CompTIA FC0-U61 Practice Test - Questions Answers, Page 42
List of questions
Related questions
A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?
2.5MHz
2.5Tbps
2.5GB
2.5GHz
After a patch of an enterprise server, applications were unable to load. The server administrator was able to resolve the issue. Which of the following is the next step the administrator should take?
Test the theory to determine the cause.
Document findings, actions, and outcomes.
Establish a plan of action.
Verify full system functionality.
Which of the following components is most likely to have a dedicated, active cooling method to prevent it from overheating during operation?
Hard drive
Network interface card
Processor
Memory
A user is selecting software to visually display information in a marketing meeting. Which of the following software types should the user select?
Spreadsheet
Word processing
Web browsing
Presentation
Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?
Host-based firewall
Antivirus
Patching
Network-based firewall
Which of the following is a reason for using a UPS?
To help with posture
To clean power
To prevent viruses
To lessen eye strain
A user opens an application that is installed locally on a PC. The application connects directly to a database that is located on a server in a data closet in the same building. Which of the following application architecture models does this describe?
One tier
Two tier
Three tier
Four tier
After purchasing a flash drive, the buyer notices that the packaging had already been opened. Which of the following is this is an example of?
Confidentiality
Availability
Integrity
Non-repudiation
Which of the following is the best reason to implement a software token instead of a hardware token?
A software token can be set to a permanent number that never changes.
A software token can be encrypted.
A software token is more cost efficient than a hardware token.
A software token cannot be lost.
On which of the following distinct numbers of digits is the hexadecimal numbering system based?
2
8
10
16
Question