Full Transcript

CERTIFICATIONS We provide the latest IT certification practice exams in a variety of formats and for all types of IT professionals. Our commitment to get you certified in the shortest and easiest way is evident in the quality of our products. Our state-of-the-art Test Engine Software simulates the...

CERTIFICATIONS We provide the latest IT certification practice exams in a variety of formats and for all types of IT professionals. Our commitment to get you certified in the shortest and easiest way is evident in the quality of our products. Our state-of-the-art Test Engine Software simulates the real exam environment and are available for: Windows (.EXE), Android App (.APK) and eReader (eBook) formats. These questions and answers will help you pass your certification exam on your first try or we refund your MONEY in full. Xcerts Certifications [email protected] | http://Xcerts.com FC0-U61 CompTIA IT Fundamentals+ Certification Exam FC0-U61 QUESTION: 1 Which of the following is primarily a confidentiality concern? A. Eavesdropping B. Impersonating C. Destructing D. Altering Answer(s): A QUESTION: 2 A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document? A. Patent B. Trademark C. Watermark D. Copyright Answer(s): D QUESTION: 3 Which of the following database concepts would MOST likely use a CSV file? A. Data querying B. Data reports C. Data importing D. Data persistence Answer(s): B QUESTION: 4 A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST? A. Check Knowledge Base. B. Search local logs. C. Research possible theories. D. Question users. Answer(s): A https://Xcerts.com 2 FC0-U61 QUESTION: 5 Which of the following BEST describes the practice of providing user credentials when logging onto the network? A. Output B. Storage C. Input D. Processing Answer(s): C QUESTION: 6 Which of the following allows wireless devices to communicate to a wired network? A. Modem B. Switch C. Firewall D. Access point Answer(s): D QUESTION: 7 Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN? A. Laptop B. Workstation C. Mobile phone D. Server Answer(s): D QUESTION: 8 Which of the following describes something in a database that refers to the unique identifier in the parent table? A. Attribute B. Constraint C. Foreign key D. Schema Answer(s): A QUESTION: 9 https://Xcerts.com 3 FC0-U61 For which of the following is a relational database management system MOST commonly used? A. Building flowcharts B. Storing information C. Generating reports D. Creating diagrams Answer(s): B QUESTION: 10 Which of the following BEST describes an application running on a typical operating system? A. Process B. Thread C. Function D. Task Answer(s): A QUESTION: 11 The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? A. Update from 802.11b to 802.11g. B. Ensure sources of EMI are removed. C. Enable WPA2-Enterprise. D. Use WiFi Protected Setup. Answer(s): B QUESTION: 12 A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site? A. Establish a plan of action. B. Gather information C. Duplicate the problem. D. Find the root cause. Answer(s): C QUESTION: 13 https://Xcerts.com 4 FC0-U61 A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue? A. Ensure both devices are connected to the LAN. B. Enable task scheduling. C. Reset the proxy settings to their default values. D. Review the fault tolerance configurations. Answer(s): A QUESTION: 14 Which of the following relational database constructs is used to ensure valid values are entered for a column? A. Schema B. Permissions C. Constraint D. Column Answer(s): C QUESTION: 15 A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this? A. Encryption B. Compression C. Permissions D. Auditing Answer(s): A QUESTION: 16 A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: A. a storage area network. B. an embedded OS. C. network attached storage. D. a Type 1 hypervisor. Answer(s): D https://Xcerts.com 5 FC0-U61 QUESTION: 17 Which of the following is a compiled language? A. Perl B. JScript C. Java D. PowerShell Answer(s): C QUESTION: 18 Which of the following actions is the FINAL step in the standard troubleshooting methodology? A. Document the solution and cause. B. Create a new theory of cause. C. Research the problem online. D. Implement preventive measures. Answer(s): A QUESTION: 19 Which of the following is a value that uniquely identifies a database record? A. Foreign key B. Public key C. Primary key D. Private key Answer(s): C QUESTION: 20 A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use? A. SELECT B. INSERT C. DELETE D. UPDATE Answer(s): A QUESTION: 21 Which of the following statements BEST describes binary? https://Xcerts.com 6 FC0-U61 A. A notational system used to represent an “on” or “off” state B. A notational system used to represent media access control C. A notational system used to represent Internet protocol addressing D. A notational system used to represent a storage unit of measurement Answer(s): A QUESTION: 22 Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this? A. Loop B. Variable C. Constant D. Function Answer(s): B QUESTION: 23 An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step? A. Restart the computer. B. Contact other users. C. Disconnect the peripherals. D. Document the findings. Answer(s): D QUESTION: 24 A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of? A. Non-repudiation B. Authentication C. Integrity D. Accounting Answer(s): B https://Xcerts.com 7 FC0-U61 QUESTION: 25 Which of the following is an advantage of installing an application to the cloud? A. Data is not stored locally. B. Support is not required. C. Service