ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 31

Question list
Search
Search

Which of the following database types would be best in which to place financial data?

A.
Unstructured
A.
Unstructured
Answers
B.
Semi-structured
B.
Semi-structured
Answers
C.
Structured
C.
Structured
Answers
D.
Spreadsheet
D.
Spreadsheet
Answers
Suggested answer: C

Explanation:

A structured database is a type of database that stores data in tables and columns, where each column has a predefined data type and each row represents a record. Structured databases are also known as relational databases, because they use keys and relationships to link data across tables. Structured databases are ideal for placing financial data, because they offer the following advantages:

They are ACID compliant, which means they ensure the integrity, consistency, and reliability of transactions.

They support a range of data types, such as numbers, dates, strings, and currencies, which are suitable for storing and manipulating financial data.

They allow complex queries and calculations using SQL, which is a standard and widely used query language for financial analysis and reporting.

They are collaborative, secure, and stable, which are essential features for managing and sharing financial data among multiple users and applications.

Which of the following is secure?

A.
.edu
A.
.edu
Answers
B.
FTP
B.
FTP
Answers
C.
HTTPS
C.
HTTPS
Answers
D.
.org
D.
.org
Answers
E.
FAT32
E.
FAT32
Answers
Suggested answer: C

Explanation:

HTTPS stands for Hypertext Transfer Protocol over SSL/TLS, which is a secure version of the HTTP protocol that is used to transfer web pages and other data over the internet. HTTPS encrypts the communication between the web browser and the web server using SSL or TLS, which are cryptographic protocols that provide confidentiality, integrity, and authentication. HTTPS prevents eavesdropping, tampering, and spoofing of the web traffic, and protects sensitive information such as passwords, credit card numbers, and personal details. HTTPS is indicated by a padlock icon or a green address bar in the web browser, and the URL starts with https:// instead of http://.

The other options are not secure protocols or formats. .edu and .org are top-level domains that indicate the type of organization that owns the website, but they do not guarantee any security. FTP stands for File Transfer Protocol, which is a standard protocol for transferring files between computers, but it does not encrypt the data or the credentials, making it vulnerable to interception and modification. FAT32 is a file system format that is used to organize and store data on disks, but it does not provide any encryption or access control, making it easy to read and modify the data by anyone who has physical access to the disk.Reference:Secure Protocols -- CompTIA Security+ SY0-501 -- 2.6,CompTIA IT Fundamentals (ITF+) Certification Exam Objectives,CompTIA IT Fundamentals+ (Exam FC0-U61) Module 3 / Unit 2 / Using Device Interfaces

A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?

A.
Delete the tracking cookies.
A.
Delete the tracking cookies.
Answers
B.
Avoid password reuse.
B.
Avoid password reuse.
Answers
C.
Use a complex password.
C.
Use a complex password.
Answers
D.
Clear the browser cache.
D.
Clear the browser cache.
Answers
Suggested answer: B

Explanation:

Password reuse is a common practice that makes users vulnerable to credential stuffing attacks, where hackers use stolen passwords from one site to access other accounts of the same user. This can lead to identity theft, financial loss, and privacy breaches. To prevent this type of attack in the future, the user should avoid password reuse and create unique and strong passwords for each account. The user should also use a password manager to store and generate passwords securely, and enable multi-factor authentication whenever possible.Reference:

Chapter 32 Explain Password Best Practices - CompTIA IT Fundamentals+ FC0-U61 Cert Guide

Cybersecurity and End User Passwords | Cybersecurity | CompTIA

Managing Password Policies -- CompTIA Security+ SY0-401: 5.3

CompTIA IT Fundamentals+ Certification Exam Test Questions With Answers ...

Which of the following file extensions is used for a consolidated group of files?

A.
.bat
A.
.bat
Answers
B.
.avi
B.
.avi
Answers
C.
.rar
C.
.rar
Answers
D.
.rtf
D.
.rtf
Answers
Suggested answer: C

Explanation:

A file extension is a suffix that indicates the type, format, or content of a file. Different file extensions are associated with different applications, programs, or functions. For example, .bat is a file extension for a batch file, which is a script that contains a series of commands to be executed by the command-line interpreter. .avi is a file extension for an audio video interleave file, which is a multimedia container format that stores video and audio data. .rtf is a file extension for a rich text format file, which is a document format that supports text formatting, such as fonts, colors, and styles.

