <p>WPA2</p> Signup and view all the answers

    Which network protocols would MOST likely be used when sending and receiving Internet email? (Choose two.)

    <p>SMTP</p> Signup and view all the answers

    A database administrator finds that a table is not needed in a relational database. What command is used to completely remove the table and its data?

    <p>DROP</p> Signup and view all the answers

    A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?

    <p>Wireless router</p> Signup and view all the answers

    The computer language that is closest to machine code is:

    <p>Assembly language</p> Signup and view all the answers

    Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?

    <p>Record</p> Signup and view all the answers

    Which of the following is an example of an interpreted language?

    <p>Python</p> Signup and view all the answers

    An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?

    <p>Proxy settings</p> Signup and view all the answers

    Which of the following filesystems would a Linux computer MOST likely use?

    <p>ext4</p> Signup and view all the answers

    Which of the following concerns does installing cross-platform software address?

    <p>Compatibility</p> Signup and view all the answers

    Which of the following requires the MOST frequent updating to remain effective?

    <p>Antivirus</p> Signup and view all the answers

    Which of the following BEST explains the use of float over integer to store monetary values?

    <p>It supports decimals</p> Signup and view all the answers

    An IP address is 32 bits long. If converted to bytes, it would be:

    <p>4 bytes</p> Signup and view all the answers

    Which of the following BEST describes the purpose of a vector in programming?

    <p>Storing a collection of data</p> Signup and view all the answers

    Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?

    <p>Open</p> Signup and view all the answers

    Which of the following statements BEST represents what 'x86.exe' means in the installation process?

    <p>x86 only supports an installation on a 32-bit CPU architecture.</p> Signup and view all the answers

    Which of the following would be used to send messages using the SMTP protocol?

    <p>Email software</p> Signup and view all the answers

    Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?

    <p>Managed relational database</p> Signup and view all the answers

    A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?

    <p>One-tier</p> Signup and view all the answers

    Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

    <p>Configure prompting before downloading content.</p> Signup and view all the answers

    A global variable called 'age' will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?

    <p>Integer</p> Signup and view all the answers

    Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

    <p>Customer date of birth</p> Signup and view all the answers

    Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?

    <p>Data capture and collections</p> Signup and view all the answers

    The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

    <p>Database software</p> Signup and view all the answers

    Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

    <p>Configure the browser proxy settings.</p> Signup and view all the answers

    A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?

    <p>Intranet application</p> Signup and view all the answers

    A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)

    <p>Mouse</p> Signup and view all the answers

    Which of the following would be considered the BEST method of securely distributing medical records?

    <p>Encrypted flash drive</p> Signup and view all the answers

    Which of the following should have the HIGHEST expectation of privacy?

    <p>A locally stored word processing document</p> Signup and view all the answers

    A company wants its employees to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?

    <p>POP3</p> Signup and view all the answers

    Which of the following storage devices have a spinning disk? (Choose two)

    <p>HDD</p> Signup and view all the answers

    Which of the following computer components allows for communication over a computer network?

    <p>NIC</p> Signup and view all the answers

    A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?

    <p>Satellite</p> Signup and view all the answers

    Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

    <p>Role-based access control</p> Signup and view all the answers

    A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

    <p>Processing</p> Signup and view all the answers

    A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?

    <p>Concurrent license</p> Signup and view all the answers

    A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

    <p>Proxy server</p> Signup and view all the answers

    Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?

    <p>Private</p> Signup and view all the answers

    A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?

    <p>IMPORT</p> Signup and view all the answers

    Which of the following would a company consider an asset?

    <p>Information residing on backup tapes</p> Signup and view all the answers

    A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

    <p>Written policy</p> Signup and view all the answers

    Given the input (userin) of analyst, to which of the following would the clearance variable be set?

    <p>restricted</p> Signup and view all the answers

    Which of the following is a reason why complex passwords are required?

    <p>To prevent someone from guessing them</p> Signup and view all the answers

    A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?

    <p>Duplicate the problem</p> Signup and view all the answers

    Which of the following storage types is MOST vulnerable to magnetic damage?

    <p>HDD</p> Signup and view all the answers

    When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?

    <p>Attribute</p> Signup and view all the answers

    Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?

    <p>The router is operating on a different channel.</p> Signup and view all the answers

    Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

    <p>15</p> Signup and view all the answers

    Which of the following are the primary functions of an operating system? (Choose two.)

    <p>Provide system resources.</p> Signup and view all the answers

    SQL databases use primary and foreign keys to enable which of the following?

    <p>Relationships</p> Signup and view all the answers

    Which of the following is a logical structure for storing files?

    <p>Folder</p> Signup and view all the answers

    Which of the following is both an input and output device?

    <p>Microphone</p> Signup and view all the answers

    A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?

    <p>Document lessons learned.</p> Signup and view all the answers

    A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?

    <p>Password expiration</p> Signup and view all the answers

    A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?

    <p>Failover</p> Signup and view all the answers

    A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?

    <p>Checking certificate validity</p> Signup and view all the answers

    A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

    <p>Host Firewall</p> Signup and view all the answers

    Which of the following contains exactly four copper wires?

    <p>RJ11</p> Signup and view all the answers

    Study Notes

    Computer Systems and Security

    • Confidentiality is primarily a concern of eavesdropping.
    • A software developer can use a copyright to protect a document with step-by-step instructions on how to use the software.
    • A CSV file is most likely used for data importing.

    Help Desk and Troubleshooting

    • When encountering an issue, a help desk technician should first check the Knowledge Base.
    • A technician can use duplication to troubleshoot an issue by browsing to the same site as the user to see if the issue can be replicated.

    Networking and Communication

    • A wireless access point allows wireless devices to communicate with a wired network.
    • An access point can improve the signal strength by removing sources of EMI.
    • A server provides a centralized means of distributing services to a group of clients on a LAN.

    Database Systems

    • A relational database management system is commonly used for storing information.
    • A foreign key in a database refers to the unique identifier in the parent table.
    • Constraints are used in relational databases to ensure valid values are entered for a column.

    Operating Systems and Programming

    • An application running on a typical operating system is described as a process.
    • Java is a compiled language.
    • A variable is used to store a number that changes over the duration of a program's run.

    Security and Data Protection

    • Encryption should be set up to ensure data cannot be accessed by anyone, even if the laptop is stolen.
    • Non-repudiation is an example of a regulation requiring new applicants to provide a scan of their retinas.

    Cloud Computing

    • An advantage of installing an application to the cloud is that data is not stored locally.

    IT and Computing Concepts

    • A UPS provides protection against power outages.
    • If-else statements are used in programming to choose between different options based on an input.### Troubleshooting
    • When troubleshooting a problem, after confirming a theory, the next step is to implement the solution.
    • A technician should document lessons learned after implementing a solution.

    Programming and Coding

    • The pseudocode "If the Breakfast program ran on Sunday" would output "Waffles".
    • A kilobyte is a measurement of storage (e.g., 100KB).
    • Open source software allows developers to modify the original code and release their own version of the application.
    • The basic computing operations are Input, Process, Output, and Storage.

    Security

    • A replay attack is a threat to confidentiality.
    • Implementing a password policy that includes password complexity, password history, and password expiration can improve security.
    • Patching can prevent malware sent as compromised files via email from infecting a person's computer.
    • WPA2 is the most secure protocol for wireless networks.

    Networking

    • WLAN (Wireless Local Area Network) is the best choice for connecting to the Internet while outdoors.
    • SMTP (Simple Mail Transfer Protocol) and POP3 (Post Office Protocol version 3) are protocols used for sending and receiving internet email.
    • Satellite Internet is the most suitable option for remote locations with no existing infrastructure.

    Hardware and Software

    • A USB cable is needed to connect a printer to a workstation.
    • A driver is required for a workstation to recognize a printer.
    • DVI (Digital Visual Interface) is used to connect a display to a workstation.
    • Unicode is used to represent international text data.

    Database and Storage

    • A flat file is the best option for storing output that does not need to remain persistent.
    • A relational database is suitable for storing data that needs to be accessed quickly.
    • The command "DROP" is used to completely remove a table and its data from a relational database.

    IT and Ethics

    • A technician granting permission for a user to access data in a database is an example of data definition.
    • Client-server architecture is used when a user connects to a remote database to pull data for a report.
    • Password reuse can compromise email and banking accounts if a password is compromised.### Computer Systems and Programming
    • A developer creates step-by-step instructions/procedures and conditional statements for a computer program to solve problems, which is known as developing an algorithm.
    • A company can protect its logo by registering it as a trademark to prevent others from using it for any purpose.

    Data and Security

    • Full disk encryption is the best way to keep data on a laptop safe if the laptop is lost or stolen.
    • A string data type is best used when creating a variable to hold a postal code.
    • Assembly language is closest to machine language.

    Networking and Internet

    • A valid IP address is 172.16.2.189.
    • A database is the best place to store data that needs to be analyzed, such as sales, inventory, marketing, and compensation data.
    • SMTP protocol is used to send messages using email software.
    • Configuring prompting before downloading content can help prevent malware infections caused by Internet browsing.

    Information and Data Management

    • A company should handle customer data of birth in a sensitive manner.
    • Database software is the best application to use when multiple people need to edit a list at the same time.

    Hardware and Software

    • A workstation is the best device for a game developer who needs high-end specifications that can be upgraded.
    • x86.exe installation file is specific to 32-bit CPU architecture.
    • Email software is used to send messages using the SMTP protocol.

    Security and Privacy

    • Trademark is used to protect a company's logo from being used by others.
    • Encrypting data is the best method of securely distributing medical records.
    • A user has a high expectation of privacy when storing a locally stored word processing document.
    • Role-based access control is used to assign permissions and authorize a user based on job title or function.
    • A concurrent license allows a certain number of users to use the software at any point in time.

    Computer Components and Peripherals

    • A NIC (Network Interface Card) is a computer component that allows for communication over a computer network.
    • A satellite connection is the best option for Internet service in a remote location.
    • A GPU (Graphics Processing Unit) performs processing on a graphics card.

    Software and Licensing

    • A concurrent license allows a certain number of users to use the software at any point in time.
    • A company can assign permissions and authorize a user based on job title or function using role-based access control.

    Data Storage and Management

    • A corrupted cache is the most likely cause of a website displaying outdated information.
    • IMPORT is the action used to populate a database with large amounts of data from an external source.

    Business and Ethics

    • A company should handle customer data of birth in a sensitive manner.
    • A written policy is the best way to document a change in a company's policy, such as allowing staff to work from home.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Practice quiz for CompTIA FC0-U61 certification exam, covering various topics in IT and computer systems.

    More Like This

    CompTIA Troubleshooting Steps
    7 questions
    TestOut CompTIA A+ Flashcards
    95 questions
    CompTIA A+ Certification Flashcards
    26 questions
    Use Quizgecko on...
    Browser
    Browser