is not required. D. Internet access is not required. Answer(s): A QUESTION: 26 A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely? A. The quality of the computer used to connect B. A security method of allowing connections C. The employees’ home ISP speeds D. The geographical location of the employees Answer(s): B QUESTION: 27 A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use? A. Variable B. If C. Datatype D. Comment Answer(s): B QUESTION: 28 A UPS provides protection against: A. denial of service B. replay attack. C. power outages. D. wiretapping. Answer(s): C QUESTION: 29 https://Xcerts.com 8 FC0-U61 A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task? A. Optical drive B. Hard disk drive C. Solid state drive D. Flash drive Answer(s): A QUESTION: 30 A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician’s NEXT step? A. Implement the solution. B. Document lessons learned. C. Establish a plan of action. D. Verify full system functionality. Answer(s): C QUESTION: 31 Given the following pseudocode: If the Breakfast program ran on Sunday, which of the following would be the output? A. Oatmeal B. Bacon and eggs C. Waffles D. Pancakes Answer(s): C https://Xcerts.com 9 FC0-U61 QUESTION: 32 A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function? A. Permission B. Ink cartridge C. USB cable D. Driver Answer(s): D QUESTION: 33 Which of the following BEST describes a kilobyte? A. A kilobyte is a measurement of storage (e.g., 100KB). B. A kilobyte is a measurement of throughput (e.g.,100Kbps). C. A kilobyte is a measurement of power (e.g., 100KW). D. A kilobyte is a measurement of processor speed (e.g., 2.4KHz). Answer(s): A QUESTION: 34 Which of the following security concerns is a threat to confidentiality? A. Replay attack B. Denial of service C. Service outage D. Dumpster diving Answer(s): A QUESTION: 35 Which of the following software license models allows a developer to modify the original code and release its own version of the application? A. Proprietary software B. Commercial software C. Open source software D. Cross-platform software Answer(s): C https://Xcerts.com 10 FC0-U61 QUESTION: 36 Which of the following are the basic computing operations? A. Input, process, output, and feedback B. Input, output, storage, and feedback C. Input, process, and output D. Input, process, output, and storage Answer(s): D QUESTION: 37 Which of the following would work BEST stored as a flat file rather than stored in a database? A. Contact list B. Movie theater locations C. Directions to doctor’s office D. Store inventory Answer(s): A QUESTION: 38 An administrator grants permission for a user to access data in a database. Which of the following actions was performed? A. Data correlation B. Data manipulation C. Data gathering D. Data definition Answer(s): D QUESTION: 39 An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? A. Standalone application B. Client-server application C. Web application D. Cloud application Answer(s): B QUESTION: 40 https://Xcerts.com 11 FC0-U61 Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem? A. The power interruption caused the camera to malfunction. B. Ann has a compatibility problem with the camera. C. A firmware update needs to be applied to the camera. D. Ann’s Internet connection and wireless router are still down. Answer(s): D QUESTION: 41 A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data? A. Flat file B. Memory C. Relational database D. Solid state drive Answer(s): A QUESTION: 42 Which of the following intellectual property concepts BEST represents a legally protected slogan of a business? A. Contract B. Patent C. Copyright D. Trademark Answer(s): D QUESTION: 43 Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information? A. Infrared B. NFC C. Bluetooth D. WiFi Answer(s): B https://Xcerts.com 12 FC0-U61 QUESTION: 44 The IT department has established a new password policy for employees. Specifically, the policy reads: • • • • Passwords must not contain common dictionary words Passwords must contain at least one special character. Passwords must be different from the las six passwords used. Passwords must use at least one capital letter or number. Which of the following practices are being employed? (Choose two.) A. Password lockout B. Password complexity C. Password expiration D. Passwords history E. Password length F. Password age Answer(s): B, D QUESTION: 45 Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer? A. Email previewing B. Patching C. Clear browsing cache D. Kill process Answer(s): B QUESTION: 46 A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task? A. Thunderbolt cable B. Bluetooth module C. Infrared port D. WLAN card Answer(s): D https://Xcerts.com 13 FC0-U61 QUESTION: 47 Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed? A. Password reuse B. Snooping C. Social engineering D. Phishing Answer(s): A QUESTION: 48 A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure? A. WPA B. SSID C. WEP D. WPA2 Answer(s): D QUESTION: 49 Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Choose two.) A. SMTP B. POP3 C. SNMP D. DHCP E. ICMP F. SFTP Answer(s): A, B QUESTION: 50 A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data? A. UPDATE B. DELETE https://Xcerts.com 14 FC0-U61 C. ALTER D. DROP Answer(s): D QUESTION: 51 A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation? A. USB B. NFC C. DSL D. DVI Answer(s): D QUESTION: 52 Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used? A. Fiber B. DSL C. Cable D. Satellite Answer(s): D QUESTION: 53 Which of the following is MOST likely used to represent