Free Download Lastest Pass4sure CompTIA FC0-U11 Pracitce Tests

CompTIA Strata Fundamentals of PC Functionality Exam: FC0-U11 Exam
FC0-U11 Questions & Answers
Exam Code: FC0-U11
Exam Name: CompTIA Strata Fundamentals of PC Functionality Exam
Q & A: 123 Q&As

1.You are working with a team that will be bringing in new computers to a sales department at a
company. The sales team would like to keep not only their old files, but system settings as well
on the new PC’s. What should you do?
A. Do a system backup (complete) on each old machine, then restore it onto the new machines.
B. Copy the files and the Windows Registry to a removable media then copy it onto the new
C. Use the User State Migration tool to move the system settings and files to the new machines.
D. Use the Disk Management tool to move everything to the new computer.
Answer: C

2.Which of the following is designed to infiltrate or damage a computer without the consent of the
A. Shareware
B. Malware
C. Freeware
D. Stealware
Answer: B

3.Which of the following is a circuit board that is used to extend slots for expansion cards and
provides the ability to connect additional expansion cards to the computer?
A. Audio/modem riser
B. Secure Digital (SD) card
C. Riser card
D. Communication and Networking Riser (CNR)
Answer: C

4.Which of the following is a file management tool?
A. Windows Explorer
B. Device Manager
D. Defrag
Answer: A

5.Which of the following parts of the computer is built-in to the motherboard?
A. Joystick
B. Mouse
C. Sound card
D. CD-ROM drive
Answer: C

6.You are selecting memory to put in to a laptop. Which of the following types of RAM chips
would you most likely select?
A. 72 PIN
B. 240 PIN
C. 184 PIN
D. 144 PIN
Answer: D

7.Which of the following statements does the UK Parliament state in the Computer Misuse Act
Each correct answer represents a complete solution. Choose two.
A. Unauthorized access to the computer material is punishable by 6 months imprisonment or a
fine “not exceeding level 5 on the standard scale”.
B. Personal data shall be adequate, relevant, and not excessive in relation to the purpose or
purposes for which they are processed.
C. Appropriate technical and organizational measures shall be taken against unauthorized or
unlawful processing of personal data and against accidental loss or destruction of, or damage
D. Unauthorized modification of computer material is subject to the same sentences as section 2
Answer: A, D

8.Which of the following types of parental controls is used to limit access to the Internet
A. Monitoring control
B. Usage management tool
C. Content filter control
D. Bandwidth control
Answer: C

9.You are working in a Windows network environment. Which of the following accounts/groups
have many advanced permissions not needed by occasional users? Each correct answer
represents a part of the solution. Choose two.
A. Guest
B. Standard user
C. Administrator
D. Power Users
Answer: C, D

10.You need to alter disk partitions in Windows XP prior to upgrade to Windows Vista. Which
Windows utility should you use for this?
A. Disk Defragmenter
B. The Registry
C. Disk Management
D. System Configuration Utility
Answer: C

11.Which of the following is used by Wi-Fi Protected Access (WPA) to provide data encryption?
D. RC4
Answer: B

12.Mark works as a Network Administrator for NetTech Inc. The company has a Windows 2000
domain-based network. A user working on a Windows 2000 Professional client computer reports
that he is unable to access some files on the hard disk. However, he is able to successfully log
on and access other files. What should Mark do to resolve the issue?
A. Instruct the user to log off and log on again.
B. Enable the user account on the computer.
C. Check the file permissions on the hard disk drive.
D. Check the hard disk drive using the SCANDISK utility.
Answer: C

13.Which of the following refers to the data rate supported by a network connection or interface?
A. Spam
B. Preboot Execution Environment (PXE)
C. Bandwidth
D. Branding
Answer: C

14.Which of the following slots on a motherboard are best for a video card? Each correct answer
represents a complete solution. Choose two.
Answer: B, D

15.Which of the following statements about a smart card are true? Each correct answer
represents a complete solution. Choose two.
A. It is a device that contains a microprocessor and permanent memory.
B. It is used to securely store public and private keys for log on , e-mail signing and encryption,
and file encryption.
C. It is a device that routes data packets between computers in different networks.
D. It is a device that works as an interface between a computer and a network.
Answer: A, B

16.A customer has come to you wanting upgrade the video card in his laptop. What would you
A. A PCI Express card
B. Upgrade is not possible
C. A PCMCIA card
D. An AGP Card
Answer: B

17.Which of the following cache levels are implemented on microprocessors? Each correct
answer represents a complete solution. Choose two.
A. Level 5 (L5) cache
B. Level 2 (L2) cache
C. Level 0 (L0) cache
D. Level 1 (L1) cache
Answer: B, D

18.You work as a Network Administrator for NetTech Inc. The company has a wireless local area
network (WLAN). You want to prevent your wireless access point from being accessed by
intruders. What will you do to accomplish the task?
A. Implement auditing.
B. Implement WEP.
C. Implement SSL.
D. Implement IPSec.
Answer: B

19.What is the maximum cable length to connect a device to an IEEE 1394a port?
A. 12 meters
B. 5 meters
C. 4.5 meters
D. 10 meters
Answer: C

20.Which of the following identifies a wireless network and is sometimes referred to as a
“network name”?
Answer: B

…go to to download the full version Q&As.


Comments are closed.