A consolidated group of files is a collection of files that are compressed or archived into a single file, usually to reduce the file size, save disk space, or facilitate file transfer. A consolidated group of files can be created or extracted by using a compression or archiving software, such as WinRAR, 7-Zip, or WinZip. One of the most common file extensions for a consolidated group of files is .rar, which stands for Roshal Archive. .rar is a proprietary file format that supports data compression, error recovery, encryption, and splitting.For example, in the following image1, a folder named Documents contains four files: resume.docx, report.pdf, budget.xlsx, and presentation.pptx. The folder is compressed into a single file named Documents.rar, which has a smaller file size and can be easily attached to an email or uploaded to a cloud storage.

Therefore, the correct answer is C. .rar, as it is the file extension that is used for a consolidated group of files.

CompTIA IT Fundamentals+ (ITF+) Certification Exam Objectives, page 15, section 3.5

CompTIA IT Fundamentals+ (ITF+) Study Guide, page 191, section 7.4

CompTIA IT Fundamentals+ (ITF+) All-in-One Exam Guide, Second Edition, page 287, chapter 8

Using File Systems | CompTIA IT Fundamentals+ (FC0-U61) | Part 25 of 38

Which of the following notational systems uses the most characters to represent the decimal number 10?

A.
Octal
A.
Octal
Answers
B.
Hexadecimal
B.
Hexadecimal
Answers
C.
Decimal
C.
Decimal
Answers
D.
Binary
D.
Binary
Answers
Suggested answer: D

Explanation:

A notational system is a way of writing numbers using symbols or digits. The base or radix of a notational system is the number of symbols or digits it uses to represent numbers. For example, the decimal system uses 10 symbols (0 to 9) and has a base of 10. The octal system uses 8 symbols (0 to 7) and has a base of 8. The hexadecimal system uses 16 symbols (0 to 9 and A to F) and has a base of 16. The binary system uses 2 symbols (0 and 1) and has a base of 2.

To represent the decimal number 10 in different notational systems, we need to convert it to the corresponding base. This can be done by dividing the number by the base repeatedly and writing the remainders in reverse order. For example:

To convert 10 to octal, we divide 10 by 8 and get a quotient of 1 and a remainder of 2. Then we divide 1 by 8 and get a quotient of 0 and a remainder of 1. The remainders in reverse order are 12, so 10 in octal is 12.

To convert 10 to hexadecimal, we divide 10 by 16 and get a quotient of 0 and a remainder of 10. The remainder is 10, which is represented by the symbol A in hexadecimal, so 10 in hexadecimal is A.

To convert 10 to binary, we divide 10 by 2 and get a quotient of 5 and a remainder of 0. Then we divide 5 by 2 and get a quotient of 2 and a remainder of 1. Then we divide 2 by 2 and get a quotient of 1 and a remainder of 0. Then we divide 1 by 2 and get a quotient of 0 and a remainder of 1. The remainders in reverse order are 1010, so 10 in binary is 1010.

The notational system that uses the most characters to represent the decimal number 10 is the binary system, which uses 4 characters (1010). The octal system uses 2 characters (12), the hexadecimal system uses 1 character (A), and the decimal system uses 2 characters (10).

A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

A.
Database
A.
Database
Answers
B.
Webserver
B.
Webserver
Answers
C.
File
C.
File
Answers
D.
Operating system
D.
Operating system
Answers
Suggested answer: C

Explanation:

A file backup is a type of backup that copies individual files or folders from a source to a destination. A file backup can be used to back up data on a network drive, as it allows the technician to select the specific files or folders that need to be backed up. A file backup can also be performed incrementally or differentially, which means that only the files that have changed since the last backup are copied, saving time and space. A file backup can be restored easily, as it does not require any special software or hardware to access the backed up files.

A database backup is a type of backup that copies the entire database or parts of it from a source to a destination. A database backup is used to back up data that is stored in a structured format, such as tables, records, and indexes. A database backup can be performed using the native tools of the database management system, such as SQL Server or Oracle, or using third-party software. A database backup can be restored using the same tools that performed the backup, and it may require some additional steps, such as restoring the transaction logs or applying the differential backups.

A webserver backup is a type of backup that copies the files and folders that are related to a webserver, such as HTML, CSS, JavaScript, PHP, images, and so on. A webserver backup is used to back up data that is used to host a website or a web application. A webserver backup can be performed using the file backup method, or using specialized software that can backup the webserver configuration, settings, and permissions. A webserver backup can be restored by copying the files and folders back to the webserver, or using the software that performed the backup.

