Comptia ITF+ (FC0-U61) Exam-Part6

Ace your homework & exams now with Quizwiz!

A design studio wants to utilize a tool that can be installed on multiple operating systems with a group-use license. Which of the following concepts meets the studio's requirements? A. Cross-platform software B. Conferencing software C. Open-source software D. Online workspace software

A. Cross-platform software

Which of the following describes the type of OS used in an electric vehicle? A. Embedded OS B. Mobile device OS C. Server OS D. Workstation OS

A. Embedded OS

Which of the following are ways in which an IT administrator can protect mobile devices? (Choose two.) A. Encrypt the devices B. Enable installation of applications from unknown sources C. Root the devices to install third-party security software D. Only install applications from authorized stores E. Access web stores to purchase applications F. Disable location services

A. Encrypt the devices D. Only install applications from authorized stores

After an issue has been identified, which of the following should be performed NEXT? A. Establishing a theory of probable cause B. Verifying system functionality C. Implementing the solution D. Documenting the findings

A. Establishing a theory of probable cause

Which of the following Windows 10 components allows a user to view and manage files stored on a computer's storage system? A. File Explorer B. File Manager C. Control Panel D. Program Manager

A. File Explorer

Which of the following works BEST if code needs to be reused or called by other pieces of code? A. Function B. Anonymous block C. Declaration D. Formula

A. Function

Which of the following is the MOST likely benefit of a structured database? A. Higher security B. Faster accumulation C. Easily searchable D. Fewer storage requirements

A. Higher security

Which of the following OS types is MOST likely to be used by a public cloud service provider? A. Hypervisor B. Embedded C. Workstation D. Mobile

A. Hypervisor

Which of the following would MOST likely be used to create a one-time script on a Windows server? A. PowerShell B. C++ C. cron D. HTTPS

A. PowerShell

Which of the following describes the unit of containment that an application is constrained to on an operating system? A. Process B. Directory C. Console D. Thread

A. Process

Which of the following language categories is MOST commonly used in databases? A. Query B. Assembly C. Markup D. Scripting

A. Query

Which of the following would be the MOST efficient device for a traveling salesperson to use while working with a customer? A. Smartphone B. Desktop C. Terminal D. Tablet

A. Smartphone

Which of the following should a developer use to ensure a block of code executes a defined number of times? A. for loop B. while loop C. if ... else statement D. switch statement

A. for loop

A technician wants to reset the boot order on a computer. Which of the following would the technician MOST likely use? A. Motherboard B. BIOS C. SSD D. CPU

B. BIOS

A technician needs to reconfigure the existing wireless network for a small company. Employees at the company report internet connectivity and calls drop when using wireless headsets to communicate. Which of the following configuration changes should the technician make to MOST likely resolve the issue? A. Restart the DHCP server. B. Change the Wi-Fi channel. C. Update the SSID. D. Utilize a different frequency.

B. Change the Wi-Fi channel.

Which of the following is the BEST reason to use password complexity requirements? A. To discourage reuse B. For stronger access control C. As a legal requirement D. To meet customer requirements

B. For stronger access control

Which of the following is the BEST method to protect data in transit? A. AES encryption B. Network-level encryption C. Disk-level encryption D. Column-level encryption

B. Network-level encryption

A user has incorrectly typed in a password four times and has been warned the account will be locked after two more attempts. Which of the following will MOST likely resolve the current situation? A. Password expiration B. Password reset process C. Password reuse D. Password manager

B. Password reset process

A group of interns will be on the network over the next seven days. They will need access to the file server. Which of the following should be implemented? A. Usernames B. Permissions C. Group objects D. Passwords

B. Permissions

A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use? A. Flowchart schema B. Physical schema C. Logical schema D. Table schema

B. Physical schema

Which of the following describes a unique entry to a data set? A. Schema B. Record C. Column D. Index

B. Record

A user calls to report that the cable internet is slow and inconsistent, specifically in the evenings. Which of the following is the MOST likely issue? A. Router failure B. Site congestion C. Shared bandwidth D. Off-peak internet usage

B. Site congestion

Which of the following passwords is the MOST secure? A. buzzypresto B. BuZZyPr3st0 C. BuZZyPr3$t0 D. BuZZyPresto

C. BuZZyPr3$t0

A faulty WAP was replaced recently. Users are now able to connect to the new WAP, but their connections are very slow and are dropping. Which of the following is the BEST action for a technician to perform? A. Change the WAP password. B. Change the encryption type. C. Change the channel. D. Change the SSID.

