FC0-U61 : CompTIA IT Fundamentals : Part 04

  1. Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

    • Host-based firewall
    • Strong administrator password
    • Anti-malware software
    • Full disk encryption
  2. In which of the following situations should there be come expectation of privacy?

    • Posting a comment on a friend’s social media page
    • Submitting personal information on a school enrollment site
    • Posting a comment on a video sharing site
    • Sending email and pictures to a close relative
  3. Which of the following data types should a developer use when creating a variable to hold a postal code?

    • Integer
    • String
    • Float
    • Boolean
  4. Which of the following is the closest to machine language?

    • Scripted languages
    • Compiled languages
    • Query languages
    • Assembly languages
  5. A function is BEST used for enabling programs to:

    • hold a list of numbers.
    • be divided into reusable components.
    • define needed constant values.
    • define variables to hold different values.
  6. When transferring a file across the network, which of the following would be the FASTEST transfer rate?

    • 1001Kbps
    • 110Mbps
    • 1.22Gbps
    • 123Mbps
  7. A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

    • 127.0.0.1
    • 172.16.2.189
    • 192.168.257.1
    • 255.255.255.0
  8. A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

    • Laptop
    • Server
    • Game console
    • Workstation
  9. A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?

    • Flat file
    • Word processor
    • Database
    • Network share
  10. A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

    • x86 only supports an installation on a 32-bit CPU architecture.
    • x86 supports an installation on a 32-bit and a 64-bit CPU architecture.
    • x86 only supports an installation on a 64-bit CPU architecture.
    • x86 supports an installation on a 16-bit CPU architecture.
  11. Which of the following would be used to send messages using the SMTP protocol?

    • Document sharing software
    • Instant messaging software
    • Conferencing software
    • Email software
  12. Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

    • Turn on private browsing
    • Delete browsing history on program close.
    • Notify when downloads are complete.
    • Configure prompting before downloading content.
  13. Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

    • Customer date of birth
    • The first and last name of the Chief Executive Officer (CEO)
    • Customer service number
    • Company social media screen name
  14. The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

    • Database software
    • Word processing software
    • Conferencing software
    • Presentation software
  15. Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

    • Renew the IP address.
    • Configure the browser proxy settings.
    • Clear the browser cache.
    • Disable the pop-up blocker
  16. Which of the following would be considered the BEST method of securely distributing medical records?

    • Encrypted flash drive
    • Social networking sites
    • Fax
    • FTP file sharing
  17. Which of the following should have the HIGHEST expectation of privacy?

    • A picture posted to a social media website
    • A presentation saved to a corporate file server
    • A locally stored word processing document
    • A spreadsheet emailed to a business client
  18. Which of the following storage devices have a spinning disk? (Choose two.)

    • Optical drive
    • SSD
    • HDD
    • Flash drive
    • RAM
    • ROM
  19. Which of the following computer components allows for communication over a computer network?

    • RAM
    • NIC
    • CPU
    • NAS
  20. A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?

    • Cellular
    • Satellite
    • Cable
    • Fiber
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments