FC0-U61 Dumps

FC0-U61 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam

Question No.1

Which of the following data types should a developer use when creating a variable to hold a postal code?

  1. Integer

  2. String

  3. Float

  4. Boolean

Correct Answer: B

Question No.2

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

  1. Renew the IP address.

  2. Configure the browser proxy settings.

  3. Clear the browser cache.

  4. Disable the pop-up blocker

Correct Answer: B

Question No.3

Which of the following is an advantage of installing an application to the cloud?

  1. Data is not stored locally.

  2. Support is not required.

  3. Service is not required.

  4. Internet access is not required.

Correct Answer: A

Question No.4

Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

  1. Infrared

  2. NFC

  3. Bluetooth

  4. WiFi

Correct Answer: B

Question No.5

Which of the following BEST describes an application running on a typical operating system?

  1. Process

  2. Thread

  3. Function

  4. Task

Correct Answer: A

Question No.6

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

  1. Laptop

  2. Server

  3. Game console

  4. Workstation

Correct Answer: B

Question No.7

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

  1. Non-repudiation

  2. Authentication

  3. Integrity

  4. Accounting

Correct Answer: B

Question No.8

A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?

  1. WPA

  2. SSID

  3. WEP

  4. WPA2

Correct Answer: D

Question No.9

In which of the following situations should there be come expectation of privacy?

  1. Posting a comment on a friend#39;s social media page

  2. Submitting personal information on a school enrollment site

  3. Posting a comment on a video sharing site

  4. Sending email and pictures to a close relative

Correct Answer: B

Question No.10

Which of the following is a value that uniquely identifies a database record?

  1. Foreign key

  2. Public key

  3. Primary key

  4. Private key

Correct Answer: C

Get Full Version of FC0-U61 Dumps

FC0-U61 Dumps

FC0-U61 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Exam

Question No.11

Which of the following is a compiled language?

  1. Perl

  2. JScript

  3. Java

  4. PowerShell

Correct Answer: C

Question No.12

Which of the following would be used to send messages using the SMTP protocol?

  1. Document sharing software

  2. Instant messaging software

  3. Conferencing software

  4. Email software

Correct Answer: D

Question No.13

Which of the following are the basic computing operations?

  1. Input, process, output, and feedback

  2. Input, output, storage, and feedback

  3. Input, process, and output

  4. Input, process, output, and storage

Correct Answer: D

Question No.14

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

  1. Permission

  2. Ink cartridge

  3. USB cable

  4. Driver

Correct Answer: D

Question No.15

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

  1. Document the solution and cause.

  2. Create a new theory of cause.

  3. Research the problem online.

  4. Implement preventive measures.

Correct Answer: A

Question No.16

A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?





Correct Answer: A

Question No.17

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

  1. a storage area network.

  2. an embedded OS.

  3. network attached storage.

  4. a Type 1 hypervisor.

Correct Answer: D

Question No.18

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

  1. redundancy.

  2. replication.

  3. prioritization.

  4. fault tolerance.

Correct Answer: C

Question No.19

Which of the following BEST describes a kilobyte?

  1. A kilobyte is a measurement of storage (e.g., 100KB).

  2. A kilobyte is a measurement of throughput (e.g.,100Kbps).

  3. A kilobyte is a measurement of power (e.g., 100KW).

  4. A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Correct Answer: A

Question No.20

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

  1. The power interruption caused the camera to malfunction.

  2. Ann has a compatibility problem with the camera.

  3. A firmware update needs to be applied to the camera.

  4. Ann#39;s Internet connection and wireless router are still down.

Correct Answer: D

Get Full Version of FC0-U61 Dumps