FC0-U61(758) Quiz 2
Quiz
•
Computers
•
Professional Development
•
Hard
Pat Johnson
Used 4+ times
FREE Resource
63 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following protocols would be the MOST secure to prevent unauthorized access?
WPA
SSID
WEP
WPA2
Answer explanation
WPA2 is the most secure protocol among the options listed to prevent unauthorized access due to its advanced encryption methods and stronger security features.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
SNMP
DHCP
ICMP
POP3
SMTP
Answer explanation
POP3 and SMTP are the most likely network protocols used for sending and receiving Internet email, as they handle incoming and outgoing mail respectively.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
UPDATE
DELETE
ALTER
DROP
Answer explanation
The correct command to completely remove a table and its data in a relational database is DROP.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would MOST likely be used to connect a display to a workstation?
USB
NFC
DSL
DVI
Answer explanation
DVI would MOST likely be used to connect a display to a workstation, as it is a common video interface for high-quality displays.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is MOST likely used to represent international text data?
ASCII
Octal
Hexadecimal
Unicode
Answer explanation
Unicode is most likely used to represent international text data as it supports a wide range of characters from different languages and scripts.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
redundancy
replication
prioritization
fault tolerance
Answer explanation
The correct choice is prioritization because the company is deciding the order in which data should be recovered during a disaster recovery exercise.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Windows 7
Windows Server 2012
UNIX
Linux
Windows 8
Answer explanation
UNIX and Linux do not require file extensions to execute a program, making them the correct choices.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
60 questions
HARDWARE TEST 01
Quiz
•
Professional Development
64 questions
0x1-UXXX
Quiz
•
Professional Development
64 questions
UiPath Automation Exam Questions 69- 132
Quiz
•
Professional Development
66 questions
FC0-U61(758) Quiz 12
Quiz
•
Professional Development
58 questions
A+ 1101 Study Quiz 3
Quiz
•
Professional Development
60 questions
SCSU IMPORTANT Question 01 by SHUKLA SIR
Quiz
•
Professional Development
66 questions
Network and Security Foundations
Quiz
•
University - Professi...
60 questions
SharePoint Practice Test-S21
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade