Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Questions 4

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Buy Now
Questions 5

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

Options:

A.

a storage area network.

B.

an embedded OS.

C.

network attached storage.

D.

a Type 1 hypervisor.

Buy Now
Questions 6

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Buy Now
Questions 7

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?

Options:

A.

Variable

B.

Attribute

C.

Method

D.

Looping

Buy Now
Questions 8

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

Options:

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Buy Now
Questions 9

A network administrator wants to keep track of all system messages and alerts. Which of the following would best allow for the administrator to follow trends?

Options:

A.

Logs

B.

Scheduled tasks

C.

Systems management console

D.

Systems notification tool

Buy Now
Questions 10

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Buy Now
Questions 11

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

Options:

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Buy Now
Questions 12

During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?

Options:

A.

Instant messaging

B.

Mobile applications

C.

Social media

D.

Video-sharing website

Buy Now
Questions 13

Privacy expectations on a company intranet should be limited to:

Options:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Buy Now
Questions 14

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.

Web page

B.

List

C.

Flat file

D.

Database

Buy Now
Questions 15

For which of the following is a relational database management system MOST commonly used?

Options:

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Buy Now
Questions 16

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

Options:

A.

Data capture and collections

B.

Asset inventory inputs

C.

Sales statistics

D.

Average loss output

Buy Now
Questions 17

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Buy Now
Questions 18

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Buy Now
Questions 19

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

Options:

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Buy Now
Questions 20

Which of the following is most likely managed directly by the operating system?

Options:

A.

Email

B.

Database connections

C.

Memory allocation

D.

Instant messaging

Buy Now
Questions 21

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Buy Now
Questions 22

Which of the following database types would be best in which to place financial data?

Options:

A.

Unstructured

B.

Semi-structured

C.

Structured

D.

Spreadsheet

Buy Now
Questions 23

Which of the following is an example of a compiled language?

Options:

A.

C++

B.

SQL

C.

Python

D.

XML

Buy Now
Questions 24

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Buy Now
Questions 25

A user clicks a link to a web page to view a document, but nothing happens. Which of the following is most likely the issue?

Options:

A.

Scripting is disabled.

B.

The security settings are too high.

C.

Pop-up blockers are enabled.

D.

The web certificate is invalid.

Buy Now
Questions 26

Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?

Options:

A.

RAM

B.

NIC

C.

GPU

D.

CPU

Buy Now
Questions 27

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Buy Now
Questions 28

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is

confirmed. Which of the following should be the technician’s NEXT step?

Options:

A.

Implement the solution.

B.

Document lessons learned.

C.

Establish a plan of action.

D.

Verify full system functionality.

Buy Now
Questions 29

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Buy Now
Questions 30

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

Options:

A.

T1 line

B.

Satellite

C.

Fiber optic

D.

DSL

Buy Now
Questions 31

A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?

Options:

A.

Web-based

B.

IP-based

C.

Driver

D.

Plug-and-play

Buy Now
Questions 32

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

Options:

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Buy Now
Questions 33

SQL databases use primary and foreign keys to enable which of the following?

Options:

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Buy Now
Questions 34

After creating a database, which of the following would a developer most likely use to put data in the database?

Options:

A.

UPDATE

B.

ALTER

C.

INSERT

D.

SELECT

Buy Now
Questions 35

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

Options:

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Buy Now
Questions 36

Which of the following interfaces is best for viewing database performance information?

Options:

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Buy Now
Questions 37

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.

Array

B.

Vector

C.

List

D.

String

Buy Now
Questions 38

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

Options:

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Buy Now
Questions 39

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

Buy Now
Questions 40

Which of the following is the closest to machine language?

Options:

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Buy Now
Questions 41

Which of the following are the basic computing operations?

Options:

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Buy Now
Questions 42

In an effort to reduce costs, a company decides not to renew its contract for a secure shredding service. Which of the following risks should the management team most likely be concerned with if employees fail to properly dispose of documents according to security protocols?

Options:

A.

Dumpster diving

B.

Snooping

C.

Unauthorized information alteration

D.

Social engineering

Buy Now
Questions 43

Which of the following allows wireless devices to communicate to a wired network?

Options:

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Buy Now
Questions 44

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Options:

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Buy Now
Questions 45

Which of the following is the equivalent of 1 KB?

