Pass the CompTIA IT Fundamentals FC0-U61 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following BEST describes the purpose of a vector in programming?

Options:

A.

Storing a collection of data


B.

Repeating a similar operation


C.

Capturing user input


D.

Performing mathematical calculations


Expert Solution
Questions # 22:

A company is concerned with ensuring its databases are highly available. Which of the following can be used to

increase database availability?

Options:

A.

Backups


B.

Prioritization


C.

Indexes


D.

Failover


Expert Solution
Questions # 23:

Which of the following is a quality of solutions created by web browsers?

A Proprietary

B. Cross-platform

C. Single platform

D. Site licensed


Expert Solution
Questions # 24:

A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?

Options:

A.

Restart the computer when done.


B.

Log off the computer.


C.

Use private browsing.


D.

Enable pop-up blocker.


Expert Solution
Questions # 25:

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

Options:

A.

Password manager


B.

Password reuse


C.

Password history


D.

Password reset


Expert Solution
Questions # 26:

Which of the following should a technician do to fix stability issues on a workstation?

Options:

A.

Install a malicious software analyzer.


B.

Install a firewall.


C.

Install browsing controls.


D.

Install updates.


Expert Solution
Questions # 27:

After creating a database, which of the following would a developer most likely use to put data in a table?

Options:

A.

Concatenation


B.

Query


C.

Loop


D.

Macro


Expert Solution
Questions # 28:

Which of the following availability concerns is mitigated by having a business continuity site?

Options:

A.

Service outage


B.

Wiretapping


C.

Eavesdropping


D.

Replay attack


Expert Solution
Questions # 29:

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.

It accepts negative values.


B.

It stores symbols


C.

It accommodates larger values.


D.

It supports decimals.


Expert Solution
Questions # 30:

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

Options:

A.

Password history


B.

Password reuse


C.

Password expiration


D.

Password age


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions