Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
FC0-U61
Free trial
Verified
Question 26
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
- A: Data capture and collections
- B: Asset inventory inputs
- C: Sales statistics
- D: Average loss output
Question 27
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
- A: Local application
- B: Intranet application
- C: Extranet application
- D: Internet application
Question 28
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
- A: Printer
- B: Mouse
- C: Webcam
- D: External hard drive
- E: Speakers
- F: Display
Question 29
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
- A: POP3
- B: IMAP
- C: ICMP
- D: SMTP
Question 30
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
- A: Ensure both devices are connected to the LAN.
- B: Enable task scheduling.
- C: Reset the proxy settings to their default values.
- D: Review the fault tolerance configurations.
Question 31
Which of the following storage types is MOST vulnerable to magnetic damage?
- A: Flash
- B: SSD
- C: Optical
- D: HDD
Question 32
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
- A: Method
- B: Object
- C: Property
- D: Attribute
Question 33
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
- A: The light switches do not support WPA2.
- B: The router is operating on a different channel.
- C: The key does not meet password complexity requirements.
- D: The SSID is not being broadcast.
Question 34
Given the following pseudocode:
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
- A: 10
- B: 14
- C: 15
- D: 17
Question 35
Which of the following are the primary functions of an operating system? (Choose two.)
- A: Provide structure for file and data management.
- B: Provide protection against malware and viruses.
- C: Provide peer-to-peer networking capability.
- D: Provide user data encryption.
- E: Provide virtual desktop capability.
- F: Provide system resources.
Question 36
SQL databases use primary and foreign keys to enable which of the following?
- A: Rows
- B: Fields
- C: Schemas
- D: Relationships
Question 37
Which of the following is a logical structure for storing files?
- A: Folder
- B: Extension
- C: Permissions
- D: Shortcut
Question 38
Which of the following is both an input and output device?
- A: Microphone
- B: Speaker
- C: Touch-screen monitor
- D: Keyboard
Question 39
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?
- A: Determine if anything has changed.
- B: Document lessons learned.
- C: Establish a theory of probable cause.
- D: Duplicate the problem, if possible.
Question 40
Which of the following relational database constructs is used to ensure valid values are entered for a column?
- A: Schema
- B: Permissions
- C: Constraint
- D: Column
Question 41
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
- A: Password history
- B: Password reuse
- C: Password expiration
- D: Password age
Question 42
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
- A: Antivirus
- B: Anti-malware
- C: Device Manager
- D: Host firewall
Question 43
Which of the following contains exactly four copper wires?
- A: RJ45
- B: VGA
- C: RJ11
- D: USB
Question 44
Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?
- A: Behavior security
- B: Information Identity Management
- C: Unauthorized hacking
- D: Authorized hacking
Question 45
A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?
- A: Input validation
- B: System updates
- C: Password lockout
- D: Login auditing
Question 46
Which of the following is the number of bytes that is in 2KB?
- A: 1024
- B: 2048
- C: 20000
- D: 1048576
Question 47
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
- A: Encryption
- B: Compression
- C: Permissions
- D: Auditing
Question 48
A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?
- A: Change the SSID.
- B: Change the default password.
- C: Change to WEP security.
- D: Create a guest network.
Question 49
A technician has worked through all steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT?
- A: Escalate as necessary.
- B: Confirm the root cause.
- C: Establish a new theory.
- D: Gather information.
Question 50
A network has been infected with a worm. Which of the following would be the BEST security measures to take? (Choose two.)
- A: Update the IPS signatures.
- B: Update the network firewall.
- C: Update the malware definitions.
- D: Quarantine the network.
- E: Reset the network router.
- F: Contact the ISP.
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!