C. Change the channel.

A technician is deploying a new application that runs on thin clients with no local storage on the user's device. The thin client cannot make a VPN connection to the company data center. Which of the following application types would MOST likely fulfill this requirement? A. Locally installed B. Local network-hosted C. Cloud-hosted D. Three-tier

C. Cloud-hosted

A technician recently fixed a printer issue by replacing the cable. The technician is now updating the ticket to record the action that was taken. Which of the following steps in the troubleshooting methodology is the technician currently performing? A. Identifying the problem B. Establishing a theory of probable cause C. Documenting the findings D. Verifying the solution

C. Documenting the findings

A bystander takes note while a customer is sharing credit card information over the phone. Which of the following is being performed? A. Social engineering B. Snooping C. Eavesdropping D. On-path attack

C. Eavesdropping

A user wants to ensure that a banking site is secure before logging in. Which of the following should the user look for in the URL? A. SFTP B. SSL C. HTTPS D. HTML

C. HTTPS

Which of the following is a benefit of partitioning a drive? A. Increased network bandwidth B. Reduced risk of corruption C. Increased available space D. Reduced malware risk

C. Increased available space

A user replaced the external speakers for a workstation, but the new speakers are not producing sound. Which of the following is MOST likely the issue? A. The speakers are plugged into the microphone port B. The user did not install batteries into the speakers C. The sound card is not enabled in Device Manager D. The user did not complete the software setup

C. The sound card is not enabled in Device Manager

Which of the following application models runs the interface separately on a client machine? A. One-tier B. Two-tier C. Three-tier D. n-tier

C. Three-tier

Which of the following methods of access is MOST likely to be used during a database recovery? A. Graphical user interface B. Direct C. Utility D. Programmatic

C. Utility

Which of the following represents a series of numbers interpreted as characters? A. Hexadecimal B. Octal C. Binary D. ASCII

D. ASCII

Which of the following are the main functions of an operating system? (Choose two.) A. Text processing B. Program compilation C. Web browsing D. Application management E. Flowchart editing F. Hardware access control

D. Application management E. Flowchart editing

Which of the following file management features allows access to resources on a network? A. Encryption B. Journaling C. Permissions D. Authentication

D. Authentication

Which of the following security concepts reduces the chance of an on-path attack? A. Availability B. Integrity C. Performance D. Confidentiality

D. Confidentiality

Which of following numbering systems is base-10? A. Octal B. Binary C. Hexadecimal D. Decimal

D. Decimal

Which of the following internet service types would MOST likely be utilized by a large data center? A. Cable B. DSL C. Satellite D. Fiber

D. Fiber

An employee uses a password to log in to a company computer. Which of the following authentication methods did the employee use to gam access to the network? A. Single-factor B. Single sign-on C. Permissions D. Multifactor

D. Multifactor

A network administrator needs to ensure the software that manages a computer is fully backed up. Which of the following backups does this describe? A. Database B. File C. Email D. Operating system

D. Operating system

Which of the following is an example of structured data? A. Video recordings B. Social media posts C. Photographs D. Phone numbers

D. Phone numbers

Given the pseudocode below: IF Red is TRUE SET party = FALSE IF Blue is TRUE SET pizza = TRUE ELSE SET pizza = FALSE ELSE SET party =TRUE IF Blue is FALSE SET pizza =TRUE ELSE SET pizza =FALSE Which of the following inputs will result in a TRUE for pizza and party? A. Red = TRUE Blue = FALSE B. Red = FALSE Blue = FALSE C. Red = FALSE Blue = TRUE D. Red = TRUE Blue = TRUE

D. Red = TRUE Blue = TRUE

A technician is trying to determine what a particular error code means on a printer. The technician is using an online forum for the printer's vendor to look for documentation on the error code. Which of the following steps in the troubleshooting methodology is the technician currently performing? A. Documenting the lessons learned B. Verifying full system functionality C. Establishing a theory of probable cause D. Researching the knowledge base

D. Researching the knowledge base

Which of the following is a benefit of embedded operating systems? A. Frequent updates B. Ability to run multiple applications C. Easy to transfer data between systems D. Resource efficiency

D. Resource efficiency

Given the following pseudocode: IF age <5 THEN school = LINCOLN ELSEIF age <11 THEN school = WASHINGTON ELSEIF age > 13 THEN school = STEVENSON ELSE THEN school = SANDBURG END Which of the following schools will be chosen for a 16-year-old student? A. Lincoln B. Washington C. Stevenson D. Sandburg

D. Sandburg

When users access a company's website from home, they are prompted to log in with a username and password. However, when in the office they are not prompted to log in and instead are able to access the website directly. Which of the following is this the BEST example of? A. Multifactor authentication B. Non-repudiation C. Hardware token D. Single sign-on

D. Single sign-on

Which of the following would be used to protect distinguishing features of a person, business, or organization? A. Patent B. Copyright C. Trade secrets D. Trademark

D. Trademark

A network technician is installing a new mouse for an employee. Which of the following types of cables should the technician use for the mouse? A. DVI B. HDMI C. Ethernet D. USB

D. USB

A project team wants to graphically illustrate the logic of a subprogram. Which of the following would be the BEST choice? A. Image editing software B. Word processing software C. Presentation software D. Visual diagramming software

D. Visual diagramming software

A computer with a single purpose receives input from a controller. Which of the following types of devices is this computer? A. Tablet B. Server C. Gaming console D. Workstation

D. Workstation


Related study sets

The Rise of National Union Organizations in the US (1865-1920)

View Set

Health and Illness Test 2 (Prep U)

View Set

Ch 17-2, The Northern Renaissance

View Set

7.1 Mental Images and Concepts in Thinking

View Set

Choose the correct answer per each question

View Set

Adult Health EAQ #1 Cardiovascular

View Set

Nursing Management During the Postpartum Period

View Set

Chapter 4 Sensation and Perception

View Set