ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 22

Question list
Search
Search

Which of the following is a benefit of a locally hosted network solution?

A.
No Internet access is required
A.
No Internet access is required
Answers
B.
There are fewer IT support requirements.
B.
There are fewer IT support requirements.
Answers
C.
System backups are not required
C.
System backups are not required
Answers
D.
System fault tolerance is increased
D.
System fault tolerance is increased
Answers
Suggested answer: A

Which of the following is an example of a compiled computer language?

A.
Perl
A.
Perl
Answers
B.
HTML
B.
HTML
Answers
C.
Java
C.
Java
Answers
D.
Python
D.
Python
Answers
Suggested answer: C

When following the troubleshooting methodology, which of the following should be performed when establishing a theory of probable cause?

A.
Question-the obvious.
A.
Question-the obvious.
Answers
B.
Identify the symptoms.
B.
Identify the symptoms.
Answers
C.
Duplicate the problem.
C.
Duplicate the problem.
Answers
D.
Determine if anything has changed.
D.
Determine if anything has changed.
Answers
Suggested answer: D

Explanation:

Which of the following storage types uses platters to store data?

A.
Hard drive
A.
Hard drive
Answers
B.
Solid-state drive
B.
Solid-state drive
Answers
C.
Optical drive
C.
Optical drive
Answers
D.
Flash drive
D.
Flash drive
Answers
Suggested answer: A

Explanation:

A hard drive, also known as a hard disk drive (HDD), is a type of storage device that uses one or more rotating platters coated with magnetic material to store data. The platters are accessed by read/write heads that move across the surface of the platters as they spin. The data is stored as tiny magnetic regions on the platters, which can be changed or read by the heads. Hard drives are non-volatile, meaning they retain data even when power is off. Hard drives offer large storage capacity, low cost per gigabyte, and fast data transfer rates compared to other storage types. However, they are also prone to mechanical failures, noise, heat, and physical damage

Which of the following would be the best reason to implement a host firewall?

A.
To prevent external access
A.
To prevent external access
Answers
B.
To prevent hardware failures
B.
To prevent hardware failures
Answers
C.
To prevent the removal of software
C.
To prevent the removal of software
Answers
D.
To prevent wiretapping
D.
To prevent wiretapping
Answers
Suggested answer: A

Explanation:

A host firewall is a software program that runs on a computer or device and monitors and controls the incoming and outgoing network traffic based on predefined rules. A host firewall can help prevent external access from unauthorized or malicious sources, such as hackers, malware, or network worms. A host firewall can also block unwanted or unnecessary traffic from reaching the computer or device, which can improve performance and security. A host firewall can be configured to allow or deny traffic based on various criteria, such as port number, protocol, application, source address, destination address, or content. A host firewall can also log or alert the user about any suspicious or blocked activity.

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

A.
Boolean
A.
Boolean
Answers
B.
Integer
B.
Integer
Answers
C.
Float
C.
Float
Answers
D.
Char
D.
Char
Answers
Suggested answer: C

Explanation:

A float is a data type that can store decimal numbers, such as 3.14 or 0.01. This is suitable for calculating a bank account balance within two decimal places, as it can represent fractions of a dollar. A boolean is a data type that can only store true or false values, which is not useful for numerical calculations. An integer is a data type that can store whole numbers, such as 1 or 100, but not decimals. A char is a data type that can store a single character, such as 'a' or '9', but not multiple characters or decimals. References: CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61, Second Edition, Chapter 4: Software Development Concepts, page 1371

A programmer is generating results by iterating rows that provide values needed for one calculation.

Which of the following functions best accomplishes this task?

A.
Branching
A.
Branching
Answers
B.
Pausing for input
B.
Pausing for input
Answers
C.
Sorting
C.
Sorting
Answers
D.
Looping
D.
Looping
Answers
Suggested answer: D

Explanation:

Looping is a function that allows a programmer to repeat a block of code for a certain number of times or until a condition is met. This is useful for iterating rows that provide values needed for one calculation, as it can perform the same operation on each row without writing redundant code.

Branching is a function that allows a programmer to execute different blocks of code depending on a condition, such as an if-else statement. Pausing for input is a function that allows a programmer to stop the execution of the code and wait for the user to enter some data, such as using the input() function in Python. Sorting is a function that allows a programmer to arrange a collection of data in a certain order, such as ascending or descending. References: CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61, Second Edition, Chapter 4: Software Development Concepts, page 139

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

A.
Workstation
A.
Workstation
Answers
B.
Laptop
B.
Laptop
Answers
C.
Cellphone
C.
Cellphone
Answers
D.
Thin client
D.
Thin client
Answers
Suggested answer: C

Explanation:

A cellphone is the most ideal computing device for point-of-sale transactions in a retail store where salespeople roam around. A cellphone is portable, wireless, and has features such as cameras, scanners, and touchscreens that can facilitate payment processing and customer interaction. A workstation is a desktop computer that is designed for high-performance tasks, but it is not portable or wireless. A laptop is a portable computer that can run on battery power, but it is not as convenient or compact as a cellphone. A thin client is a computer that relies on a server for most of its processing and storage, but it is not suitable for point-of-sale transactions without network connectivity. References: The Official CompTIA IT Fundamentals (ITF+) Student Guide (Exam FC0-U61), Chapter 1: IT Fundamentals1

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

A.
Installing a host-based firewall
A.
Installing a host-based firewall
Answers
B.
Setting a BIOS password
B.
Setting a BIOS password
Answers
C.
Patching the operating system
C.
Patching the operating system
Answers
D.
Removing unnecessary software
D.
Removing unnecessary software
Answers
Suggested answer: B

Explanation:

Setting a BIOS password is a security-related best practice that would prevent end users from booting alternative operating systems on workstations. A BIOS password restricts access to the BIOS settings, which control the boot order and other hardware configurations of the computer. Installing a hostbased firewall, patching the operating system, and removing unnecessary software are also securityrelated best practices, but they do not directly prevent booting alternative operating systems on workstations. References: The Official CompTIA IT Fundamentals (ITF+) Student Guide (Exam FC0-U61), Chapter 7: Security Concepts1

Which of the following business continuity concepts is the best example of fault tolerance?

A.
Data restoration
A.
Data restoration
Answers
B.
Redundant power
B.
Redundant power
Answers
C.
Disaster recovery
C.
Disaster recovery
Answers
D.
Restoring access
D.
Restoring access
Answers
Suggested answer: B

Explanation:

Redundant power is the best example of fault tolerance among the given business continuity concepts. Fault tolerance refers to the ability of a system to continue functioning despite failures or errors in some of its components. Redundant power provides backup sources of electricity in case of power outages or surges, ensuring uninterrupted operation of critical systems. Data restoration refers to the process of recovering lost or corrupted data from backups or other sources. Disaster recovery refers to the plan and procedures for restoring normal business operations after a major disruption, such as a natural disaster or a cyberattack. Restoring access refers to the process of granting users the ability to use systems or resources that were previously unavailable or inaccessible. References: The Official CompTIA IT Fundamentals (ITF+) Student Guide (Exam FC0-U61), Chapter 7: Security Concepts1

Total 425 questions
Go to page: of 43