Weekend Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Questions 4

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Options:

A.

Concurrency

B.

Speed

C.

Scalability

D.

Variety

Buy Now
Questions 5

Which of the following operating systems is best used in creating and managing virtual machines?

Options:

A.

Mobile

B.

Hypervisor

C.

Embedded

D.

Firewall

Buy Now
Questions 6

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Buy Now
Questions 7

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

Options:

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Buy Now
Questions 8

A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?

Options:

A.

Update the device software.

B.

Enable passwords.

C.

Enable host IDS.

D.

Remove browser cookies.

Buy Now
Questions 9

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Buy Now
Questions 10

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

Options:

A.

Encryption

B.

Compression

C.

Permissions

D.

Auditing

Buy Now
Questions 11

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

Buy Now
Questions 12

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Options:

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Buy Now
Questions 13

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently

released new device. After configuring the new device utilizing the old SSID and key, some light switches are

no longer communicating. Which of the following is the MOST likely cause?

Options:

A.

The light switches do not support WPA2.

B.

The router is operating on a different channel.

C.

The key does not meet password complexity requirements.

D.

The SSID is not being broadcast.

Buy Now
Questions 14

Which of the following would be considered the BEST method of securely distributing medical records?

Options:

A.

Encrypted flash drive

B.

Social networking sites

C.

Fax

D.

FTP file sharing

Buy Now
Questions 15

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

Options:

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Buy Now
Questions 16

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Buy Now
Questions 17

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

Options:

A.

Performance Monitor

B.

Disk Management

C.

Event Viewer

D.

Device Manager

Buy Now
Questions 18

A developer needs to add a table to a database. Which of the following database activities should the user

perform?

Options:

A.

UPDATE

B.

ALTER

C.

CREATE

D.

REPORT

Buy Now
Questions 19

Which of the following best describes the process of comparing MD5 values after downloading software?

Options:

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Buy Now
Questions 20

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

Options:

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Buy Now
Questions 21

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Options:

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Buy Now
Questions 22

Which of the following would be the best reason to implement a host firewall?

Options:

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Buy Now
Questions 23

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Buy Now
Questions 24

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Buy Now
Questions 25

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

Options:

A.

Cellular

B.

Satellite

C.

Cable

D.

Fiber

Buy Now
Questions 26

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Buy Now
Questions 27

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Buy Now
Questions 28

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

Options:

A.

Branching

B.

Looping

C.

Pseudocode

D.

Syntax errors

Buy Now
Questions 29

A company wants to provide encrypted remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would best fulfill these requirements?

Options:

A.

Disk-level encryption

B.

Secure web gateway

C.

VPN

D.

AES

Buy Now
Questions 30

Which of the following is the closest to machine language?

Options:

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Buy Now
Questions 31

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

Options:

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Buy Now
Questions 32

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

Options:

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Buy Now
Questions 33

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Buy Now
Questions 34

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

Options:

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Buy Now
Questions 35

Which of the following is a compiled language?

Options:

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Buy Now
Questions 36

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

Options:

A.

127.0.0.1

B.

172.16.2.189

C.

192.168.257.1

D.

255.255.255.0

Buy Now
Questions 37

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

Options:

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Buy Now
Questions 38

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Buy Now
Questions 39

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Buy Now
Questions 40

A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?

Options:

A.

Variable

B.

Vector

C.

Constant

D.

Array

Buy Now
Questions 41

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 42

For which of the following is a relational database management system MOST commonly used?

Options:

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Buy Now
Questions 43

Which of the following would be the most cost-effective method to increase availability?

Options:

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Buy Now
Questions 44

Which of the following is the largest storage capacity?

Options:

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Buy Now
Questions 45

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

Options:

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Buy Now
Questions 46

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

Options:

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Buy Now
Questions 47

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Options:

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Buy Now
Questions 48

Which of the following is secure?

Options:

A.

.edu

B.

FTP

C.

HTTPS

D.

.org

E.

FAT32

Buy Now
Questions 49

When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?

Options:

A.

SMTP

B.

DHCP

C.

WPA

D.

DNS

E.

WEP

Buy Now
Questions 50

A user clicks a link to a web page to view a document, but nothing happens. Which of the following is most likely the issue?

Options:

A.

Scripting is disabled.

B.

The security settings are too high.

C.

Pop-up blockers are enabled.

D.

The web certificate is invalid.

Buy Now
Questions 51

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Options:

A.

Antivirus

B.

Anti-malware

C.

Device Manager

D.

Host firewall

Buy Now
Questions 52

Which of the following OS features would be best to use to remove unnecessary programs?

Options:

A.

Application management

B.

Disk management

C.

Process management

D.

Memory management

Buy Now
Questions 53

A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?

Options:

A.

Delete the tracking cookies.

B.

Avoid password reuse.

C.

Use a complex password.

D.

Clear the browser cache.

Buy Now
Questions 54

A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?

Options:

A.

LAN-hosted

B.

Local server-hosted

C.

Locally installed

D.

Cloud-hosted

Buy Now
Questions 55

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of

application architectures did the employee use?

Options:

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

Buy Now
Questions 56

A technician is investigating the who, what, when, where, and why of an issue. Which of the following steps of the troubleshooting methodology is the technician currently at?

Options:

A.

Identifying the problem

B.

