Weekend Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

How to Pass the CompTIA FC0-U61 Exam: Comprehensive CompTIA IT Fundamentals+ Certification Exam Guide and Tips

Questions 61

Which of the following best describes when lo use an array?

Options:

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Buy Now
Questions 62

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

Options:

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Buy Now
Questions 63

The IT department has established a new password policy for employees. Specifically, the policy reads:

    Passwords must not contain common dictionary words

    Passwords must contain at least one special character.

    Passwords must be different from the las six passwords used.

    Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

Options:

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Buy Now
Questions 64

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

Options:

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Buy Now
Questions 65

Which of the following best explains the reason for password expiration?

Options:

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Buy Now
Questions 66

Which of the following is a value that uniquely identifies a database record?

Options:

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Buy Now
Questions 67

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Buy Now
Questions 68

Which of the following is most likely managed directly by the operating system?

Options:

A.

Email

B.

Database connections

C.

Memory allocation

D.

Instant messaging

Buy Now
Questions 69

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Options:

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Buy Now
Questions 70

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this

document for public use. Which of the following should the developer use to BEST protect the document?

Options:

A.

Patent

B.

Trademark

C.

Watermark

D.

Copyright

Buy Now