international text data? A. ASCII B. Octal C. Hexadecimal D. Unicode Answer(s): D QUESTION: 54 For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of: A. redundancy. https://Xcerts.com 15 FC0-U61 B. replication. C. prioritization. D. fault tolerance. Answer(s): C QUESTION: 55 Which of the following operating systems do not require extensions on files to execute a program? (Choose two.) A. Windows 7 B. Windows 8 C. UNIX D. Windows Server 2012 E. Android F. Linux Answer(s): C, F QUESTION: 56 A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select? A. 802.11a B. 802.11b C. 802.11g D. 802.11n Answer(s): B QUESTION: 57 Which of the following is an example of multifactor authentication? A. Password and passphrase B. Fingerprint and retina scan C. Hardware token and smartphone D. Smart card and PIN Answer(s): D QUESTION: 58 https://Xcerts.com 16 FC0-U61 Which of the following language types would a web developer MOST likely use to create a website? A. Interpreted B. Query C. Compiled D. Assembly Answer(s): A QUESTION: 59 A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed? A. Algorithm B. Software C. Pseudocode D. Flowchart Answer(s): A QUESTION: 60 A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two.) A. Patent B. Copyright C. NDA D. Trademark E. EULA Answer(s): B, D QUESTION: 61 Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen? A. Host-based firewall B. Strong administrator password C. Anti-malware software D. Full disk encryption https://Xcerts.com 17 FC0-U61 Answer(s): D QUESTION: 62 In which of the following situations should there be come expectation of privacy? A. Posting a comment on a friend’s social media page B. Submitting personal information on a school enrollment site C. Posting a comment on a video sharing site D. Sending email and pictures to a close relative Answer(s): B QUESTION: 63 Which of the following data types should a developer use when creating a variable to hold a postal code? A. Integer B. String C. Float D. Boolean Answer(s): B QUESTION: 64 Which of the following is the closest to machine language? A. Scripted languages B. Compiled languages C. Query languages D. Assembly languages Answer(s): D QUESTION: 65 A function is BEST used for enabling programs to: A. hold a list of numbers. B. be divided into reusable components. C. define needed constant values. D. define variables to hold different values. Answer(s): D https://Xcerts.com 18 FC0-U61 QUESTION: 66 When transferring a file across the network, which of the following would be the FASTEST transfer rate? A. 1001Kbps B. 110Mbps C. 1.22Gbps D. 123Mbps Answer(s): C QUESTION: 67 A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign? A. 127.0.0.1 B. 172.16.2.189 C. 192.168.257.1 D. 255.255.255.0 Answer(s): B QUESTION: 68 A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy? A. Laptop B. Server C. Game console D. Workstation Answer(s): B QUESTION: 69 A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data? A. Flat file B. Word processor C. Database D. Network share Answer(s): C https://Xcerts.com 19 FC0-U61 QUESTION: 70 A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file? A. x86 only supports an installation on a 32-bit CPU architecture. B. x86 supports an installation on a 32-bit and a 64-bit CPU architecture. C. x86 only supports an installation on a 64-bit CPU architecture. D. x86 supports an installation on a 16-bit CPU architecture. Answer(s): A QUESTION: 71 Which of the following would be used to send messages using the SMTP protocol? A. Document sharing software B. Instant messaging software C. Conferencing software D. Email software Answer(s): D QUESTION: 72 Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing? A. Turn on private browsing B. Delete browsing history on program close. C. Notify when downloads are complete. D. Configure prompting before downloading content. Answer(s): D QUESTION: 73 Which of the following is an example of information a company would ask employees to handle in a sensitive manner? A. Customer date of birth B. The first and last name of the Chief Executive Officer (CEO) C. Customer service number D. Company social media screen name Answer(s): A https://Xcerts.com 20 FC0-U61 QUESTION: 74 The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list? A. Database software B. Word processing software C. Conferencing software D. Presentation software Answer(s): A QUESTION: 75 Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem? A. Renew the IP address. B. Configure the browser proxy settings. C. Clear the browser cache. D. Disable the pop-up blocker Answer(s): B QUESTION: 76 Which of the following would be considered the BEST method of securely distributing medical records? A. Encrypted flash drive B. Social networking sites C. Fax D. FTP file sharing Answer(s): A QUESTION: 77 Which of the following should have the HIGHEST expectation of privacy? A. A picture posted to a social media website B. A presentation saved to a corporate file server C. A locally stored word processing document D. A spreadsheet emailed to a business client https://Xcerts.com 21 FC0-U61 Answer(s): C QUESTION: 78 Which of the following storage devices have a spinning disk? (Choose two.) A. Optical drive B. SSD C. HDD D. Flash drive E. RAM F. ROM Answer(s): A, C QUESTION: 79 Which of the following computer components allows for communication over a computer network? A. RAM B. NIC C. CPU D. NAS Answer(s): B QUESTION: 80 A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service? A. Cellular B. Satellite C. Cable D. Fiber Answer(s): B QUESTION: 81 Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function? A. Rule-based access control B. Mandatory access control C. Role-based access control https://Xcerts.com 22 FC0-U61 D. Discretionary access control Answer(s): C QUESTION: 82 A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card? A. Input B. Output C. Storage D. Processing Answer(s): D QUESTION: 83 A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of? A. Group license B. Concurrent license C. Subscription license D. Open-source license Answer(s): B QUESTION: 84 A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause? A. Proxy server B. Browser add-on C. Corrupted cache D. Script blocker Answer(s): A QUESTION: 85 Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter? https://Xcerts.com 23 FC0-U61 A. Private B. Traditional C. Public D. Cloud Answer(s): A QUESTION: 86 A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated? A. EXPORT B. IMPORT C. SELECT D. ALTER Answer(s): B QUESTION: 87 Which of the following would a company consider an asset? A. An external company used to destroy defective hard drives B. Information residing on backup tapes C. A company-sponsored technology conference D. A certified third-party vendor that provides critical components Answer(s): B QUESTION: 88 A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change? A. Written procedure B. Written policy C. Written email D. Written memo Answer(s): B QUESTION: 89 A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.) https://Xcerts.com 24 FC0-U61 A. USB B. HDMI C. FireWire D. VGA E. Bluetooth F. RJ45 Answer(s): B, D QUESTION: 90 A programmer uses DML to modify: A. files B. permissions C. data D. backups Answer(s): C QUESTION: 91 A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk? A. DLP B. ACL C. TLS D. IPS Answer(s): C QUESTION: 92 Given the following pseudocode: Which of the following is the output of the code? https://Xcerts.com 25 FC0-U61 A. 1 B. 9 C. 10 D. 11 Answer(s): D QUESTION: 93 A developer needs to add a table to a database. Which of the following database activities should the user perform? A. UPDATE B. ALTER C. CREATE D. REPORT Answer(s): C QUESTION: 94 Which of the following does a NoSQL database use to organize data? A. Primary keys B. Schemas C. Keys/values D. Tables Answer(s): C QUESTION: 95 A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain? A. File backup B. Data restoration C. Fault tolerance D. Restoring access Answer(s): C QUESTION: 96 https://Xcerts.com 26 FC0-U61 A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task? A. Text editing software B. Visual diagramming software C. Spreadsheet software D. Web browsing software Answer(s): C QUESTION: 97 Which of the following BEST describes the physical location of the data in the database? A. Table B. Column C. RAM D. HDD Answer(s): A QUESTION: 98 A user logs into a laptop using a username and complex password. This is an example of: A. biometrics B. multifactor authentication C. least privilege D. single-factor authentication Answer(s): D QUESTION: 99 To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed? A. Question the obvious. B. Divide and conquer. C. Duplicate the problem D. Research the knowledge base. Answer(s): B QUESTION: 100 https://Xcerts.com 27 FC0-U61 A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user’s needs? A. T1 line B. Satellite C. Fiber optic D. DSL Answer(s): C QUESTION: 101 Which of the following types of encryption would BEST protect a laptop computer in the event of theft? A. Disk B. Email C. VPN D. HTTPS Answer(s): A QUESTION: 102 Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology? A. Question users. B. Verify functionality. C. Divide and conquer. D. Implement the solution. Answer(s): A QUESTION: 103 A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply? A. Disk management B. Process management C. Application management D. Service management Answer(s): A https://Xcerts.com 28 FC0-U61 QUESTION: 104 Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration? A. Array B. Vector C. List D. String Answer(s): A QUESTION: 105 A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information? A. Word processing document B. Flat file C. Database D. Spreadsheet Answer(s): C QUESTION: 106 Which of the following would MOST likely use an ARM processor? A. Laptop B. Tablet C. Workstation D. Server Answer(s): B QUESTION: 107 A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this? A. Perform process management. B. Perform task scheduling. C. Set the system date and time. D. Set a reminder to run the script. https://Xcerts.com 29 FC0-U61 Answer(s): B QUESTION: 108 Which of the following would indicate the FASTEST processor speed? A. 3.6GHz B. 3.6MHz C. 3.6Mbps D. 3.6Gbps Answer(s): A QUESTION: 109 A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this? A. Cable modem B. Wireless router C. Access point D. Network switch Answer(s): A QUESTION: 110 The computer language that is closest to machine code is: A. query language B. scripting language C. markup language D. assembly language Answer(s): D QUESTION: 111 Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored? A. Record B. Report C. Column D. Procedure https://Xcerts.com 30 FC0-U61 Answer(s): A QUESTION: 112 Which of the following is an example of an interpreted language? A. C++ B. Java C. Python D. Go Answer(s): C QUESTION: 113 An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause? A. Script blocker B. Proxy settings C. Private browsing D. Full browser cache Answer(s): B QUESTION: 114 Which of the following filesystems would a Linux computer MOST likely use? A. HFS B. NTFS C. FAT32 D. ext4 Answer(s): D QUESTION: 115 Which of the following concerns does installing cross-platform software address? A. Subscription B. Licensing C. Product key D. Compatibility Answer(s): D QUESTION: 116 https://Xcerts.com 31 FC0-U61 Which of the following requires the MOST frequent updating to remain effective? A. Antivirus B. Host firewall C. Web browser D. Device drivers Answer(s): A QUESTION: 117 Which of the following BEST explains the use of float over integer to store monetary values? A. It accepts negative values. B. It stores symbols C. It accommodates larger values. D. It supports decimals. Answer(s): D QUESTION: 118 An IP address is 32 bits long. If converted to bytes, it would be: A. 4 bytes B. 8 bytes C. 16 bytes D. 64 bytes Answer(s): A QUESTION: 119 Which of the following BEST describes the purpose of a vector in programming? A. Storing a collection of data B. Repeating a similar operation C. Capturing user input D. Performing mathematical calculations Answer(s): A QUESTION: 120 Which of the following WiFi security options would create the MOST need for a VPN connection on the client device? A. Open https://Xcerts.com 32 FC0-U61 B. WEP C. WPA D. WPA2 Answer(s): A QUESTION: 121 Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time? A. Text file on a shared drive B. Managed relational database C. Informational intranet page D. Locally installed productivity software Answer(s): B QUESTION: 122 A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using? A. One-tier B. Two-tier C. Three-tier D. n-tier Answer(s): A QUESTION: 123 A global variable called “age” will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable? A. Integer B. Float C. Double D. String Answer(s): A QUESTION: 124 Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports? A. Data capture and collections https://Xcerts.com 33 FC0-U61 B. Asset inventory inputs C. Sales statistics D. Average loss output Answer(s): A QUESTION: 125 A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe? A. Local application B. Intranet application C. Extranet application D. Internet application Answer(s): B QUESTION: 126 A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.) A. Printer B. Mouse C. Webcam D. External hard drive E. Speakers F. Display Answer(s): B, F QUESTION: 127 A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this? A. POP3 B. IMAP C. ICMP D. SMTP Answer(s): A https://Xcerts.com 34 FC0-U61 QUESTION: 128 Consider the following statements: Given the input (userin) of “analyst”, to which of the following would the clearance variable be set? A. topsecret B. normal C. analyst D. restricted Answer(s): D QUESTION: 129 Which of the following is a reason why complex passwords are required? A. To encourage password variety B. To prevent someone from guessing them C. To make them harder to remember D. To reduce social engineering attacks Answer(s): B QUESTION: 130 A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of? A. Duplicate the problem B. Gather information C. Question users D. Divide and conquer Answer(s): A QUESTION: 131 Which of the following storage types is MOST vulnerable to magnetic damage? https://Xcerts.com 35 FC0-U61 A. Flash B. SSD C. Optical D. HDD Answer(s): D QUESTION: 132 When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent? A. Method B. Object C. Property D. Attribute Answer(s): D QUESTION: 133 Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause? A. The light switches do not support WPA2. B. The router is operating on a different channel. C. The key does not meet password complexity requirements. D. The SSID is not being broadcast. Answer(s): B QUESTION: 134 Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats? A. 10 B. 14 C. 15 https://Xcerts.com 36 FC0-U61 D. 17 Answer(s): C QUESTION: 135 Which of the following are the primary functions of an operating system? (Choose two.) A. Provide structure for file and data management. B. Provide protection against malware and viruses. C. Provide peer-to-peer networking capability. D. Provide user data encryption. E. Provide virtual desktop capability. F. Provide system resources. Answer(s): A, F QUESTION: 136 SQL databases use primary and foreign keys to enable which of the following? A. Rows B. Fields C. Schemas D. Relationships Answer(s): D QUESTION: 137 Which of the following is a logical structure for storing files? A. Folder B. Extension C. Permissions D. Shortcut Answer(s): A QUESTION: 138 Which of the following is both an input and output device? A. Microphone B. Speaker C. Touch-screen monitor D. Keyboard https://Xcerts.com 37 FC0-U61 Answer(s): A QUESTION: 139 A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do? A. Determine if anything has changed. B. Document lessons learned. C. Establish a theory of probable cause. D. Duplicate the problem, if possible. Answer(s): B QUESTION: 140 A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk? A. Password history B. Password reuse C. Password expiration D. Password age Answer(s): C QUESTION: 141 A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability? A. Backups B. Prioritization C. Indexes D. Failover Answer(s): D QUESTION: 142 A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue? A. Checking the proxy settings B. Checking that caching is enabled C. Checking browser add-ons https://Xcerts.com 38 FC0-U61 D. Checking certificate validity Answer(s): D QUESTION: 143 A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open? A. Antivirus B. Anti-malware C. Device Manager D. Host firewall Answer(s): D QUESTION: 144 Which of the following contains exactly four copper wires? A. RJ45 B. VGA C. RJ11 