Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

FC0-U61 Questions and Answers

Question # 6

A programmer uses DML to modify:

A.

files

B.

permissions

C.

data

D.

backups

Full Access
Question # 7

Which of the following statements BEST describes binary?

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Full Access
Question # 8

Which of the following is an advantage of a fiat file?

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Full Access
Question # 9

Which of the following is an example of an interpreted language?

A.

C++

B.

Java

C.

Python

D.

Go

Full Access
Question # 10

A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?

A.

2.5MHz

B.

2.5Tbps

C.

2.5GB

D.

2.5GHz

Full Access
Question # 11

Multiple users need to access the same data simultaneously. Which of the following is the best place to store the data?

A.

Database

B.

Spreadsheet

C.

Text file

D.

Word processing document

Full Access
Question # 12

Which of the following internet service types is most susceptible to weather disruptions?

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Full Access
Question # 13

Which of the following are the basic computing operations?

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Full Access
Question # 14

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Full Access
Question # 15

Which of the following contains exactly four copper wires?

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Full Access
Question # 16

A company is concerned with ensuring its databases are highly available. Which of the following can be used to

increase database availability?

A.

Backups

B.

Prioritization

C.

Indexes

D.

Failover

Full Access
Question # 17

Which of the following is a wireless communication that requires devices to be within 6in of each other to

transfer information?

A.

Infrared

B.

NFC

C.

Bluetooth

D.

WiFi

Full Access
Question # 18

A database administrator has created a primary table and must ensure the date column in the table only accepts date values. Which of the following does the administrator need to set?

A.

Schema

B.

Primary key

C.

Constrain!

D.

Permissions

Full Access
Question # 19

Which of the following data types would be best for storing data representing a phone number?

A.

String

B.

Integer

C.

Float

D.

Char

Full Access
Question # 20

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

A.

Workstation

B.

Laptop

C.

Cellphone

D.

Thin client

Full Access
Question # 21

Which of the following commands would most likely be used to add data to an existing database table?

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Full Access
Question # 22

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

A.

NFC

B.

Infrared

C.

Wi-Fi

D.

Bluetooth

Full Access
Question # 23

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?

A.

Variable

B.

Attribute

C.

Method

D.

Looping

Full Access
Question # 24

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

A.

Open

B.

WEP

C.

WPA

D.

WPA2

Full Access
Question # 25

A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator most likely choose for the project?

A.

USB flash drive

B.

Solid-state drive

C.

Tape drive

D.

Hard disk

Full Access
Question # 26

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Full Access
Question # 27

Which of the following database concepts would MOST likely use a CSV file?

A.

Data querying

B.

Data reports

C.

Data importing

D.

Data persistence

Full Access
Question # 28

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Full Access
Question # 29

Which of the following programming languages would most likely include tables and the select command?

A.

Compiled

B.

Markup

C.

Query

D.

Scripting

Full Access
Question # 30

Which of the following interfaces is best for viewing database performance information?

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Full Access
Question # 31

Which of the following filesystems is compatible with the greatest number of operating systems?

A.

ext4

B.

FAT32

C.

NTFS

D.

HFS

Full Access
Question # 32

A user connects a wireless router to a home network and notices another wireless access point uses the same name. Which of the following should the user change?

A.

Router default password

B.

Wireless channel

C.

Frequency

D.

Service set identifier

Full Access
Question # 33

Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?

A.

RAM

B.

NIC

C.

GPU

D.

CPU

Full Access
Question # 34

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Full Access
Question # 35

During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?

A.

Instant messaging

B.

Mobile applications

C.

Social media

D.

Video-sharing website

Full Access
Question # 36

Which of the following would a company consider an asset?

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Full Access
Question # 37

Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?

A.

Disk

B.

Email

C.

VPN

D.

HTTPS

Full Access
Question # 38

After creating a database, which of the following would a developer most likely use to put data in the database?

A.

UPDATE

B.

ALTER

C.

INSERT

D.

SELECT

Full Access
Question # 39

A technician is investigating the who, what, when, where, and why of an issue. Which of the following steps of the troubleshooting methodology is the technician currently at?

A.

Identifying the problem

B.

