CompTIA FC0-U61 Exam Practice Questions (P. 2)
- Full Access (518 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?
- AUpdate from 802.11b to 802.11g.
- BEnsure sources of EMI are removed.Most Voted
- CEnable WPA2-Enterprise.
- DUse WiFi Protected Setup.
Correct Answer:
B
B

To boost that weak broadcast signal from your wireless access point, whip out those sources of EMI—those pesky electromagnetic interferences. It’s the clutter from devices emitting electronic noise that’s dampening your WiFi strength. Clearing these will generally help your access point shine at transmitting a stronger signal.
send
light_mode
delete
Question #12
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
- AEstablish a plan of action.
- BGather information
- CDuplicate the problem.Most Voted
- DFind the root cause.
Correct Answer:
C
C

The technician is essentially replicating what the user experienced to observe the error under the same conditions. This method not only affirms that the issue exists but provides a firsthand perspective of the problem, making it easier to systematically approach and resolve. This step is a classic case of duplicating the problem to ensure it's not just a user-specific error. Duplication helps in verifying the issue and is pivotal in troubleshooting as it lays the groundwork for diagnosing the problem more effectively.
send
light_mode
delete
Question #13
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?
- AEnsure both devices are connected to the LAN.Most Voted
- BEnable task scheduling.
- CReset the proxy settings to their default values.
- DReview the fault tolerance configurations.
Correct Answer:
A
A

To address a failure in printing to a wireless printer, first confirm that both the computer and the printer are connected to the same Local Area Network (LAN). This common network linkage is crucial as it allows the devices to communicate and transmit the printing commands effectively. Any disruption in their connectivity could block the print operation, resulting in the error experienced. Ensuring connectivity can often resolve this error quickly and restore functionality.
send
light_mode
delete
Question #14
Which of the following relational database constructs is used to ensure valid values are entered for a column?
- ASchema
- BPermissions
- CConstraintMost Voted
- DColumn
Correct Answer:
C
C

Absolutely! Constraints in relational databases are essential for ensuring the integrity and accuracy of the data entered into a table. By defining limits and requirements on what data can be entered, constraints prevent incorrect or invalid data from being stored. This ensures that the data remains reliable and consistent with the intended design of the database.
send
light_mode
delete
Question #15
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
- AEncryptionMost Voted
- BCompression
- CPermissions
- DAuditing
Correct Answer:
A
A

Encryption is definitely the way to go for securing confidential data on a laptop. It scrambles the data so that it's unreadable to anyone without the right decryption key, ensuring that your info stays private, even if the device ends up in the wrong hands. Just remember, while encryption protects your data at rest, you're also gonna want to keep your passwords strong and device physically secure to cover all your bases.
send
light_mode
delete
Question #16
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
- Aa storage area network.
- Ban embedded OS.
- Cnetwork attached storage.
- Da Type 1 hypervisor.Most Voted
Correct Answer:
D
D
send
light_mode
delete
Question #17
Which of the following is a compiled language?
send
light_mode
delete
Question #18
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
- ADocument the solution and cause.
- BCreate a new theory of cause.
- CResearch the problem online.
- DImplement preventive measures.
Correct Answer:
A
A
send
light_mode
delete
Question #19
Which of the following is a value that uniquely identifies a database record?
send
light_mode
delete
Question #20
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?
send
light_mode
delete
All Pages