D. USB Answer(s): C QUESTION: 145 A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem? A. Replace the user’s display. B. Update the PC’s operating system. C. Replace the video cable. D. Install new video drivers. Answer(s): D QUESTION: 146 All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data? A. Server B. Tape library https://Xcerts.com 39 FC0-U61 C. External HDD D. Workstation Answer(s): A QUESTION: 147 Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses? A. Behavior security B. Information Identity Management C. Unauthorized hacking D. Authorized hacking Answer(s): A QUESTION: 148 A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal? A. Input validation B. System updates C. Password lockout D. Login auditing Answer(s): C QUESTION: 149 Which of the following is the number of bytes that is in 2KB? A. 1024 B. 2048 C. 20000 D. 1048576 Answer(s): B QUESTION: 150 A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network? A. Change the SSID. B. Change the default password. C. Change to WEP security. https://Xcerts.com 40 FC0-U61 D. Create a guest network. Answer(s): D QUESTION: 151 Which of the following is the BEST overall storage option for a laptop? A. Flash drive B. Hard drive C. SD card D. Solid-state drive Answer(s): D QUESTION: 152 A technician has worked through all steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT? A. Escalate as necessary. B. Confirm the root cause. C. Establish a new theory. D. Gather information. Answer(s): A QUESTION: 153 A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.) A. Update the IPS signatures. B. Update the network firewall. C. Update the malware definitions. D. Quarantine the network. E. Reset the network router. F. Contact the ISP. Answer(s): C, D QUESTION: 154 The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem? A. Private browsing is being used by some clients visiting the site. https://Xcerts.com 41 FC0-U61 B. Client-side scripting has been deactivated on some clients visiting the site. C. Legacy browsers that do not support scripting are being used by some clients. D. Server-side scripting has been deactivated by the server administrator. Answer(s): B QUESTION: 155 Which of the following is MOST likely to be considered protected personal information? A. Property tax records B. Court records C. Medical records D. Genealogy records Answer(s): C QUESTION: 156 A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of: A. confidentiality concerns. B. accounting concerns. C. integrity concerns. D. availability concerns. Answer(s): C QUESTION: 157 A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create? A. Record B. Constraint C. Field D. Schema Answer(s): D QUESTION: 158 The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing? A. Eavesdropping https://Xcerts.com 42 FC0-U61 B. Email service outage C. Man-in-the-middle D. Denial-of-service Answer(s): C QUESTION: 159 Which of the following is an IP address? A. 0x64F32 B. 00:0F:AC:17:2F:32 C. 10010110 D. 172.0.0.1 Answer(s): D QUESTION: 160 A developer is troubleshooting code in an application. The code is supposed to return the word “vegetables” if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue? A. If category id = 1 then 'Fruit' Else 'Vegetables' B. If category id = 1 then 'Fruit' Else if category id = 2 then 'Vegetables' Else 'Candy' C. If category id <> 1 then 'Vegetables' Else 'Fruit' D. If category id = 1 then 'Fruit' Else if category id >= 2 then 'Vegetables' Else 'Candy' Answer(s): B QUESTION: 161 Which of the following would allow an application to run automatically when a computer is started? A. Processes B. Journaling C. Services D. Drivers Answer(s): A https://Xcerts.com 43 FC0-U61 QUESTION: 162 An organization exports an inventory database nightly. This is an example of: A. database query. B. database report. C. database backup. D. database import. Answer(s): C QUESTION: 163 A user is having issues connecting to the Internet through a web browser; however, the user is receiving email and instant messages. Which of the following should the user do to BEST resolve the issue? A. Validate the certificate. B. Verify the proxy settings. C. Disable the pop-up blocker. D. Clear the browser cache. Answer(s): B QUESTION: 164 Which of the following data types BEST performs calculations? A. Integer B. Char C. String D. Vector Answer(s): A QUESTION: 165 A user has an outdated version of an operating system for which support is no longer available. The browser is also out of date. Which of the following should the user do to BEST protect online banking information? A. Install and configure a firewall. B. Install and run an antivirus program. C. Install and use another browser. D. Install and configure an IDS. Answer(s): B https://Xcerts.com 44 FC0-U61 QUESTION: 166 Which of the following internal computing components has the primary function of producing visual output to a monitor or other display device? A. CPU B. VGA C. GPU D. GUI Answer(s): B QUESTION: 167 A schema is a critical part of which of the following? A. Relational database B. Key/value database C. Document database D. NoSQL database Answer(s): A QUESTION: 168 In a mobile phone, which of the following wireless technologies is MOST likely to provide Internet connectivity? A. RF B. IR C. VPN D. NFC Answer(s): C QUESTION: 169 Ann, a user, wants to ensure that if her credentials are compromised, they cannot be used to access all of her logins or accounts. Which of the following best practices should she implement? A. Password history B. Password length C. Password reuse D. Password complexity Answer(s): C