Establishing a plan of action to resolve the issue

C.

Researching the issue

D.

Testing the theory to determine the cause

Full Access
Question # 40

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently

released new device. After configuring the new device utilizing the old SSID and key, some light switches are

no longer communicating. Which of the following is the MOST likely cause?

A.

The light switches do not support WPA2.

B.

The router is operating on a different channel.

C.

The key does not meet password complexity requirements.

D.

The SSID is not being broadcast.

Full Access
Question # 41

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Full Access
Question # 42

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Full Access
Question # 43

A UPS provides protection against:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Full Access
Question # 44

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Full Access
Question # 45

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A.

Proprietary software

B.

Commercial software

C.

Open-source software

D.

Cross-platform software

Full Access
Question # 46

Which of the following should a technician do to fix stability issues on a workstation?

A.

Install a malicious software analyzer.

B.

Install a firewall.

C.

Install browsing controls.

D.

Install updates.

Full Access
Question # 47

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

A.

127.0.0.1

B.

172.16.2.189

C.

192.168.257.1

D.

255.255.255.0

Full Access
Question # 48

Which of the following is an advantage of using locally saved files?

A.

Readily shareable with others

B.

No reliance on local backups

C.

Immediately accessible by others on the cloud

D.

No dependence on network connection

Full Access
Question # 49

Which of the following storage types is MOST vulnerable to magnetic damage?

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Full Access
Question # 50

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

A.

Turn on private browsing

B.

Delete browsing history on program close.

C.

Notify when downloads are complete.

D.

Configure prompting before downloading content.

Full Access
Question # 51

A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?

A.

Variable

B.

Vector

C.

Constant

D.

Array

Full Access
Question # 52

Which of the following business continuity concepts is the best example of fault tolerance?

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Full Access
Question # 53

Which of the following backup types is most likely to allow restoration of a fully bootable computer on new hardware?

A.

File-level backups

B.

Critical data backups

C.

System backups

D.

Database backups

Full Access
Question # 54

Which of the following is an example of structured data?

A.

Video recordings

B.

Social media posts

C.

Photographs

D.

Phone numbers

Full Access
Question # 55

Which of the following violates password best practices?

A.

Password reuse across sites

B.

Password history

C.

Password expiration

D.

Password complexity

Full Access
Question # 56

Which of the following security concerns is a threat to confidentiality?

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Full Access
Question # 57

Which of the following is a characteristic of both a database and a flat file?

A.

Concurrent users

B.

Persistence

C.

Queries

D.

Data definition

Full Access
Question # 58

A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?

A.

LAN-hosted

B.

Local server-hosted

C.

Locally installed

D.

Cloud-hosted

Full Access
Question # 59

A building has two legacy APs. A new AP was recently installed within 30ft (9m) of the legacy APs. Multiple users have been reporting intermittent internet connectivity since the new AP was installed. Which of the following explains what is happening?

A.

WEP is enabled.

B.

There are inference and attenuation factors.

C.

There are speed limitations.

D.

The passwords are not synced.

Full Access
Question # 60

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Full Access
Question # 61

Which of the following is considered a traditional input and output device?

A.

Printer

B.

Hard drive

C.

Keyboard

D.

Display monitor

Full Access
Question # 62

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Full Access
Question # 63

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Full Access
Question # 64

In an effort to reduce costs, a company decides not to renew its contract for a secure shredding service. Which of the following risks should the management team most likely be concerned with if employees fail to properly dispose of documents according to security protocols?

A.

Dumpster diving

B.

Snooping

C.

Unauthorized information alteration

D.

Social engineering

Full Access
Question # 65

Which of the following is the exact number of bytes in a gigabyte?

A.

1,024 bytes

B.

1,048,576 bytes

C.

1,073,741,824 bytes

D.

1,099,511,627,776 bytes

Full Access
Question # 66

Which of the following storage types presents the most likely security risk?

A.

Flash

B.

NAS

C.

SSD

D.

Cloud

Full Access
Question # 67

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Full Access
Question # 68

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

A.

10

B.

14

C.

15

D.

17

Full Access
Question # 69

Which of the following best describes when lo use an array?

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Full Access
Question # 70

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

A.

Concurrency

B.

Speed

C.

Scalability

D.

Variety

Full Access
Question # 71

Which of the following is required to view videos stored on a DVD?

A.

Solid-state drive

B.

Flash drive

C.

Hard drive

D.

Optical drive

Full Access
Question # 72

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Full Access
Question # 73

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

A.

Password manager

B.

Password reuse

C.

Password history

D.

Password reset

Full Access
Question # 74

A function is BEST used for enabling programs to:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Full Access
Question # 75

Which of the following should privacy expectations on a company intranet be limited to?

A.

Precedents

B.

HR policy

C.

Word of mouth

D.

System usage agreements

Full Access
Question # 76

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Full Access
Question # 77

Which of the following is most appropriate to list on a social media site about an employer?

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Full Access
Question # 78

Which of the following availability concerns is mitigated by having a business continuity site?

A.

Service outage

B.

Wiretapping

C.

Eavesdropping

D.

Replay attack

Full Access
Question # 79

A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?

A.

Update the device software.

B.

Enable passwords.

C.

Enable host IDS.

D.

Remove browser cookies.

Full Access
Question # 80

Which of the following is an example of a query language?

A.

C++

B.

Python

C.

XML

D.

SQL

Full Access
Question # 81

An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?

A.

Flat file

B.

Document

C.

Database

D.

Spreadsheet

Full Access
Question # 82

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Full Access
Question # 83

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Full Access
Question # 84

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Full Access
Question # 85

Which of the following is the least expensive way for users at a large company to load a 2GB spreadsheet quickly?

A.

Buy faster networking switches.

B.

Upgrade the operating system and applications.

C.

Move the file to a shared database.

D.

Add more RAM to each workstation.

Full Access
Question # 86

Which of the following is a logical structure for storing files?

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Full Access
Question # 87

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Full Access
Question # 88

Which of the following is primarily a confidentiality concern?

A.

Eavesdropping

B.

Impersonating

C.

Destructing

D.

Altering

Full Access
Question # 89

A technician has successfully verified full system functionality after implementing the solution to a problem.

Which of the following is the NEXT troubleshooting step the technician should do?

A.

Determine if anything has changed.

B.

Document lessons learned.

C.

Establish a theory of probable cause.

D.

Duplicate the problem, if possible.

Full Access
Question # 90

On which of the following distinct numbers of digits is the hexadecimal numbering system based?

A.

2

B.

8

C.

10

D.

16

Full Access
Question # 91

Which of the following is MOST likely used to represent international text data?

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Full Access
Question # 92

A programmer is tasked with providing a human-readable rough draft of output. Which of the following techniques would be used?

A.

Flowchart

B.

Pseudocode

C.

Sequencing

D.

Network diagram

Full Access
Question # 93

A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?

A.

Private browsing

B.

Pop-up blockers

C.

Bookmarks

D.

Accessibility

Full Access
Question # 94

A user is trying to set up a new wireless access point. Which of the following should the user do first?

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Full Access
Question # 95

Which of the following best practices can be used to mitigate password reuse?

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Full Access
Question # 96

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.

Which of the following is the most likely cause?

A.

Firewall settings

B.

Improper switch configuration

C.

Incorrect IP address

D.

Misconfigured access point

Full Access
Question # 97

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Full Access
Question # 98

Which of the following defines a reusable value that can be reassigned?

A.

Method

B.

Variable

C.

Constant

D.

Function

Full Access
Question # 99

A small company wants to set up a server that is accessible from the company network as well as the Internet.

Which of the following is MOST important to determine before allowing employees to access the server

remotely?

A.

The quality of the computer used to connect

B.

A security method of allowing connections

C.

The employees’ home ISP speeds

D.

The geographical location of the employees

Full Access
Question # 100

A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?

A.

RJ11

B.

RJ45

C.

USB

D.

Bluetooth

Full Access
Question # 101

Which of the following describes a unique entry to a data set?

A.

Schema

B.

Record

C.

Column

D.

Index

Full Access
Question # 102

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

A.

Integer

B.

Float

C.

Double

D.

String

Full Access
Question # 103

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Full Access