Tech + FC0-U71.pdf
Q: 1
A company implements a tool to allow employees to conduct meetings over the internet. Which of
the following tools did the company implement?
Options
Q: 2
A user identifies the reason a compute is not working, repairs it, and prints a test page. Which of the
following steps should the user should take next?
Options
Q: 3
Which of the following can be used to input commands for a computer to execute?
Options
Q: 4
Which of the following devices extends the range of a network?
Options
Q: 5
A technician is reviewing log files to track the number of times that a specific user has logged on to
the networks. Which of the following security concepts is being used?
Options
Q: 6
A user is unable to connect from one workstation to another workstation. Which of the following
should be configured to fix this issue?
Options
Q: 7
Which of the following describes a printer?
Options
Q: 8
A user has concerns about device theft because they are working on a laptop at a local coffee shop.
Which of the following physical devices would be best to protect the laptop?
Options
Q: 9
Which of the following can best protect a computer when an infected file has been downloaded?
Options
Q: 10
Which of the following is used to represent a device's physical address?
Options
Question 1 of 10