Last Updated on July 6, 2021 by InfraExam
FC0-U61 : CompTIA IT Fundamentals : Part 06
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
- Question users.
- Verify functionality.
- Divide and conquer.
- Implement the solution.
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
- Disk management
- Process management
- Application management
- Service management
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
- Word processing document
- Flat file
Which of the following would MOST likely use an ARM processor?
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?
- Perform process management.
- Perform task scheduling.
- Set the system date and time.
- Set a reminder to run the script.
Which of the following would indicate the FASTEST processor speed?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
- Cable modem
- Wireless router
- Access point
- Network switch
The computer language that is closest to machine code is:
- query language
- scripting language
- markup language
- assembly language
Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
Which of the following is an example of an interpreted language?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
- Script blocker
- Proxy settings
- Private browsing
- Full browser cache
Which of the following filesystems would a Linux computer MOST likely use?
Which of the following concerns does installing cross-platform software address?
- Product key
Which of the following requires the MOST frequent updating to remain effective?
- Host firewall
- Web browser
- Device drivers
Which of the following BEST explains the use of float over integer to store monetary values?
- It accepts negative values.
- It stores symbols
- It accommodates larger values.
- It supports decimals.
An IP address is 32 bits long. If converted to bytes, it would be:
- 4 bytes
- 8 bytes
- 16 bytes
- 64 bytes
Which of the following BEST describes the purpose of a vector in programming?
- Storing a collection of data
- Repeating a similar operation
- Capturing user input
- Performing mathematical calculations
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?