For the rest of CompTia Fundamentals FC0-U61 exam questions. Please follow us on the CompTia Fundamentals FC0-U61 Actual Exam Version.
QUESTION NO: 41. A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
A. Flat file
C. Relational database
D. Solid state drive
QUESTION NO: 42. Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
QUESTION NO: 43. Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
QUESTION NO: 44. The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the last six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Choose two.)
A. Password lockout
B. Password complexity
C. Password expiration
D. Passwords history
E. Password length
F. Password age
QUESTION NO: 45. Which of the following would MOST likely prevent malware sent as a compromised file via email from infecting a person’s computer?
A. Email previewing
C. Clear browsing cache
D. Kill process
QUESTION NO: 46. A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?
A. Thunderbolt cable
B. Bluetooth module
C. Infrared port
D. WLAN card
QUESTION NO: 47. Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
A. Password reuse
C. Social engineering
QUESTION NO: 48. A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?
QUESTION NO: 49. Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Choose two.)
QUESTION NO: 50. A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
QUESTION NO: 51. A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
QUESTION NO: 52. Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
QUESTION NO: 53. Which of the following is MOST likely used to represent international text data?
QUESTION NO: 54. For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
D. fault tolerance.
QUESTION NO: 55. Which of the following operating systems do not require extensions on files to execute a program? (Choose two.)
A. Windows 7
B. Windows 8
D. Windows Server 2012
QUESTION NO: 56. A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
QUESTION NO: 57. Which of the following is an example of multifactor authentication?
A. Password and passphrase
B. Fingerprint and retina scan
C. Hardware token and smartphone
D. Smart card and PIN
QUESTION NO: 58. Which of the following language types would a web developer MOST likely use to create a website?
QUESTION NO: 59. A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
QUESTION NO: 60. A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two.)