Last Updated on July 6, 2021 by InfraExam

FC0-U61 : CompTIA IT Fundamentals : Part 03

  1. A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

    • Flat file
    • Memory
    • Relational database
    • Solid state drive
  2. Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?

    • Contract
    • Patent
    • Copyright
    • Trademark
  3. Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

    • Infrared
    • NFC
    • Bluetooth
    • WiFi
  4. The IT department has established a new password policy for employees. Specifically, the policy reads:

    – Passwords must not contain common dictionary words
    – Passwords must contain at least one special character.
    – Passwords must be different from the las six passwords used.
    – Passwords must use at least one capital letter or number.

    Which of the following practices are being employed? (Select TWO).

    • Password lockout
    • Password complexity
    • Password expiration
    • Passwords history
    • Password length
    • Password age
  5. Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

    • Email previewing
    • Patching
    • Clear browsing cache
    • Kill process
  6. A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?

    • Thunderbolt cable
    • Bluetooth module
    • Infrared port
    • WLAN card
  7. Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

    • Password reuse
    • Snooping
    • Social engineering
    • Phishing
  8. A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?

    • WPA
    • SSID
    • WEP
    • WPA2
  9. Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)

    • SMTP
    • POP3
    • SNMP
    • DHCP
    • ICMP
    • SFTP
  10. A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

    • UPDATE
    • DELETE
    • ALTER
    • DROP
  11. A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

    • USB
    • NFC
    • DSL
    • DVI
  12. Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

    • Fiber
    • DSL
    • Cable
    • Satellite
  13. Which of the following is MOST likely used to represent international text data?

    • ASCII
    • Octal
    • Hexadecimal
    • Unicode
  14. For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

    • redundancy.
    • replication.
    • prioritization.
    • fault tolerance.
  15. Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).

    • Windows 7
    • Windows 8
    • UNIX
    • Windows Server 2012
    • Android
    • Linux
  16. A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

    • 802.11a
    • 802.11b
    • 802.11g
    • 802.11n
  17. Which of the following is an example of multifactor authentication?

    • Password and passphrase
    • Fingerprint and retina scan
    • Hardware token and smartphone
    • Smart card and PIN
  18. Which of the following language types would a web developer MOST likely use to create a website?

    • Interpreted
    • Query
    • Compiled
    • Assembly
  19. A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

    • Algorithm
    • Software
    • Pseudocode
    • Flowchart
  20. A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

    • Patent
    • Copyright
    • NDA
    • Trademark
    • EULA