https://Xcerts.com 45 FC0-U61 QUESTION: 170 Which of the following encryption types would BEST be used to protect data on a shared computer? A. File B. VPN C. Email D. Mobile Answer(s): A QUESTION: 171 A project manager needs to compile a lot of start and end dates for events in a project. Which of the following software types is the project manager MOST likely to use? A. Spreadsheet software B. Word processing software C. Presentation software D. Visual diagramming software Answer(s): D QUESTION: 172 Which of the following will allow an organization to add additional servers without expanding the physical footprint within the corporate datacenter? A. Web applications B. Hypervisor C. Load balancer D. Dynamic routing Answer(s): B QUESTION: 173 Which of the following is the BEST example of structured data? A. Employee beverage preferences organized in a single text field B. Manager home addresses stored in a flat file without fields C. Vendor order information stored in unnamed fields D. Customer information that can be sorted or grouped by any field Answer(s): D https://Xcerts.com 46 FC0-U61 QUESTION: 174 Which of the following numbering systems is used to represent MAC addresses? A. Binary B. Decimal C. Octal D. Hexadecimal Answer(s): D QUESTION: 175 A database administrator has placed data from another source into a database. Which of the following did the database administrator perform? A. Import B. Export C. Create D. Query Answer(s): A QUESTION: 176 A technician is installing a wireless router for a home user. Which of the following will protect the data in transit between a device and the router? A. Enabling encryption B. Setting a new SSID C. Changing the default password D. Using 802.11ac Answer(s): A QUESTION: 177 Which of the following programming language types is generally the FASTEST way to write a program ad hoc tasks quickly? A. Compiled programming language B. Assembly language C. Scripting language D. Pseudocode Answer(s): C QUESTION: 178 https://Xcerts.com 47 FC0-U61 A user has been instructed to use unique passwords for accessing each system. Which of the following BEST describes the potential risk of using the same password? A. The password might be easier for an attacker to guess. B. Password compromise would allow access to all of the systems. C. Single sign-on would be unable to function correctly. D. Systems might reject the password based on different requirements. Answer(s): B QUESTION: 179 Which of the following should be used to store a list of strings? A. Array B. Constant C. Variable D. Branch Answer(s): A QUESTION: 180 Which of the following services is used to translate a URL to an IP address? A. ARP B. IMAP C. DNS D. MAC Answer(s): C QUESTION: 181 Which of the following is the BEST method for ensuring there is no Telnet access? A. Network sniffer B. Intrusion detection system C. Antivirus software D. Host-based firewall Answer(s): D QUESTION: 182 Which of the following types of software is MOST effective for tracking and communicating time spent on tasks for each team member? https://Xcerts.com 48 FC0-U61 A. Spreadsheet B. Collaborative workspace C. Project management D. Personal information management Answer(s): C QUESTION: 183 A user needs to connect a laptop to an Ethernet port in the room. Which of the following types of connections does the user need? A. RG6 B. DB9 C. RJ11 D. RJ45 Answer(s): D QUESTION: 184 Which of the following computing devices is MOST likely to have an internal wireless antenna? A. Mobile phone B. Workstation C. Server D. NAS Answer(s): A QUESTION: 185 Multiple users are reporting issues with their workstations. A technician is reviewing patch installation history. Which of the following steps in the troubleshooting methodology is the technician executing? A. Implement the solution. B. Identify the problem. C. Verify system functionality. D. Establish a theory of the cause. Answer(s): B QUESTION: 186 A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget and is reluctant to invest. Which of the following should the business consider in the analysis? https://Xcerts.com 49 FC0-U61 A. Loss of revenue in case of a breach B. Difficulty of integration C. Training involved for IT staff and users D. Amount of equipment that will be replaced Answer(s): A QUESTION: 187 A security administrator needs to set up multifactor authentication for a cloud application. Which of the following should the administrator use to establish an authentication process? (Choose two.) A. Logs B. Password C. Receipt D. Encryption E. Database F. Software token Answer(s): B, F QUESTION: 188 A program will request user input and perform an operation several times if the input is correct. Which of the following techniques BEST describes the fact that the operation is only performed if the input is correct? A. Looping B. Branching C. Reuse D. Modeling Answer(s): A QUESTION: 189 A company is developing an application that will be used to simplify typing on a virtual keyboard. This will MOST likely be installed on: A. a mobile OS. B. a workstation OS. C. a server OS. D. an embedded OS. https://Xcerts.com 50 FC0-U61 Answer(s): A QUESTION: 190 Which of the following examples are MOST typical of fault tolerance practices used in business continuity planning? (Choose two.) A. RAID storage B. Uninterruptible power supplies C. Off-site backups D. Private cloud servers E. Virtual-hosted desktops F. Warm sites Answer(s): B, C QUESTION: 191 A programmer is creating a program that makes a decision based on user input and has decided to use a branching statement. Which of the following commands