FC0-U61 : CompTIA IT Fundamentals : Part 06

  1. Which of the following types of encryption would BEST protect a laptop computer in the event of theft?

    • Disk
    • Email
    • VPN
    • HTTPS
  2. Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?

    • Question users.
    • Verify functionality.
    • Divide and conquer.
    • Implement the solution.
  3. A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?

    • Disk management
    • Process management
    • Application management
    • Service management
  4. Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?

    • Array
    • Vector
    • List
    • String
  5. A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?

    • Word processing document
    • Flat file
    • Database
    • Spreadsheet
  6. Which of the following would MOST likely use an ARM processor?

    • Laptop
    • Tablet
    • Workstation
    • Server
  7. A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?

    • Perform process management.
    • Perform task scheduling.
    • Set the system date and time.
    • Set a reminder to run the script.
  8. Which of the following would indicate the FASTEST processor speed?

    • 3.6GHz
    • 3.6MHz
    • 3.6Mbps
    • 3.6Gbps
  9. A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?

    • Cable modem
    • Wireless router
    • Access point
    • Network switch
  10. The computer language that is closest to machine code is:

    • query language
    • scripting language
    • markup language
    • assembly language
  11. Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?

    • Record
    • Report
    • Column
    • Procedure
  12. Which of the following is an example of an interpreted language?

    • C++
    • Java
    • Python
    • Go
  13. An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?

    • Script blocker
    • Proxy settings
    • Private browsing
    • Full browser cache
  14. Which of the following filesystems would a Linux computer MOST likely use?

    • HFS
    • NTFS
    • FAT32
    • ext4
  15. Which of the following concerns does installing cross-platform software address?

    • Subscription
    • Licensing
    • Product key
    • Compatibility
  16. Which of the following requires the MOST frequent updating to remain effective?

    • Antivirus
    • Host firewall
    • Web browser
    • Device drivers
  17. Which of the following BEST explains the use of float over integer to store monetary values?

    • It accepts negative values.
    • It stores symbols
    • It accommodates larger values.
    • It supports decimals.
  18. An IP address is 32 bits long. If converted to bytes, it would be:

    • 4 bytes
    • 8 bytes
    • 16 bytes
    • 64 bytes
  19. Which of the following BEST describes the purpose of a vector in programming?

    • Storing a collection of data
    • Repeating a similar operation
    • Capturing user input
    • Performing mathematical calculations
  20. Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?

    • Open
    • WEP
    • WPA
    • WPA2
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments