
FC0-U61(758) Quiz 2
Authored by Pat Johnson
Computers
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
63 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following protocols would be the MOST secure to prevent unauthorized access?
WPA
SSID
WEP
WPA2
Answer explanation
WPA2 is the most secure protocol among the options listed to prevent unauthorized access due to its advanced encryption methods and stronger security features.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
SNMP
DHCP
ICMP
POP3
SMTP
Answer explanation
POP3 and SMTP are the most likely network protocols used for sending and receiving Internet email, as they handle incoming and outgoing mail respectively.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
UPDATE
DELETE
ALTER
DROP
Answer explanation
The correct command to completely remove a table and its data in a relational database is DROP.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would MOST likely be used to connect a display to a workstation?
USB
NFC
DSL
DVI
Answer explanation
DVI would MOST likely be used to connect a display to a workstation, as it is a common video interface for high-quality displays.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is MOST likely used to represent international text data?
ASCII
Octal
Hexadecimal
Unicode
Answer explanation
Unicode is most likely used to represent international text data as it supports a wide range of characters from different languages and scripts.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
redundancy
replication
prioritization
fault tolerance
Answer explanation
The correct choice is prioritization because the company is deciding the order in which data should be recovered during a disaster recovery exercise.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Windows 7
Windows Server 2012
UNIX
Linux
Windows 8
Answer explanation
UNIX and Linux do not require file extensions to execute a program, making them the correct choices.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?