CompTIA FC0-U61 Practice Test - Questions Answers, Page 5

List of questions
Question 41

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
Memory is the component of a computer system that stores data temporarily for fast access bythe processor. Memory does not need to remain persistent, which means it does not retain data when the power is turned off. A programmer can use memory to store output in a placethat can be accessed as quickly as possible by the processor. Memory is also known as RAM(random access memory).Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide(FC0-U61), page 36.
Question 42

Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
Question 43

Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
Question 44

The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Select TWO).
Question 45

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer?
Question 46

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?
Question 47

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
Question 48

A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?
Question 49

Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
Question 50

A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
Question