An operating system backup is a type of backup that copies the entire operating system or parts of it from a source to a destination. An operating system backup is used to back up data that is essential for the functioning of the computer, such as the system files, the registry, the drivers, the applications, and the user settings. An operating system backup can be performed using the native tools of the operating system, such as Windows Backup or Time Machine, or using third-party software. An operating system backup can be restored by booting from a recovery media, such as a CD, DVD, or USB, or using the software that performed the backup.

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

A.
2.4GHz
A.
2.4GHz
Answers
B.
5GHz
B.
5GHz
Answers
C.
802.11b
C.
802.11b
Answers
D.
802.11g
D.
802.11g
Answers
Suggested answer: B

Explanation:

The 5GHz frequency band is less prone to interference from other household appliances, such as microwaves, cordless phones, and Bluetooth devices, than the 2.4GHz band. The 5GHz band also offers more non-overlapping channels and higher data rates than the 2.4GHz band. However, the 5GHz band has a shorter range and lower penetration than the 2.4GHz band, so the technician should consider the size and layout of the SOHO network before choosing the frequency band. 802.11b and 802.11g are wireless standards that operate in the 2.4GHz band, while 802.11a, 802.11n, and 802.11ac can operate in both the 2.4GHz and 5GHz bands.Reference:

Basic Wired/Wireless SOHO Network | CompTIA A+ 220-1001 | 2.3

Installing a SOHO Network -- CompTIA A+ 220-1001 -- 2.3

Installing and Configuring a SOHO Network - CompTIA A+ Complete: Review ...

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

A.
Wi-Fi
A.
Wi-Fi
Answers
B.
IR
B.
IR
Answers
C.
Bluetooth
C.
Bluetooth
Answers
D.
NFC
D.
NFC
Answers
Suggested answer: D

Explanation:

NFC (Near Field Communication) is a wireless technology that allows devices to communicate and exchange data within a short range, typically a few centimeters. NFC is commonly used for tap to pay transactions, where a customer can use a contactless card or a smart device (such as a smartphone or a smartwatch) to make payments by tapping or hovering over a compatible terminal. NFC is different from other wireless technologies, such as Wi-Fi, IR (Infrared), and Bluetooth, because it does not require pairing, authentication, or network access to work. NFC is also faster, more secure, and more convenient than other payment methods, such as inserting or swiping a card.Reference:CompTIA IT Fundamentals (ITF+) Certification Guide, page 25;What is Tap to Pay and How Does It Work?



Privacy expectations on a company intranet should be limited to:

A.
precedents.
A.
precedents.
Answers
B.
HR policy.
B.
HR policy.
Answers
C.
word of mouth.
C.
word of mouth.
Answers
D.
system usage agreements.
D.
system usage agreements.
Answers
Suggested answer: D

Explanation:

A system usage agreement is a document that defines the rules and expectations for using a company's IT resources, such as computers, networks, intranets, software, and data. A system usage agreement typically covers topics such as acceptable use, security, privacy, monitoring, ownership, and consequences of violations. A system usage agreement helps to protect the company's assets, reputation, and legal compliance, as well as the users' rights and responsibilities. Privacy expectations on a company intranet should be limited to what is stated in the system usage agreement, as the company has the right and the duty to monitor and control the intranet for business purposes. Users should not assume that their activities on the intranet are private or confidential, unless the system usage agreement explicitly guarantees such privacy. The other options, such as precedents, HR policy, and word of mouth, are not reliable or consistent sources of privacy expectations, as they may vary, change, or conflict with the system usage agreement or the law.Reference:CompTIA IT Fundamentals (ITF+) Certification Guide, page 100;10 Intranet Best Practices for a Successful Intranet in 2021, point 7.

A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?

A.
Mobile phone
A.
Mobile phone
Answers
B.
Mouse
B.
Mouse
Answers
C.
Scanner
C.
Scanner
Answers
D.
External hard drive
D.
External hard drive
Answers
Suggested answer: A

Explanation:

A mobile phone is the most likely device that is causing this message, because it can be plugged into a USB port for charging or data transfer, and then unplugged when the user leaves the workstation. A mobile phone may also not be detected by the file audits, as it may not have any files stored on the workstation or may use encryption or password protection. A mouse, a scanner, and an external hard drive are less likely to be plugged and unplugged frequently, and they would also leave traces of their presence in the file audits or device manager.Reference:CompTIA IT Fundamentals+ FC0-U61 Cert Guide, Chapter 3: Device Ports and Peripherals, page 77;CompTIA IT Fundamentals+ (Exam FC0-U61) Module 4 / Unit 2 / Connecting to a Network, page 6;How to identify USB Ports in Device Manager?

Total 425 questions
Go to page: of 43