ExamGecko
Home / CompTIA / FC0-U61 / List of questions
Ask Question

CompTIA FC0-U61 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

Flat file
Flat file
Memory
Memory
Relational database
Relational database
Solid state drive
Solid state drive
Suggested answer: B
Explanation:

Memory is the component of a computer system that stores data temporarily for fast access bythe processor. Memory does not need to remain persistent, which means it does not retain data when the power is turned off. A programmer can use memory to store output in a placethat can be accessed as quickly as possible by the processor. Memory is also known as RAM(random access memory).Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide(FC0-U61), page 36.

asked 02/10/2024
MICHELE CRISTINA DOS FELIX
41 questions

Question 42

Report Export Collapse

Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?

Contract
Contract
Patent
Patent
Copyright
Copyright
Trademark
Trademark
Suggested answer: D
asked 02/10/2024
EMELINE LE QUENTREC
31 questions

Question 43

Report Export Collapse

Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

Infrared
Infrared
NFC
NFC
Bluetooth
Bluetooth
WiFi
WiFi
Suggested answer: B
asked 02/10/2024
Wessel Beulink
45 questions

Question 44

Report Export Collapse

The IT department has established a new password policy for employees. Specifically, the policy reads:

Passwords must not contain common dictionary words

Passwords must contain at least one special character.

Passwords must be different from the las six passwords used.

Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

Password lockout
Password lockout
Password complexity
Password complexity
Password expiration
Password expiration
Passwords history
Passwords history
Password length
Password length
Password age
Password age
Suggested answer: B, D
asked 02/10/2024
Michael Golo
26 questions

Question 45

Report Export Collapse

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer?

Email previewing
Email previewing
Patching
Patching
Clear browsing cache
Clear browsing cache
Kill process
Kill process
Suggested answer: B
asked 02/10/2024
Ziyad Karadsheh
35 questions

Question 46

Report Export Collapse

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?

Thunderbolt cable
Thunderbolt cable
Bluetooth module
Bluetooth module
Infrared port
Infrared port
WLAN card
WLAN card
Suggested answer: D
asked 02/10/2024
Balazs Jarmy
59 questions

Question 47

Report Export Collapse

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Password reuse
Password reuse
Snooping
Snooping
Social engineering
Social engineering
Phishing
Phishing
Suggested answer: A
asked 02/10/2024
Hoang Son
50 questions

Question 48

Report Export Collapse

A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?

WPA
WPA
SSID
SSID
WEP
WEP
WPA2
WPA2
Suggested answer: D
asked 02/10/2024
TRAORE Issa
41 questions

Question 49

Report Export Collapse

Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)

SMTP
SMTP
POP3
POP3
SNMP
SNMP
DHCP
DHCP
ICMP
ICMP
SFTP
SFTP
Suggested answer: A, B
asked 02/10/2024
Mounir Mrabet
47 questions

Question 50

Report Export Collapse

A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

UPDATE
UPDATE
DELETE
DELETE
ALTER
ALTER
DROP
DROP
Suggested answer: D
asked 02/10/2024
Gregory Destrebecq
37 questions
Total 425 questions
Go to page: of 43
Search