ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A.
Update from 802.11b to 802.11g.
A.
Update from 802.11b to 802.11g.
Answers
B.
Ensure sources of EMI are removed.
B.
Ensure sources of EMI are removed.
Answers
C.
Enable WPA2-Enterprise.
C.
Enable WPA2-Enterprise.
Answers
D.
Use WiFi Protected Setup.
D.
Use WiFi Protected Setup.
Answers
Suggested answer: B

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

A.
Establish a plan of action.
A.
Establish a plan of action.
Answers
B.
Gather information
B.
Gather information
Answers
C.
Duplicate the problem.
C.
Duplicate the problem.
Answers
D.
Find the root cause.
D.
Find the root cause.
Answers
Suggested answer: C

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

A.
Ensure both devices are connected to the LAN.
A.
Ensure both devices are connected to the LAN.
Answers
B.
Enable task scheduling.
B.
Enable task scheduling.
Answers
C.
Reset the proxy settings to their default values.
C.
Reset the proxy settings to their default values.
Answers
D.
Review the fault tolerance configurations.
D.
Review the fault tolerance configurations.
Answers
Suggested answer: A

Which of the following relational database constructs is used to ensure valid values are entered for a column?

A.
Schema
A.
Schema
Answers
B.
Permissions
B.
Permissions
Answers
C.
Constraint
C.
Constraint
Answers
D.
Column
D.
Column
Answers
Suggested answer: C

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

A.
Encryption
A.
Encryption
Answers
B.
Compression
B.
Compression
Answers
C.
Permissions
C.
Permissions
Answers
D.
Auditing
D.
Auditing
Answers
Suggested answer: A

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

A.
a storage area network.
A.
a storage area network.
Answers
B.
an embedded OS.
B.
an embedded OS.
Answers
C.
network attached storage.
C.
network attached storage.
Answers
D.
a Type 1 hypervisor.
D.
a Type 1 hypervisor.
Answers
Suggested answer: D

Which of the following is a compiled language?

A.
Perl
A.
Perl
Answers
B.
JScript
B.
JScript
Answers
C.
Java
C.
Java
Answers
D.
PowerShell
D.
PowerShell
Answers
Suggested answer: C

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

A.
Document the solution and cause.
A.
Document the solution and cause.
Answers
B.
Create a new theory of cause.
B.
Create a new theory of cause.
Answers
C.
Research the problem online.
C.
Research the problem online.
Answers
D.
Implement preventive measures.
D.
Implement preventive measures.
Answers
Suggested answer: A

Which of the following is a value that uniquely identifies a database record?

A.
Foreign key
A.
Foreign key
Answers
B.
Public key
B.
Public key
Answers
C.
Primary key
C.
Primary key
Answers
D.
Private key
D.
Private key
Answers
Suggested answer: C

A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?

A.
SELECT
A.
SELECT
Answers
B.
INSERT
B.
INSERT
Answers
C.
DELETE
C.
DELETE
Answers
D.
UPDATE
D.
UPDATE
Answers
Suggested answer: A
Total 425 questions
Go to page: of 43