Establishing a plan of action to resolve the issue

C.

Researching the issue

D.

Testing the theory to determine the cause

Buy Now
Questions 57

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Buy Now
Questions 58

A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?

Options:

A.

NTFS

B.

FAT32

C.

HFS

D.

ext4

Buy Now
Questions 59

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

Options:

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Buy Now
Questions 60

A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?

Options:

A.

RJ11

B.

RJ45

C.

USB

D.

Bluetooth

Buy Now
Questions 61

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

Options:

A.

Fiber

B.

DSL

C.

Cable

D.

Satellite

Buy Now
Questions 62

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

Options:

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Buy Now
Questions 63

After creating a database, which of the following would a developer most likely use to put data in a table?

Options:

A.

Concatenation

B.

Query

C.

Loop

D.

Macro

Buy Now
Questions 64

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.

Integer

B.

String

C.

Float

D.

Boolean

Buy Now
Questions 65

A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

Options:

A.

USB

B.

HDMI

C.

FireWire

D.

VGA

E.

Bluetooth

F.

RJ45

Buy Now
Questions 66

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

Options:

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Buy Now
Questions 67

Which of the following describes a unique entry to a data set?

Options:

A.

Schema

B.

Record

C.

Column

D.

Index

Buy Now
Questions 68

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

Options:

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Buy Now
Questions 69

A company is looking at locations for a new datacenter. The Chief Executive Officer (CEO) has stated that the new datacenter should be at least 500mi (805km) from the existing datacenter so one natural disaster will be unlikely to impact both datacenters. Which of the following is this best an example of?

Options:

A.

Confidentiality concerns

B.

Integrity concerns

C.

Replication concerns

D.

Availability concerns

Buy Now
Questions 70

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

Options:

A.

Integer

B.

Float

C.

Double

D.

String

Buy Now
Questions 71

Which of the following relational database constructs is used to ensure valid values are entered for a column?

Options:

A.

Schema

B.

Permissions

C.

Constraint

D.

Column

Buy Now
Questions 72

Which of the following language types most likely controls the way a web page looks?

Options:

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Buy Now
Questions 73

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

Options:

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Buy Now
Questions 74

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Options:

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Buy Now
Questions 75

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

Options:

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Buy Now
Questions 76

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Buy Now
Questions 77

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Buy Now
Questions 78

Which of the following commands can be used to remove a database permanently?

Options:

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Buy Now
Questions 79

Which of the following is the main purpose for a MAC address to identify?

Options:

A.

A user

B.

A piece of hardware

C.

An IP address

D.

A network

Buy Now
Questions 80

A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?

Options:

A.

Sending it as an encrypted email to the other employee

B.

Putting it in a shared drive on the company's network

C.

Printing it out and giving it to the employee

D.

Putting it on the company's cloud document site

Buy Now
Questions 81

Which of the following are benefits of a security awareness training program9 (Select two).

Options:

A.

Enhances overall security

B.

Provides information on how to avoid phishing

C.

Lowers the incidence of hardware failures

D.

Increases the availability of computers

E.

Advances end users' technical skills

F.

Creates IT security opportunities for end users

Buy Now
Questions 82

Which of the following interfaces is best for viewing database performance information?

Options:

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Buy Now
Questions 83

Which of the following best protects data in transit?

Options:

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Buy Now
Questions 84

Given the following pseudocode:

FC0-U61 Question 84

Which of the following is the output of the code?

Options:

A.

1

B.

9

C.

10

D.

11

Buy Now
Questions 85

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Buy Now
Questions 86

Which of the following operating systems is most likely to be used to provide the GUI for a workplace employee?

Options:

A.

Hypervisor

B.

Firmware

C.

Server

D.

Workstation

Buy Now
Questions 87

Which of the following commands would most likely be used to add data to an existing database table?

Options:

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Buy Now
Questions 88

A user connects a wireless router to a home network and notices another wireless access point uses the same name. Which of the following should the user change?

Options:

A.

Router default password

B.

Wireless channel

C.

Frequency

D.

Service set identifier

Buy Now
Questions 89

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

Options:

A.

T1 line

B.

Satellite

C.

Fiber optic

D.

DSL

Buy Now
Questions 90

Within a database, which of the following would be the best access method to use to display a subset of a table?

Options:

A.

UPDATE

B.

DROP

C.

SELECT

D.

INSERT

Buy Now
Questions 91

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Options:

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Buy Now
Questions 92

Which of the following database types would be best in which to place financial data?

Options:

A.

Unstructured

B.

Semi-structured

C.

Structured

D.

Spreadsheet

Buy Now
Questions 93

Which of the following filesystems would a Linux computer MOST likely use?

Options:

A.

HFS

B.

NTFS

C.

FAT32

D.

ext4

Buy Now
Questions 94

Which of the following is an example of an interpreted language?

Options:

A.

C++

B.

Java

C.

Python

D.

Go

Buy Now
Questions 95

Which of the following would most likely be used to verify a user is following an AUP?

Options:

A.

Application logs

B.

Security questions

C.

Access controls

D.

Biometric scans

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Oct 6, 2024
Questions: 318

PDF + Testing Engine

$58.1  $165.99

Testing Engine

$40.25  $114.99
buy now FC0-U61 testing engine

PDF (Q&A)

$36.75  $104.99
buy now FC0-U61 pdf