An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?
Which of the following concerns does installing cross-platform software address?
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
Which of the following is MOST likely used to represent international text data?
Which of the following should privacy expectations on a company intranet be limited to?
Which of the following allows network traffic to pass through it and filters specific packets?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating
system functions would the term BEST apply?
A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?
A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?
Which of the following is the least expensive way for users at a large company to load a 2GB spreadsheet quickly?
Which of the following BEST describes an application running on a typical operating system?
An administrator is preparing a workstation for deployment. Which of the following is the first step the administrator should take in this process?
Which of the following OS features would be best to use to remove unnecessary programs?
Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?
After a patch of an enterprise server, applications were unable to load. The server administrator was able to resolve the issue. Which of the following is the next step the administrator should take?
In which of the following situations should there be come expectation of privacy?
Which of the following would be best to use to store a project task list that will be updated by multiple team members?
Which of the following is most likely to disclose the data collection practices of an application?
A user needs an interface that supports both video and data. Which of the following will meet this requirement?
A company is looking at locations for a new datacenter. The Chief Executive Officer (CEO) has stated that the new datacenter should be at least 500mi (805km) from the existing datacenter so one natural disaster will be unlikely to impact both datacenters. Which of the following is this best an example of?
A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?
Which of the following is most likely managed directly by the operating system?
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
Which of the following would work BEST stored as a flat file rather than stored in a database?
Which of the following is an advantage of installing an application to the cloud?
A user is trying to set up a new wireless access point. Which of the following should the user do first?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
Which of the following relational database constructs is used to ensure valid values are entered for a column?
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the
following would be the BEST choice to accomplish this task?
of the following would most likely be used to protect the intellectual property of printed materials?
Which of the following connection types is typically used for a display monitor?
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?
A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?
Which of the following operating systems is best used in creating and managing virtual machines?
A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?
Which of the following BEST explains the use of float over integer to store monetary values?
A company has installed an application that only requires a workstation to function. Which of the following
architecture types is this application using?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the
following types of software would BEST complete this task?
Which of the following data types should a developer use when creating a variable to hold a postal code?
When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?
An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this
document for public use. Which of the following should the developer use to BEST protect the document?
A database administrator wants to populate a database with large amounts of data from an external source.
Which of the following actions should be used to get the database populated?
Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?
A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?
Which of the following language types most likely controls the way a web page looks?
Which of the following best describes the process of comparing MD5 values after downloading software?
A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?
For which of the following is a relational database management system MOST commonly used?
An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?
Multiple users need to access the same data simultaneously. Which of the following is the best place to store the data?
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
A game developer is purchasing a computing device to develop a game and recognizes the game engine
software will require a device with high-end specifications that can be upgraded. Which of the following
devices would be BEST for the developer to buy?
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?
Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
A technician is troubleshooting an error message and tests the same program on a separate, identical
machine. Which of the following troubleshooting methodology steps is this an example of?
Which of the following categories describes commands used to extract information from a database?
A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?
Which of the following interfaces is best for viewing database performance information?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
Which of the following should a technician do to fix stability issues on a workstation?
Which of the following best describes the differences between data and information?
Which of the following language types would a web developer MOST likely use to create a website?
The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?
Which of the following filesystems is most commonly found on a computer running macOS?
A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator most likely choose for the project?
After a user connects a laptop to a newly purchased printer, the user is unable to print. Which of the following is most likely causing the issue?
Which of the following best describes the technology utilized in digital wallets?
A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
IT Fundamentals | FC0-U61 Questions Answers | FC0-U61 Test Prep | CompTIA IT Fundamentals+ Certification Exam Questions PDF | FC0-U61 Online Exam | FC0-U61 Practice Test | FC0-U61 PDF | FC0-U61 Test Questions | FC0-U61 Study Material | FC0-U61 Exam Preparation | FC0-U61 Valid Dumps | FC0-U61 Real Questions | IT Fundamentals FC0-U61 Exam Questions