Questions for the FC0-U61 were updated on : Nov 14 ,2024
Which of the following contains exactly four copper wires?
C
Which of the following is an advantage of installing an application to the cloud?
A
A company purchased a software program. The EULA states that the software can be installed on as many computers as
the company wants, but only four users can be using the software at any point in time. Which of the following types of license
is this an example of?
B
A systems administrator wants to run a script but does not have access to the graphical user interface. Which of the
following can be used to run scripts?
C
Which of the following is the closest to machine language?
D
The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used. Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Choose two.)
B D
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which
of the following does the workstation MOST likely need for the printer to function?
D
A security engineer is attempting to justify a large investment in security IT infrastructure. The business has a limited budget
and is reluctant to invest. Which of the following should the business consider in the analysis?
A
All users have access to an application at a company. The data from the application is stored on a centralized device located
on the network. Which of the following devices would MOST likely be used to store the data?
A
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be
the BEST choice to accomplish this task?
D
Which of the following is a compiled language?
C
Which of the following is a logical structure for storing files?
A
Which of the following BEST describes the purpose of a vector in programming?
A
A large payment website was breached recently. A user is concerned that the breach will affect account security on other
sites. Which of the following password best practices would mitigate this risk?
C
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”.
Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A