would be BEST for the programmer to use? A. IF THEN B. WHILE C. FOR D. BEGIN Answer(s): A QUESTION: 192 Which of the following has the longest range? A. NFC B. Bluetooth C. WiFi D. Infrared Answer(s): C QUESTION: 193 Which of the following programming constructs would be used to repeat a statement 100 times in a loop? A. IF B. ELSE C. RETURN https://Xcerts.com 51 FC0-U61 D. WHILE Answer(s): D QUESTION: 194 A technician is installing a plug-and-play USB mouse. Which of the following must the technician do to complete the installation? A. Manually install the driver software. B. Connect the mouse. C. Configure the USB port. D. Download the driver software. Answer(s): B QUESTION: 195 Which of the following is the WEAKEST link in the security posture of an organization? A. Technology B. Infrastructure C. People D. Regulations Answer(s): C QUESTION: 196 A developer is in the process of creating a program and has started to draft the logic of the code. This process is an example of: A. drawing a value stream map. B. developing pseudocode. C. identifying functions. D. compiling the language. Answer(s): B QUESTION: 197 A security administrator is adding accounting features to a web application. Which of the following would be the BEST action? A. Enhance the granularity of user permissions. B. Enable an audit log. C. Implement smart card login. D. Adopt a procedure for adding accounts. https://Xcerts.com 52 FC0-U61 Answer(s): B QUESTION: 198 A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the following can be used to run scripts? A. Text editor B. Word processor C. Command line D. Spreadsheet Answer(s): C QUESTION: 199 Which of the following will a company do to update a customer’s address while using a flat file database? A. Update the address for each order the customer placed. B. Update the address in the customer address table. C. Update the address field in the customer order table. D. Update the primary key to reflect the customer’s address. Answer(s): C QUESTION: 200 A developer embeds a query in a high-level program to extract information from a database. This is an example of: A. database direct access. B. database utility access. C. database programmatic access. D. database manual access. Answer(s): A QUESTION: 201 Which of the following is the LOWEST unit for measuring bandwidth? A. Mbps B. Kbps C. MBps D. KBps https://Xcerts.com 53 FC0-U61 Answer(s): B QUESTION: 202 A user connects a company computer to free WiFi at a local coffee shop. Which of the following BEST describes this situation? A. Information on this network is encrypted. B. The information on the network can be seen by others. C. It is safe to access company information using the network. D. Private browsing mode protects the information on the network. Answer(s): B QUESTION: 203 A user wants to add an IoT device to a network. The device connects with a cable to the router. Which of the following is a requirement for this device to work? A. Driver B. USB cable C. IP address D. Workstation Answer(s): C QUESTION: 204 Which of the following is used for assigning IP addresses to networking devices? A. SMTP B. DHCP C. DNS D. ARP Answer(s): B QUESTION: 205 A help desk has initiated a new policy requiring that technicians manually categorize the reason for a customer call. After several months, they are unable to perform any analysis on the information. Which of the following concepts is MOST closely tied to the root cause of this issue? A. Data correlation B. Data security C. Data capture https://Xcerts.com 54 FC0-U61 D. Data as an asset Answer(s): A QUESTION: 206 During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish? A. Implement preventive measures. B. Establish a plan of action. C. Document findings/lessons learned. D. Test the theory to determine the cause. Answer(s): B QUESTION: 207 An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem? A. Clear browser cache. B. Change “http” to “https” in the URL. C. Disable all add-ons. D. Enable pop-up blockers. Answer(s): A QUESTION: 208 Which of the following BEST describes a LAN-hosted application? (Choose two.) A. Internet access required B. Services required C. Network required D. Files saved to the cloud E. Internet access not required F. Cloud availability Answer(s): C, E QUESTION: 209 A technician is given a document with step-by-step instructions to perform a task. Which of the following BEST describes that document? https://Xcerts.com 55 FC0-U61 A. Policies B. Standards C. Procedures D. Guidelines Answer(s): C QUESTION: 210 A technician installs a webcam to a computer and wants to install an updated driver. In which of the following would the technician find the MOST current driver? A. Installation disc that came with the device B. OEM website for the camera C. Internet help-desk forums D. Computer manufacturer’s website Answer(s): B QUESTION: 211 Which of the following is a benefit of a locally hosted network solution? A. No Internet access is required. B. There are fewer IT support requirements. C. System backups are not required. D. System fault tolerance is increased. Answer(s): A QUESTION: 212 Which of the following is an example of a compiled computer language? A. Perl B. HTML C. Java D. Python Answer(s): C QUESTION: 213 When following the troubleshooting methodology, which of the following should be performed when establishing a theory of probable cause? A. Question the obvious. https://Xcerts.com 56 FC0-U61 B. Identify the symptoms. C. Duplicate the problem. D. Determine if anything has changed. Answer(s): D https://Xcerts.com 57

Use Quizgecko on...
Browser
Browser