CompTIA IT Fundamentals v1.0 (FC0-U61)

Page:    1 / 5   
Total 75 questions

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?

  • A. Thunderbolt cable
  • B. Bluetooth module
  • C. Infrared port
  • D. WLAN card

Answer : D

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

  • A. Password reuse
  • B. Snooping
  • C. Social engineering
  • D. Phishing

Answer : A

A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?

  • A. WPA
  • B. SSID
  • C. WEP
  • D. WPA2

Answer : D

Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)

  • A. SMTP
  • B. POP3
  • C. SNMP
  • D. DHCP
  • E. ICMP
  • F. SFTP

Answer : AB

A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

  • C. ALTER
  • D. DROP

Answer : D

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

  • A. USB
  • B. NFC
  • C. DSL
  • D. DVI

Answer : D

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

  • A. Fiber
  • B. DSL
  • C. Cable
  • D. Satellite

Answer : D

Which of the following is MOST likely used to represent international text data?

  • A. ASCII
  • B. Octal
  • C. Hexadecimal
  • D. Unicode

Answer : D

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

  • A. redundancy.
  • B. replication.
  • C. prioritization.
  • D. fault tolerance.

Answer : C

Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).

  • A. Windows 7
  • B. Windows 8
  • C. UNIX
  • D. Windows Server 2012
  • E. Android
  • F. Linux

Answer : CF

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

  • A. 802.11a
  • B. 802.11b
  • C. 802.11g
  • D. 802.11n

Answer : B

Which of the following is an example of multifactor authentication?

  • A. Password and passphrase
  • B. Fingerprint and retina scan
  • C. Hardware token and smartphone
  • D. Smart card and PIN

Answer : D

Which of the following language types would a web developer MOST likely use to create a website?

  • A. Interpreted
  • B. Query
  • C. Compiled
  • D. Assembly

Answer : A

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems.
Which of the following is being developed?

  • A. Algorithm
  • B. Software
  • C. Pseudocode
  • D. Flowchart

Answer : A

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

  • A. Patent
  • B. Copyright
  • C. NDA
  • D. Trademark
  • E. EULA

Answer : BD

Page:    1 / 5   
Total 75 questions