Which of the following protocols would be the MOST secure to prevent unauthorized access?
FC0-U61(758) Quiz 2

Quiz
•
Computers
•
Professional Development
•
Hard
Pat Johnson
Used 4+ times
FREE Resource
63 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
WPA
SSID
WEP
WPA2
Answer explanation
WPA2 is the most secure protocol among the options listed to prevent unauthorized access due to its advanced encryption methods and stronger security features.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
SNMP
DHCP
ICMP
POP3
SMTP
Answer explanation
POP3 and SMTP are the most likely network protocols used for sending and receiving Internet email, as they handle incoming and outgoing mail respectively.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
UPDATE
DELETE
ALTER
DROP
Answer explanation
The correct command to completely remove a table and its data in a relational database is DROP.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would MOST likely be used to connect a display to a workstation?
USB
NFC
DSL
DVI
Answer explanation
DVI would MOST likely be used to connect a display to a workstation, as it is a common video interface for high-quality displays.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is MOST likely used to represent international text data?
ASCII
Octal
Hexadecimal
Unicode
Answer explanation
Unicode is most likely used to represent international text data as it supports a wide range of characters from different languages and scripts.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
redundancy
replication
prioritization
fault tolerance
Answer explanation
The correct choice is prioritization because the company is deciding the order in which data should be recovered during a disaster recovery exercise.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Windows 7
Windows Server 2012
UNIX
Linux
Windows 8
Answer explanation
UNIX and Linux do not require file extensions to execute a program, making them the correct choices.
Create a free account and access millions of resources
Similar Resources on Quizizz
60 questions
CLF-C01 - Quiz 2

Quiz
•
Professional Development
66 questions
Cambridge - IGCSE - Computer Science - Input Devices

Quiz
•
11th Grade - Professi...
60 questions
HCI Midterm Exam

Quiz
•
Professional Development
63 questions
FC0-U61(758) Quiz 8

Quiz
•
Professional Development
59 questions
A+ 1101 Study Quiz 6

Quiz
•
Professional Development
60 questions
Python Baseline Test (PCAP I)

Quiz
•
9th Grade - Professio...
63 questions
FC0-U61(758) Quiz 9

Quiz
•
Professional Development
64 questions
Security+ Phase 4

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade