ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?

A.
DLP
A.
DLP
Answers
B.
ACL
B.
ACL
Answers
C.
TLS
C.
TLS
Answers
D.
IPS
D.
IPS
Answers
Suggested answer: C

Given the following pseudocode:

Which of the following is the output of the code?

A.
1
A.
1
Answers
B.
9
B.
9
Answers
C.
10
C.
10
Answers
D.
11
D.
11
Answers
Suggested answer: B

Explanation:

The code uses a for loop to iterate from 1 to 3, and assigns the value of i to the variable x. Then,it adds 3 to x and prints the result. The output of the code is:

3 (when i = 1, x = 1, x + 3 = 4) 6 (when i = 2, x = 2, x + 3 = 5) 9 (when i = 3, x = 3, x + 3 = 6)

A developer needs to add a table to a database. Which of the following database activities should the user perform?

A.
UPDATE
A.
UPDATE
Answers
B.
ALTER
B.
ALTER
Answers
C.
CREATE
C.
CREATE
Answers
D.
REPORT
D.
REPORT
Answers
Suggested answer: C

Which of the following does a NoSQL database use to organize data?

A.
Primary keys
A.
Primary keys
Answers
B.
Schemas
B.
Schemas
Answers
C.
Keys/values
C.
Keys/values
Answers
D.
Tables
D.
Tables
Answers
Suggested answer: C

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?

A.
File backup
A.
File backup
Answers
B.
Data restoration
B.
Data restoration
Answers
C.
Fault tolerance
C.
Fault tolerance
Answers
D.
Restoring access
D.
Restoring access
Answers
Suggested answer: C

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?

A.
Text editing software
A.
Text editing software
Answers
B.
Visual diagramming software
B.
Visual diagramming software
Answers
C.
Spreadsheet software
C.
Spreadsheet software
Answers
D.
Web browsing software
D.
Web browsing software
Answers
Suggested answer: C

Which of the following BEST describes the physical location of the data in the database?

A.
Table
A.
Table
Answers
B.
Column
B.
Column
Answers
C.
RAM
C.
RAM
Answers
D.
HDD
D.
HDD
Answers
Suggested answer: D

Explanation:

HDD (Hard Disk Drive) is a type of storage device that uses magnetic disks to store datapermanently. The physical location of the data in the database is on the HDD of the server orcomputer that hosts the database. The data can be accessed by using logical structures such astables, columns, rows, and queries.

A user logs into a laptop using a username and complex password. This is an example of:

A.
biometrics
A.
biometrics
Answers
B.
multifactor authentication
B.
multifactor authentication
Answers
C.
least privilege
C.
least privilege
Answers
D.
single-factor authentication
D.
single-factor authentication
Answers
Suggested answer: D

To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user's workstation. Which of the following troubleshooting methodologies is being performed?

A.
Question the obvious.
A.
Question the obvious.
Answers
B.
Divide and conquer.
B.
Divide and conquer.
Answers
C.
Duplicate the problem
C.
Duplicate the problem
Answers
D.
Research the knowledge base.
D.
Research the knowledge base.
Answers
Suggested answer: B

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user's needs?

A.
T1 line
A.
T1 line
Answers
B.
Satellite
B.
Satellite
Answers
C.
Fiber optic
C.
Fiber optic
Answers
D.
DSL
D.
DSL
Answers
Suggested answer: C
Total 425 questions
Go to page: of 43