FC0-U61 : CompTIA IT Fundamentals : Part 03
-
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
- Flat file
- Memory
- Relational database
- Solid state drive
-
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
- Contract
- Patent
- Copyright
- Trademark
-
Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
- Infrared
- NFC
- Bluetooth
- WiFi
-
The IT department has established a new password policy for employees. Specifically, the policy reads:
– Passwords must not contain common dictionary words
– Passwords must contain at least one special character.
– Passwords must be different from the las six passwords used.
– Passwords must use at least one capital letter or number.Which of the following practices are being employed? (Select TWO).
- Password lockout
- Password complexity
- Password expiration
- Passwords history
- Password length
- Password age
-
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
- Email previewing
- Patching
- Clear browsing cache
- Kill process
-
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?
- Thunderbolt cable
- Bluetooth module
- Infrared port
- WLAN card
-
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
- Password reuse
- Snooping
- Social engineering
- Phishing
-
A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?
- WPA
- SSID
- WEP
- WPA2
-
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
- SMTP
- POP3
- SNMP
- DHCP
- ICMP
- SFTP
-
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
- UPDATE
- DELETE
- ALTER
- DROP
-
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
- USB
- NFC
- DSL
- DVI
-
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
- Fiber
- DSL
- Cable
- Satellite
-
Which of the following is MOST likely used to represent international text data?
- ASCII
- Octal
- Hexadecimal
- Unicode
-
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
- redundancy.
- replication.
- prioritization.
- fault tolerance.
-
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
- Windows 7
- Windows 8
- UNIX
- Windows Server 2012
- Android
- Linux
-
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
- 802.11a
- 802.11b
- 802.11g
- 802.11n
-
Which of the following is an example of multifactor authentication?
- Password and passphrase
- Fingerprint and retina scan
- Hardware token and smartphone
- Smart card and PIN
-
Which of the following language types would a web developer MOST likely use to create a website?
- Interpreted
- Query
- Compiled
- Assembly
-
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
- Algorithm
- Software
- Pseudocode
- Flowchart
-
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).
- Patent
- Copyright
- NDA
- Trademark
- EULA
Subscribe
0 Comments
Newest