FC0-U61
Free trial
Verified
Question 1
Which of the following is primarily a confidentiality concern?
- A: Eavesdropping
- B: Impersonating
- C: Destructing
- D: Altering
Question 2
Which of the following BEST describes an application running on a typical operating system?
- A: Process
- B: Thread
- C: Function
- D: Task
Question 3
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user's needs?
- A: T1 line
- B: Satellite
- C: Fiber optic
- D: DSL
Question 4
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
- A: Disk
- B: Email
- C: VPN
- D: HTTPS
Question 5
A technician overhears a systems administrator mention the term IOPS. To which of the following operating system functions would the term BEST apply?
- A: Disk management
- B: Process management
- C: Application management
- D: Service management
Question 6
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
- A: Array
- B: Vector
- C: List
- D: String
Question 7
Which of the following would MOST likely use an ARM processor?
- A: Laptop
- B: Tablet
- C: Workstation
- D: Server
Question 8
Which of the following would indicate the FASTEST processor speed?
- A: 3.6GHz
- B: 3.6MHz
- C: 3.6Mbps
- D: 3.6Gbps
Question 9
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
- A: Cable modem
- B: Wireless router
- C: Access point
- D: Network switch
Question 10
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
- A: Update from 802.11b to 802.11g.
- B: Ensure sources of EMI are removed.
- C: Enable WPA2-Enterprise.
- D: Use WiFi Protected Setup.
Question 11
The computer language that is closest to machine code is:
- A: query language
- B: scripting language
- C: markup language
- D: assembly language
Question 12
Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?
- A: Record
- B: Report
- C: Column
- D: Procedure
Question 13
Which of the following is an example of an interpreted language?
- A: C++
- B: Java
- C: Python
- D: Go
Question 14
An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
- A: Script blocker
- B: Proxy settings
- C: Private browsing
- D: Full browser cache
Question 15
Which of the following filesystems would a Linux computer MOST likely use?
- A: HFS
- B: NTFS
- C: FAT32
- D: ext4
Question 16
Which of the following concerns does installing cross-platform software address?
- A: Subscription
- B: Licensing
- C: Product key
- D: Compatibility
Question 17
Which of the following requires the MOST frequent updating to remain effective?
- A: Antivirus
- B: Host firewall
- C: Web browser
- D: Device drivers
Question 18
Which of the following BEST explains the use of float over integer to store monetary values?
- A: It accepts negative values.
- B: It stores symbols
- C: It accommodates larger values.
- D: It supports decimals.
Question 19
An IP address is 32 bits long. If converted to bytes, it would be:
- A: 4 bytes
- B: 8 bytes
- C: 16 bytes
- D: 64 bytes
Question 20
Which of the following BEST describes the purpose of a vector in programming?
- A: Storing a collection of data
- B: Repeating a similar operation
- C: Capturing user input
- D: Performing mathematical calculations
Question 21
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
- A: Establish a plan of action.
- B: Gather information
- C: Duplicate the problem.
- D: Find the root cause.
Question 22
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
- A: Open
- B: WEP
- C: WPA
- D: WPA2
Question 23
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
- A: Text file on a shared drive
- B: Managed relational database
- C: Informational intranet page
- D: Locally installed productivity software
Question 24
A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
- A: One-tier
- B: Two-tier
- C: Three-tier
- D: n-tier
Question 25
A global variable called age will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
- A: Integer
- B: Float
- C: Double
- D: String
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!