ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 14

Question list
Search
Search

Which of the following storage types is MOST vulnerable to magnetic damage?

A.
Flash
A.
Flash
Answers
B.
SSD
B.
SSD
Answers
C.
Optical
C.
Optical
Answers
D.
HDD
D.
HDD
Answers
Suggested answer: D

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?

A.
Method
A.
Method
Answers
B.
Object
B.
Object
Answers
C.
Property
C.
Property
Answers
D.
Attribute
D.
Attribute
Answers
Suggested answer: A

Explanation:

A method is a programming concept that represents a function or a procedure that performs aspecific task or action on an object. An object is a programming concept that represents aninstance of a class or a data type that has properties and methods. A method would bestdescribe the ability to jump for a boss object in game development because it is an action thatthe boss object can perform. Property, object, and attribute are not programming conceptsthat represent the ability to jump for a boss object in game development. Property is aprogramming concept that represents a characteristic or a feature of an object, such as color,size, or name. Object is a programming concept that represents an instance of a class or a datatype that has properties and methods. Attribute is another term for property in someprogramming languages.Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61,Second Edition, Chapter 4: Programming Concepts and Data Structures, page 143.

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?

A.
The light switches do not support WPA2.
A.
The light switches do not support WPA2.
Answers
B.
The router is operating on a different channel.
B.
The router is operating on a different channel.
Answers
C.
The key does not meet password complexity requirements.
C.
The key does not meet password complexity requirements.
Answers
D.
The SSID is not being broadcast.
D.
The SSID is not being broadcast.
Answers
Suggested answer: A

Explanation:

WPA2 (WiFi Protected Access II) is a WiFi security option that uses encryption andauthentication to protect the wireless network from unauthorized access or eavesdropping.WPA2 is the most secure and recommended WiFi security option among the options given. Ifsome light switches are no longer communicating after replacing the wireless router with a newdevice that uses WPA2, the most likely cause is that the light switches do not support WPA2.The light switches may need to be updated or replaced to be compatible with WPA2. The routeroperating on a different channel, the key not meeting password complexity requirements, andthe SSID not being broadcast are not likely causes of the light switches not communicating afterreplacing the wireless router with a new device that uses WPA2.Reference: CompTIA ITFundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 8: Security Concepts, page311.

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

A.
10
A.
10
Answers
B.
14
B.
14
Answers
C.
15
C.
15
Answers
D.
17
D.
17
Answers
Suggested answer: C

Which of the following are the primary functions of an operating system? (Choose two.)

A.
Provide structure for file and data management.
A.
Provide structure for file and data management.
Answers
B.
Provide protection against malware and viruses.
B.
Provide protection against malware and viruses.
Answers
C.
Provide peer-to-peer networking capability.
C.
Provide peer-to-peer networking capability.
Answers
D.
Provide user data encryption.
D.
Provide user data encryption.
Answers
E.
Provide virtual desktop capability.
E.
Provide virtual desktop capability.
Answers
F.
Provide system resources.
F.
Provide system resources.
Answers
Suggested answer: A, F

SQL databases use primary and foreign keys to enable which of the following?

A.
Rows
A.
Rows
Answers
B.
Fields
B.
Fields
Answers
C.
Schemas
C.
Schemas
Answers
D.
Relationships
D.
Relationships
Answers
Suggested answer: D

Which of the following is a logical structure for storing files?

A.
Folder
A.
Folder
Answers
B.
Extension
B.
Extension
Answers
C.
Permissions
C.
Permissions
Answers
D.
Shortcut
D.
Shortcut
Answers
Suggested answer: A

Which of the following is both an input and output device?

A.
Microphone
A.
Microphone
Answers
B.
Speaker
B.
Speaker
Answers
C.
Touch-screen monitor
C.
Touch-screen monitor
Answers
D.
Keyboard
D.
Keyboard
Answers
Suggested answer: A

A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?

A.
Determine if anything has changed.
A.
Determine if anything has changed.
Answers
B.
Document lessons learned.
B.
Document lessons learned.
Answers
C.
Establish a theory of probable cause.
C.
Establish a theory of probable cause.
Answers
D.
Duplicate the problem, if possible.
D.
Duplicate the problem, if possible.
Answers
Suggested answer: B

A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?

A.
Password history
A.
Password history
Answers
B.
Password reuse
B.
Password reuse
Answers
C.
Password expiration
C.
Password expiration
Answers
D.
Password age
D.
Password age
Answers
Suggested answer: B

Explanation:

Password reuse is the practice of using the same password for multiple accounts or services.Password reuse would increase the risk of account security on other sites if a large paymentwebsite was breached recently. If the attackers obtained the user's password from thebreached website, they could try to use it to access the user's accounts on other sites.Password reuse should be avoided and different passwords should be used for differentaccounts or services. Password history, password expiration, and password age are notpassword best practices that would mitigate this risk. Password history is the record of previouspasswords that a user has used for an account or service. Password expiration is the time limitfor using a password before it needs to be changed. Password age is the length of time that apassword has been in use.Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61,Second Edition, Chapter 8: Security Concepts, page 308.

Total 425 questions
Go to page: of 43