Win IT Exam with Last Dumps 2024


CompTIA FC0-U61 Exam

Page 5/11
Viewing Questions 41 50 out of 105 Questions
45.45%

Question 41
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?
A. Flat file
B. Memory
C. Relational database
D. Solid state drive

Question 42
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
A. Contract
B. Patent
C. Copyright
D. Trademark

Question 43
Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
A. Infrared
B. NFC
C. Bluetooth
D. WiFi

Question 44
The IT department has established a new password policy for employees. Specifically, the policy reads:
- Passwords must not contain common dictionary words
- Passwords must contain at least one special character.
- Passwords must be different from the las six passwords used.
- Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Choose two.)
A. Password lockout
B. Password complexity
C. Password expiration
D. Passwords history
E. Password length
F. Password age

Question 45
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer?
A. Email previewing
B. Patching
C. Clear browsing cache
D. Kill process


Question 46
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?
A. Thunderbolt cable
B. Bluetooth module
C. Infrared port
D. WLAN card

Question 47
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?
A. Password reuse
B. Snooping
C. Social engineering
D. Phishing

Question 48
A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?
A. WPA
B. SSID
C. WEP
D. WPA2

Question 49
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Choose two.)
A. SMTP
B. POP3
C. SNMP
D. DHCP
E. ICMP
F. SFTP

Question 50
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
A. UPDATE
B. DELETE
C. ALTER
D. DROP