FC0-U61 Flashcards
Which of the following is primarily a confidentiality concern?
A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering
Eavesdropping
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use the BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright
Copyright
Which of the following database concepts would MOST likely use a CSV file?
A. Data querying
B. Data reports
C. Data importing
D. Data persistence
Data reports
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
Check Knowledge Base
Which of the following BEST describes the practice of providing user credentials when logging onto the network?
A. Output
B. Storage
C. Input
D. Processing
Input
Which of the following allows wireless devices to communicate to a wired network?
A. Modem
B. Switch
C. Firewall
D. Access point
Access point
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
A. Laptop
B. Workstation
C. Mobile phone
D. Server
Server
Which of the following describes something in a database that refers to the unique identifier in the parent table?
A. Attribute
B. Constraint
C. Foreign key
D. Schema
Attribute
For which of the following is a relational database management system MOST commonly used?
A. Building flowcharts
B. Storing information
C. Generating reports
D. Creating diagrams
Storing information
Which of the following BEST describes an application running on a typical operating system?
A. Process
B. Thread
C. Function
D. Task
Process
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
A. Update from 802.11b to 802.11g
B. Ensure sources of EMI are removed
C. Enable WPA2-Enterprise
D. Use WiFi Protected Setup
Ensure sources of EMI are removed
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
A. Establish a plan of action
B. Gather information
C. Duplicate the problem
D. Find the root cause
Duplicate the problem
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
A. Ensure both devices are connected to the LAN
B. Enable task scheduling
C. Reset the proxy settings to their default values
D. Review the fault tolerance configurations
Ensure both devices are connected to the LAN
Which of the following relational database constructs is used to ensure valid values are entered for a column?
A. Schema
B. Permissions
C. Constraint
D. Column
Constraint
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
A. Encryption
B. Compression
C. Permissions
D. Auditing
Encryption
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A. a storage area network
B. an embedded OS
C. network attached storage
D. a Type 1 hypervisor
a Type 1 hypervisor
Which of the following is a compiled language?
A. Perl
B. JScript
C. Java
D. PowerShell
Java
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
A. Document the solution and cause
B. Create a new theory of cause
C. Research the problem online
D. Implement preventive measures
Document the solution and cause
Which of the following is a value that uniquely identifies a database record?
A. Foreign key
B. Public key
C. Primary key
D. Private key
Primary key
A systems adminstrator wants to return results for a time range within a database. Which of the following commands should the adminstrator use?
A. SELECT
B. INSERT
C. DELETE
D. UPDATE
SELECT
Which of the following statements BEST desribes binary?
A. A notational system used to represent an “on” or “off’ state
B. A notational system used to represent media access control
C. A notational system used to represent Internet protocol addressing
D. A notational system used to represent a storage unit of measurement
A notational system used to represent an “on” or “off’ state
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
A. Loop
B. Variable
C. Constant
D. Function
Variable
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
A. Restart the computer
B. Contact other users
C. Disconnect the peripherals
D. Document the findings
Document the findings
A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?
A. Non-repudiation
B. Authentication
C. Integrity
D. Accounting
Authentication
Which of the following is an advantage of installing an application to the cloud?
A. Data is not stored locally
B. Support is not required
C. Service is not required
D. Internet access is not required
Data is not stored locally
A small company wants to set up a server that is accessible from a company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?
A. The quality of the computer used to connect
B. A security method of allowing
C. The employee’s home ISP speeds
D. The geographical location of the employees
A security method of allowing
A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?
A. Variable
B. If
C. Datatype
D. Comment
If
A UPS provides protection against:
A. denial of service
B. replay attack
C. power outages
D. wiretapping
power outages
A company executive wants to view a company training videos from a DVD. Which of the following components would accomplish this task?
A. Optical drive
B. Hard disk drive
C. Solid state drive
D. Flash drive
Optical drive