Best Deal for Unlimited Exam Access
The Fastest Way to Pass Any Exam for Only $149.00

Exam Code: FC0-U21
Exam Name: Fundamentals of Technology
Certifications: View All..
Vendor: CompTIA

246 Questions & Answers
Last update: Oct 16,19
Verified by IT Certification Professionals

Get Instant Access to FC0-U21 Exam and 1,200+ More

Unlimited Lifetime Access Package

  • Access any exam on the entire ActualTests site for life!

  • Our $149.00 Unlimited Access Package buys unlimited access to our library of downloadable PDFs for 1200+ exams.

  • You download the exam you need, and come back and download again when you need more. Your PDF is ready to read or print, and when there is an update, you can download the new version. Download one exam or all the exams - its up to you.

$149.00/lifetime

Actual Test Exam Engine

Upgrade your Unlimited Lifetime Access with our interactive Exam Engine! Working with the ActualTests Exam Engine is just like taking the actual tests, except we also give you the correct answers. See More >>

Total Cost: $348.00

CompTIA FC0-U21 Exam Reviews FC0-U21 Exam Engine Features

CompTIA FC0-U21 Exam Tips

Identify the statements that will illustrate the actions relating to user account reviews? (Choose TWO)

Answers:
A. The user account reports are physically extracted from systems and the user access is authenticated.
B. The user accounts and its privileges are extracted periodically from systems and assessed for the proper level of authorization. (correct)
C. The user accounts reports are extracted periodically from the system and the end users are notified.
D. The user accounts reports are extracted periodically from the system and employment authentication is executed. (correct)
E. The user accounts and its privileges are extracted periodically from systems and kept for auditing purposes.

Identify the fire containment tool that will cause a lot of damage to electrical equipment?

Answers:
A. Water will cause a lot of damage. (correct)
B. Halon will cause a lot of damage.
C. Carbon Dioxide will cause a lot of damage.
D. Foam will cause a lot of damage.

Which security principle will be breached when an SMTP server is implemented on the firewall of TestKing.com network?

Answers:
A. The Address internal threats security principle would be breached.
B. The Keep the solution simple security principle would be breached.
C. The Use a device as intended security principle would be breached. (correct)
D. The Create an in-depth defense security principle would be breached.

Which of the following best describes the term cold site?

Answers:
A. A low temperature facility for long term storage of critical data.
B. A location to begin operations during disaster recovery. (correct)
C. A facility seldom used for high performance equipment.
D. A location that is transparent to potential attackers.

Explanation:
A cold site is a physical location that a business has access to in case of an emergency, where they can start from scratch and rebuild a new enterprise following a disaster. It is called a cold site not because the facility isn't heated, but because it's the opposite of a hot site. A hot site already contains functioning: servers, mainframes, switches, cables, routers, workstations, telephones, jacks, desks, and chairs so a company can set up tentative operations quickly. Most companies have service contracts and opt for a cold site or a hot site depending on the importance of their operations.

What is the process of backing up files and software that changed since the last full or incremental backup known as?

Answers:
A. It is known as a full backup.
B. It is known as a differential backup.
C. It is known as a copy backup.
D. It is known as an incremental backup. (correct)

Which backups should be copied to storage media that was changed since the last full backup?

Answers:
A. Differential backups require that files and software be copied to storage media. (correct)
B. Incremental backups require that files and software be copied to storage media.
C. Full backups require that files and software be copied to storage media.
D. Delta backups require that files and software be copied to storage media.

Which function should first be returned from the backup facility to the primary facility after a disaster?

Answers:
A. You should first return the least critical functions. (correct)
B. You should first return the executive functions.
C. You should first return the systems functions.
D. You should first return the web services.

What is known as an end-to-end traffic performance promise made by a service provider to a user?

Answers:
A. It is known as a VPN.
B. It is known as a DRP.
C. It is known as a SLA. (correct)
D. It is known as a BCP.

Which of the following is the best course of action for the user who currently has sensitive material displayed on his monitor and now needs to leave the area?

Answers:
A. The user should leave the area. The monitor is at a personal desk so there is no risk.
B. Turn off the monitor.
C. Wait for the screen saver to start. (correct)
D. Refer to the company's policy on securing sensitive data.

Explanation:
With the assumption that the screen saver is password protected.Incorrect answers:If you leave the computer unattended a social engineer could walk by, and view your sensitive material. If you turn off your monitor, they can easily turn it back on.

Related Certifications Included