Options:

A.

0.01 googol

B.

1,000 bits

C.

8,000 bits

D.

8,000 bytes

Buy Now
Questions 46

A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?

Options:

A.

SSO

B.

Software token

C.

PIN

D.

Multifactor authentication

Buy Now
Questions 47

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Options:

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Buy Now
Questions 48

Which of the following availability concerns is mitigated by having a business continuity site?

Options:

A.

Service outage

B.

Wiretapping

C.

Eavesdropping

D.

Replay attack

Buy Now
Questions 49

Which of the following filesystems is most commonly found on a computer running macOS?

Options:

A.

ext4

B.

FAT32

C.

HFS

D.

NTFS

Buy Now
Questions 50

Which of the following is a logical structure for storing files?

Options:

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Buy Now
Questions 51

Which of the following is best used to store many integers in one container?

Options:

A.

Array

B.

Function

C.

Variable

D.

Constant

Buy Now
Questions 52

Which of the following connection types provides the fastest internet speed?

Options:

A.

Cellular

B.

Asymmetric DSL

C.

Symmetric DSL

D.

Fiber to the curb

Buy Now
Questions 53

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

Options:

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Buy Now
Questions 54

A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?

Options:

A.

Compression

B.

Encryption

C.

Journaling

D.

Formatting

Buy Now
Questions 55

A business would like to create an employee portal that employees will have access to when they are at work.

The employees will not be able to connect to the portal from home without a VPN connection. Which of the

following types of application does this describe?

Options:

A.

Local application

B.

Intranet application

C.

Extranet application

D.

Internet application

Buy Now
Questions 56

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Buy Now
Questions 57

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

Options:

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Buy Now
Questions 58

An application is hosted on a local network. Which of the following descriptions is correct?

Options:

A.

LAN access Is required.

B.

The application exists locally.

C.

Files are saved in the cloud.

D.

Internet access Is required.

Buy Now
Questions 59

Which of the following is primarily a confidentiality concern?

Options:

A.

Eavesdropping

B.

Impersonating

C.

Destructing

D.

Altering

Buy Now
Questions 60

Which of the following business continuity concepts is the best example of fault tolerance?

Options:

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Buy Now
Questions 61

Which of the following storage types is MOST vulnerable to magnetic damage?

Options:

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Buy Now
Questions 62

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

Options:

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Buy Now
Questions 63

Which of the following can a company use to protect its logo?

Options:

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Buy Now
Questions 64

Which of the following filesystems is compatible with the greatest number of operating systems?

Options:

A.

ext4

B.

FAT32

C.

NTFS

D.

HFS

Buy Now
Questions 65

Which of the following BEST describes the physical location of the data in the database?

Options:

A.

Table

B.

Column

C.

RAM

D.

HDD

Buy Now
Questions 66

A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?

Options:

A.

If employeesalary is greater than $15 per hour employeesalary = employeesalary * 1.032

B.

For all employees in the list making less than $15 per hour employeesalary = employeesalary * 1.032

C.

If employeesalary is less than $15 per hour employeesalary = employeesalary * 3.2

D.

For all employees in the list making greater than $15 per hour employeesalary = employeesalary * 3.2

Buy Now
Questions 67

Which of the following operating systems is best used in creating and managing virtual machines?

Options:

A.

Mobile

B.

Hypervisor

C.

Embedded

D.

Firewall

Buy Now
Questions 68

A programmer uses DML to modify:

Options:

A.

files

B.

permissions

C.

data

D.

backups

Buy Now
Questions 69

Which of the following is required for a cloud network?

Options:

A.

Local applications

B.

Credentials

C.

Internet access

D.

Network infrastructure

Buy Now
Questions 70

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Options:

A.

Password reuse

B.

Snooping

C.

Social engineering

D.

Phishing

Buy Now
Questions 71

Which of the following is a quality of solutions created by web browsers?

A Proprietary

B. Cross-platform

C. Single platform

D. Site licensed

Options:

Buy Now
Questions 72

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

Options:

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Buy Now
Questions 73

A user opens an application that is installed locally on a PC. The application connects directly to a database that is located on a server in a data closet in the same building. Which of the following application architecture models does this describe?

Options:

A.

One tier

B.

Two tier

C.

Three tier

D.

Four tier

Buy Now
Questions 74

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Options:

A.

Antivirus

B.

Anti-malware

C.

Device Manager

D.

Host firewall

Buy Now
Questions 75

A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?

Options:

A.

Sending it as an encrypted email to the other employee

B.

Putting it in a shared drive on the company's network

C.

Printing it out and giving it to the employee

D.

Putting it on the company's cloud document site

Buy Now
Questions 76

Which of the following would a company consider an asset?

Options:

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Buy Now
Questions 77

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

Options:

A.

Non-repudiation

B.

Authentication

C.

Integrity

D.

Accounting

Buy Now
Questions 78

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

Options:

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Buy Now
Questions 79

Which of the following notational systems does the value 10AF01 indicate?

Options:

A.

Unicode

B.

Binary

C.

Hexadecimal

D.

Octal

Buy Now
Questions 80

Which of the following shows how many results are possible when evaluating Boolean data types?

Options:

A.

Two

B.

Four

C.

Three

D.

Five

Buy Now
Questions 81

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

Options:

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Buy Now
Questions 82

The IT department has established a new password policy for employees. Specifically, the policy reads:

    Passwords must not contain common dictionary words

    Passwords must contain at least one special character.

    Passwords must be different from the las six passwords used.

    Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

Options:

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Buy Now
Questions 83

Which of the following allows network traffic to pass through it and filters specific packets?

Options:

A.

Switch

B.

Access point

C.

Modem

D.

Firewall

Buy Now
Questions 84

Which of the following are the primary functions of an operating system? (Choose two.)

Options:

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Buy Now
Questions 85

On which of the following distinct numbers of digits is the hexadecimal numbering system based?

Options:

A.

2

B.

8

C.

10

D.

16

Buy Now
Questions 86

Which of the following is the least expensive way for users at a large company to load a 2GB spreadsheet quickly?

Options:

A.

Buy faster networking switches.

B.

Upgrade the operating system and applications.

C.

Move the file to a shared database.

D.

Add more RAM to each workstation.

Buy Now
Questions 87

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which

of the following devices is a user MOST likely to configure to allow this?

Options:

A.

Cable modem

B.

Wireless router

C.

Access point

D.

Network switch

Buy Now
Questions 88

Which of the following is an example of PI I? (Select two).

Options:

A.

Full name

B.

Date of birth

C.

Employment status

D.

School attended

E.

Social media username

F.

City of residence

Buy Now
Questions 89

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

Options:

A.

10

B.

14

C.

15

D.

17

Buy Now
Questions 90

Which of the following connection types is typically used for a display monitor?

Options:

A.

USB

B.

DVI

C.

Bluetooth

D.

RJ45

Buy Now
Questions 91

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

Options:

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Buy Now
Questions 92

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Buy Now
Questions 93

Which of the following data types should a database administrator use to store customer postal codes?

Options:

A.

Float

B.

String

C.

Boolean

D.

Integer

Buy Now
Questions 94

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

Options:

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Buy Now
Questions 95

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Buy Now
Questions 96

Which of the following would be the most secure password reset process?

Options:

A.

Ask users for their date of birth over the phone and reset their password.

B.

Ask users to answer custom questions and send reset codes via text.

C.

Ask users for their mother’s maiden name and email them a reset link.

D.

Ask users for their phone number and call them back with a PIN.

Buy Now
Questions 97

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Buy Now
Questions 98

An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?

Options:

A.

Presentation software

B.

Conferencing software

C.

Project management software

D.

Visual diagramming software

Buy Now
Questions 99

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

Options:

A.

Password manager

B.

Password reuse

C.

Password history

D.

Password reset

Buy Now
Questions 100

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Buy Now
Questions 101

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

Options:

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Buy Now
Questions 102

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

Options:

A.

USB

B.

NFC

C.

DSL

D.

DVI

Buy Now
Questions 103

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Nov 23, 2024
Questions: 344
FC0-U61 pdf

FC0-U61 PDF

$25.5  $84.99
FC0-U61 Engine

FC0-U61 Testing Engine

$30  $99.99
FC0-U61 PDF + Engine

FC0-U61 PDF + Testing Engine

$40.5  $134.99