FC0-U61 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam

Question No.1

Which of the following data types should a developer use when creating a variable to hold a postal code?

  1. Integer

  2. String

  3. Float

  4. Boolean

Correct Answer: B

Question No.2

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

  1. Renew the IP address.

  2. Configure the browser proxy settings.

  3. Clear the browser cache.

  4. Disable the pop-up blocker

Correct Answer: B

Question No.3

Which of the following is an advantage of installing an application to the cloud?

  1. Data is not stored locally.

  2. Support is not required.

  3. Service is not required.

  4. Internet access is not required.

Correct Answer: A

Question No.4

Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

  1. Infrared

  2. NFC

  3. Bluetooth

  4. WiFi

Correct Answer: B

Question No.5

Which of the following BEST describes an application running on a typical operating system?

  1. Process

  2. Thread

  3. Function

  4. Task

Correct Answer: A

Question No.6

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

  1. Laptop

  2. Server

  3. Game console

  4. Workstation

Correct Answer: B

Question No.7

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

  1. Non-repudiation

  2. Authentication

  3. Integrity

  4. Accounting

Correct Answer: B

Question No.8

A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?

  1. WPA

  2. SSID

  3. WEP

  4. WPA2

Correct Answer: D

Question No.9

In which of the following situations should there be come expectation of privacy?

  1. Posting a comment on a friend#39;s social media page

  2. Submitting personal information on a school enrollment site

  3. Posting a comment on a video sharing site

  4. Sending email and pictures to a close relative

Correct Answer: B

Question No.10

Which of the following is a value that uniquely identifies a database record?

  1. Foreign key

  2. Public key

  3. Primary key

  4. Private key

Correct Answer: C

Get Full Version of FC0-U61 Dumps