ExamGecko
Home Home / CompTIA / FC0-U61

CompTIA FC0-U61 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

A.
Rule-based access control
A.
Rule-based access control
Answers
B.
Mandatory access control
B.
Mandatory access control
Answers
C.
Role-based access control
C.
Role-based access control
Answers
D.
Discretionary access control
D.
Discretionary access control
Answers
Suggested answer: C

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

A.
Input
A.
Input
Answers
B.
Output
B.
Output
Answers
C.
Storage
C.
Storage
Answers
D.
Processing
D.
Processing
Answers
Suggested answer: D

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?

A.
Group license
A.
Group license
Answers
B.
Concurrent license
B.
Concurrent license
Answers
C.
Subscription license
C.
Subscription license
Answers
D.
Open-source license
D.
Open-source license
Answers
Suggested answer: B

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

A.
Proxy server
A.
Proxy server
Answers
B.
Browser add-on
B.
Browser add-on
Answers
C.
Corrupted cache
C.
Corrupted cache
Answers
D.
Script blocker
D.
Script blocker
Answers
Suggested answer: C

Explanation:

A corrupted cache is the most likely cause of the problem of seeing outdated information on awebsite. A cache is a temporary storage area that stores copies of frequently accessed data,such as web pages, images, or files. A cache can improve the performance and speed of dataretrieval by reducing the need to access the original source. However, sometimes a cache maybecome corrupted or outdated, which may cause errors or inconsistencies in displaying thedata. A corrupted cache may show old or incorrect information on a website instead of thecurrent or updated information. To fix this problem, the user can clear the browser cache andreload the website.Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 202.

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization's datacenter?

A.
Private
A.
Private
Answers
B.
Traditional
B.
Traditional
Answers
C.
Public
C.
Public
Answers
D.
Cloud
D.
Cloud
Answers
Suggested answer: B

Explanation:

Traditional is the application delivery mechanism that best describes infrastructure located inan individual organization's datacenter. Traditional application delivery is a method ofdeploying and running software applications on physical servers or hardware that are ownedand managed by the organization itself. Traditional application delivery requires theorganization to purchase, install, configure, maintain, and secure the infrastructure andresources needed to support the applications. Traditional application delivery offers morecontrol and customization over the applications, but it also involves more cost andcomplexity.Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61),page 144

A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?

A.
EXPORT
A.
EXPORT
Answers
B.
IMPORT
B.
IMPORT
Answers
C.
SELECT
C.
SELECT
Answers
D.
ALTER
D.
ALTER
Answers
Suggested answer: B

Which of the following would a company consider an asset?

A.
An external company used to destroy defective hard drives
A.
An external company used to destroy defective hard drives
Answers
B.
Information residing on backup tapes
B.
Information residing on backup tapes
Answers
C.
A company-sponsored technology conference
C.
A company-sponsored technology conference
Answers
D.
A certified third-party vendor that provides critical components
D.
A certified third-party vendor that provides critical components
Answers
Suggested answer: B

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

A.
Written procedure
A.
Written procedure
Answers
B.
Written policy
B.
Written policy
Answers
C.
Written email
C.
Written email
Answers
D.
Written memo
D.
Written memo
Answers
Suggested answer: B

Explanation:

A written policy is the best way for a company to document a change that allows staff to workfrom home by means of formal request. A policy is a statement or guideline that defines therules, standards, or procedures for an organization's actions, decisions, or behaviors. A policycan help an organization to achieve its objectives, comply with regulations, ensure consistencyand quality, and communicate expectations and responsibilities. A written policy is a policy thatis documented in a formal document that can be distributed, reviewed, updated, and enforcedby the organization. A written policy can help a company to document a change that affects itsstaff, such as working from home, by specifying the criteria, process, benefits, limitations, andconsequences of the change.Reference: The Official CompTIA IT Fundamentals (ITF+) StudyGuide (FC0-U61), page 210.

A company's team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

A.
USB
A.
USB
Answers
B.
HDMI
B.
HDMI
Answers
C.
FireWire
C.
FireWire
Answers
D.
VGA
D.
VGA
Answers
E.
Bluetooth
E.
Bluetooth
Answers
F.
RJ45
F.
RJ45
Answers
Suggested answer: B, D

A programmer uses DML to modify:

A.
files
A.
files
Answers
B.
permissions
B.
permissions
Answers
C.
data
C.
data
Answers
D.
backups
D.
backups
Answers
Suggested answer: C
Total 425 questions
Go to page: of 43