FC0-U61(758) Quiz 2

Quiz
•
Computers
•
Professional Development
•
Hard
Pat Johnson
Used 4+ times
FREE Resource
63 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following protocols would be the MOST secure to prevent unauthorized access?
WPA
SSID
WEP
WPA2
Answer explanation
WPA2 is the most secure protocol among the options listed to prevent unauthorized access due to its advanced encryption methods and stronger security features.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
SNMP
DHCP
ICMP
POP3
SMTP
Answer explanation
POP3 and SMTP are the most likely network protocols used for sending and receiving Internet email, as they handle incoming and outgoing mail respectively.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
UPDATE
DELETE
ALTER
DROP
Answer explanation
The correct command to completely remove a table and its data in a relational database is DROP.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would MOST likely be used to connect a display to a workstation?
USB
NFC
DSL
DVI
Answer explanation
DVI would MOST likely be used to connect a display to a workstation, as it is a common video interface for high-quality displays.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is MOST likely used to represent international text data?
ASCII
Octal
Hexadecimal
Unicode
Answer explanation
Unicode is most likely used to represent international text data as it supports a wide range of characters from different languages and scripts.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
redundancy
replication
prioritization
fault tolerance
Answer explanation
The correct choice is prioritization because the company is deciding the order in which data should be recovered during a disaster recovery exercise.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
Windows 7
Windows Server 2012
UNIX
Linux
Windows 8
Answer explanation
UNIX and Linux do not require file extensions to execute a program, making them the correct choices.
Create a free account and access millions of resources
Similar Resources on Wayground
59 questions
Python CH1-3 Review

Quiz
•
8th Grade - Professio...
60 questions
HCI Midterm Exam

Quiz
•
Professional Development
63 questions
FC0-U61(758) Quiz 8

Quiz
•
Professional Development
61 questions
A+ 1101 Study Quiz 4

Quiz
•
Professional Development
63 questions
FC0-U61(758) Quiz 9

Quiz
•
Professional Development
60 questions
AWS CP Exam 02

Quiz
•
Professional Development
63 questions
Administering a SQL Database Infrastructure - PP Questions

Quiz
•
Professional Development
66 questions
Cambridge - IGCSE - Computer Science - Input Devices

Quiz
•
11th Grade - Professi...
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade