FC0-U61 : CompTIA IT Fundamentals : Part 06
-
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
- Disk
- VPN
- HTTPS
-
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
- Question users.
- Verify functionality.
- Divide and conquer.
- Implement the solution.
-
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
- Disk management
- Process management
- Application management
- Service management
-
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
- Array
- Vector
- List
- String
-
A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
- Word processing document
- Flat file
- Database
- Spreadsheet
-
Which of the following would MOST likely use an ARM processor?
- Laptop
- Tablet
- Workstation
- Server
-
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?
- Perform process management.
- Perform task scheduling.
- Set the system date and time.
- Set a reminder to run the script.
-
Which of the following would indicate the FASTEST processor speed?
- 3.6GHz
- 3.6MHz
- 3.6Mbps
- 3.6Gbps
-
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
- Cable modem
- Wireless router
- Access point
- Network switch
-
The computer language that is closest to machine code is:
- query language
- scripting language
- markup language
- assembly language
-
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
- Record
- Report
- Column
- Procedure
-
Which of the following is an example of an interpreted language?
- C++
- Java
- Python
- Go
-
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
- Script blocker
- Proxy settings
- Private browsing
- Full browser cache
-
Which of the following filesystems would a Linux computer MOST likely use?
- HFS
- NTFS
- FAT32
- ext4
-
Which of the following concerns does installing cross-platform software address?
- Subscription
- Licensing
- Product key
- Compatibility
-
Which of the following requires the MOST frequent updating to remain effective?
- Antivirus
- Host firewall
- Web browser
- Device drivers
-
Which of the following BEST explains the use of float over integer to store monetary values?
- It accepts negative values.
- It stores symbols
- It accommodates larger values.
- It supports decimals.
-
An IP address is 32 bits long. If converted to bytes, it would be:
- 4 bytes
- 8 bytes
- 16 bytes
- 64 bytes
-
Which of the following BEST describes the purpose of a vector in programming?
- Storing a collection of data
- Repeating a similar operation
- Capturing user input
- Performing mathematical calculations
-
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
- Open
- WEP
- WPA
- WPA2
Subscribe
0 Comments
Newest