Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Questions 4

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Buy Now
Questions 5

Which of the following internet service types is most susceptible to weather disruptions?

Options:

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Buy Now
Questions 6

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Buy Now
Questions 7

Which of the following would be the best reason to implement a host firewall?

Options:

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Buy Now
Questions 8

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

Options:

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Buy Now
Questions 9

Which of the following categories describes commands used to extract information from a database?

Options:

A.

DDL

B.

DDR

C.

DLL

D.

DML

Buy Now
Questions 10

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Options:

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Buy Now
Questions 11

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 12

The computer language that is closest to machine code is:

Options:

A.

query language

B.

scripting language

C.

markup language

D.

assembly language

Buy Now
Questions 13

Which of the following storage devices have a spinning disk? (Choose two.)

Options:

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Buy Now
Questions 14

A function is BEST used for enabling programs to:

Options:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Buy Now
Questions 15

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

Options:

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Buy Now
Questions 16

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Buy Now
Questions 17

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.

Web page

B.

List

C.

Flat file

D.

Database

Buy Now
Questions 18

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Buy Now
Questions 19

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Buy Now
Questions 20

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Buy Now
Questions 21

Which of the following best protects data in transit?

Options:

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Buy Now
Questions 22

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Buy Now
Questions 23

Which of the following storage types is MOST vulnerable to magnetic damage?

Options:

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Buy Now
Questions 24

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Options:

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Buy Now
Questions 25

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

Options:

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Buy Now
Questions 26

Which of the following connection types is typically used for a display monitor?

Options:

A.

USB

B.

DVI

C.

Bluetooth

D.

RJ45

Buy Now
Questions 27

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Options:

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

Buy Now
Questions 28

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Buy Now
Questions 29

A small company wants to set up a server that is accessible from the company network as well as the Internet.

Which of the following is MOST important to determine before allowing employees to access the server

remotely?

Options:

A.

The quality of the computer used to connect

B.

A security method of allowing connections

C.

The employees’ home ISP speeds

D.

The geographical location of the employees

Buy Now
Questions 30

A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

Options:

A.

USB

B.

HDMI

C.

FireWire

D.

VGA

E.

Bluetooth

F.

RJ45

Buy Now
Questions 31

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Buy Now
Questions 32

Which of the following is an advantage of a fiat file?

Options:

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Buy Now
Questions 33

Which of the following computer components allows for communication over a computer network?

Options:

A.

RAM

B.

NIC

C.

CPU

D.

NAS

Buy Now
Questions 34

Which of the following is an example of a compiled language?

Options:

A.

C++

B.

SQL

C.

Python

D.

XML

Buy Now
Questions 35

Which of the following can a company use to protect its logo?

Options:

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Buy Now
Questions 36

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

Buy Now
Questions 37

Which of the following would a company consider an asset?

Options:

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Buy Now
Questions 38

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Buy Now
Questions 39

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?

Options:

A.

Private

B.

Traditional

C.

Public

D.

Cloud

Buy Now
Questions 40

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Options:

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Buy Now
Questions 41

Which of the following best describes the differences between data and information?

Options:

A.

Data is a result of the analytical processing of information.

B.

Information is raw unstructured or uncorrected data.

C.

Information can exist without data.

D.

Data can be facts, figures, or events that can be processed to create information.

Buy Now
Questions 42

Which of the following filesystems would a Linux computer MOST likely use?

Options:

A.

HFS

B.

NTFS

C.

FAT32

D.

ext4

Buy Now
Questions 43

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Options:

A.

Phishing attack

B.

Social engineering

C.

On-path attack

D.

Eavesdropping

Buy Now
Questions 44

Which of the following are the basic computing operations?

Options:

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Buy Now
Questions 45

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of

application architectures did the employee use?

Options:

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

Buy Now
Questions 46

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?

Options:

A.

Group license

B.

Concurrent license

C.

Subscription license

D.

Open-source license

Buy Now
Questions 47

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Buy Now
Questions 48

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

Options:

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Buy Now
Questions 49

Which of the following database structures is the most granular?

Options:

A.

Column

B.

Field

C.

Record

D.

Table

Buy Now
Questions 50

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Buy Now
Questions 51

Which of the following commands can be used to remove a database permanently?

Options:

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Buy Now
Questions 52

Which of the following describes the concept of a database record?

Options:

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Buy Now
Questions 53

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

Options:

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Buy Now
Questions 54

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

Options:

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Buy Now
Questions 55

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

Options:

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Buy Now
Questions 56

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Buy Now
Questions 57

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

Options:

A.

USB

B.

NFC

C.

DSL

D.

DVI

Buy Now
Questions 58

Which of the following BEST describes a kilobyte?

Options:

A.

A kilobyte is a measurement of storage (e.g., 100KB).

B.

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.

A kilobyte is a measurement of power (e.g., 100KW).

D.

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Buy Now
Questions 59

Which of the following business continuity concepts is the best example of fault tolerance?

Options:

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Buy Now
Questions 60

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

Options:

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Buy Now
Questions 61

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Options:

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Buy Now
Questions 62

A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

Options:

A.

Database

B.

Webserver

C.

File

D.

Operating system

Buy Now
Questions 63

Which of the following is primarily a confidentiality concern?

Options:

A.

Eavesdropping

B.

Impersonating

C.

Destructing

D.

Altering

Buy Now
Questions 64

Which of the following file extensions is used for a consolidated group of files?

Options:

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Buy Now
Questions 65

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

Options:

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Buy Now
Questions 66

A programmer uses DML to modify:

Options:

A.

files

B.

permissions

C.

data

D.

backups

Buy Now
Questions 67

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Buy Now
Questions 68

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

Options:

A.

Non-repudiation

B.

Authentication

C.

Integrity

D.

Accounting

Buy Now
Questions 69

SQL databases use primary and foreign keys to enable which of the following?

Options:

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Apr 22, 2024
Questions: 231

PDF + Testing Engine

$66.4  $165.99

Testing Engine

$46  $114.99
buy now FC0-U61 testing engine

PDF (Q&A)

$42  $104.99
buy now FC0-U61 pdf