Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive.
Which of the following is the MOST likely cause of the infection?
A. The flash drive was infected by a war driving hacker on the way to the public kiosk.
B. The public workstation was infected by Joe's flash drive.
C. The public workstation was infected and passed the virus to the flash drive.
D. The flash drive was already infected by the user's computer.
A user working on a laptop notices the mouse cursor frequently moves to random locations in a document while typing.
Which of the following should the user do FIRST to help resolve this issue?
A. Ask tech support for help.
B. Reboot the laptop.
C. Turn off the touchpad.
D. Reconnect the mouse.
Which of the following printer types uses a powder based consumable with a lower cost per page compared to other printers?
A. Thermal
B. Laser
C. Dot matrix
D. Inkjet
Which of the following alternative technologies allows a computer to run multiple operating systems without partitioning the hard drive?
A. Web applications
B. Dual boot
C. Telepresence
D. Virtualization
Which of the following is a feature of a basic power strip?
A. Protects against lightning strikes
B. Provides multiple outlets for power
C. Generates power for devices
D. Provides battery backup for devices
Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).
A. Network connection
B. Microphone
C. Modem
D. Firewall
E. Webcam
F. Cable connection
G. Wired NIC
Which of the following is the BEST reason to backup data?
A. To ensure data encryption
B. To ensure data stability
C. To ensure data security
D. To ensure data availability
A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop.
How could the user have prevented this breach?
A. Disable file and print sharing on the laptop.
B. Delete unused drives from network.
C. Remove shared keys from the key ring.
D. Set the read-only attribute on the files.
Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage?
A. Decreased software licensing costs
B. Higher security encryption
C. Limited storage space for files
D. Increased accessibility to files
A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard.
The user can install the games by performing which of the following?
A. Schedule automatic updates.
B. Enable installed OS features.
C. Update hardware drivers.
D. Reinstall productivity applications.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your FC0-U51 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.