Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Questions 4

Which of the following explains the concept of database scalability?

Options:

A.

The ability to move from one vendor database to another

B.

The ability to increase resources easily as demand grows

C.

The ability to move from a flat file database to a relational database

D.

The ability to document the database schema automatically

Buy Now
Questions 5

A UPS provides protection against:

Options:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Buy Now
Questions 6

Which of the following is an example of structured data?

Options:

A.

Video recordings

B.

Social media posts

C.

Photographs

D.

Phone numbers

Buy Now
Questions 7

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Options:

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Buy Now
Questions 8

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Options:

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Buy Now
Questions 9

A user connects a wireless router to a home network and notices another wireless access point uses the same name. Which of the following should the user change?

Options:

A.

Router default password

B.

Wireless channel

C.

Frequency

D.

Service set identifier

Buy Now
Questions 10

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

Options:

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Buy Now
Questions 11

Which of the following is most likely to disclose the data collection practices of an application?

Options:

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Buy Now
Questions 12

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 13

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

Options:

A.

Performance Monitor

B.

Disk Management

C.

Event Viewer

D.

Device Manager

Buy Now
Questions 14

A user is trying to set up a new wireless access point. Which of the following should the user do first?

Options:

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Buy Now
Questions 15

Which of the following is a reason why complex passwords are required?

Options:

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Buy Now
Questions 16

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Buy Now
Questions 17

Which of the following components is most likely to have a dedicated, active cooling method to prevent it from overheating during operation?

Options:

A.

Hard drive

B.

Network interface card

C.

Processor

D.

Memory

Buy Now
Questions 18

A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?

Options:

A.

Motherboard

B.

BIOS

C.

SSD

D.

CPU

Buy Now
Questions 19

A technician has established a plan of action. Which of the following should the technician do next?

Options:

A.

Verify system functionality.

B.

Identify preventive measures.

C.

Document the findings.

D.

Implement a solution.

Buy Now
Questions 20

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Buy Now
Questions 21

Which of the following violates password best practices?

Options:

A.

Password reuse across sites

B.

Password history

C.

Password expiration

D.

Password complexity

Buy Now
Questions 22

A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?

Options:

A.

NTFS

B.

FAT32

C.

HFS

D.

ext4

Buy Now
Questions 23

Which of the following notational systems uses the most characters to represent the decimal number 10?

Options:

A.

Octal

B.

Hexadecimal

C.

Decimal

D.

Binary

Buy Now
Questions 24

A programmer uses DML to modify:

Options:

A.

files

B.

permissions

C.

data

D.

backups

Buy Now
Questions 25

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Buy Now
Questions 26

SQL databases use primary and foreign keys to enable which of the following?

Options:

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Buy Now
Questions 27

A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?

Options:

A.

If employeesalary is greater than $15 per hour employeesalary = employeesalary * 1.032

B.

For all employees in the list making less than $15 per hour employeesalary = employeesalary * 1.032

C.

If employeesalary is less than $15 per hour employeesalary = employeesalary * 3.2

D.

For all employees in the list making greater than $15 per hour employeesalary = employeesalary * 3.2

Buy Now
Questions 28

Which of the following software types is best suited for storing large amounts of data in a way that allows for concurrent, indexed access?

Options:

A.

Spreadsheet software

B.

Visual diagramming software

C.

Database software

D.

Presentation software

Buy Now
Questions 29

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

Options:

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Buy Now
Questions 30

Which of the following operating systems is best used in creating and managing virtual machines?

Options:

A.

Mobile

B.

Hypervisor

C.

Embedded

D.

Firewall

Buy Now
Questions 31

Which of the following business continuity concepts is the best example of fault tolerance?

Options:

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Buy Now
Questions 32

Which of the following internet service types is most susceptible to weather disruptions?

Options:

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Buy Now
Questions 33

Which of the following security concerns is a threat to confidentiality?

Options:

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Buy Now
Questions 34

A user opens an application that is installed locally on a PC. The application connects directly to a database that is located on a server in a data closet in the same building. Which of the following application architecture models does this describe?

Options:

A.

One tier

B.

Two tier

C.

Three tier

D.

Four tier

Buy Now
Questions 35

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Buy Now
Questions 36

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

Options:

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Buy Now
Questions 37

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Buy Now
Questions 38

An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?

Options:

A.

Presentation software

B.

Conferencing software

C.

Project management software

D.

Visual diagramming software

Buy Now
Questions 39

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Buy Now
Questions 40

Which of the following would a company consider an asset?

Options:

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Buy Now
Questions 41

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

Options:

A.

Word processing

B.

Spreadsheet

C.

Text editor

D.

Visual diagramming

Buy Now
Questions 42

Which of the following elements is most important in order for data reports to have value?

Options:

A.

Large sample sizes

B.

Daily data

C.

Frequent measurements

D.

Useful metrics

Buy Now
Questions 43

Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?

Options:

A.

Host-based firewall

B.

Antivirus

C.

Patching

D.

Network-based firewall

Buy Now
Questions 44

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

Options:

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Buy Now
Questions 45

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

Options:

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Buy Now
Questions 46

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

Options:

A.

Duplicate the problem

B.

Gather information

C.

QUESTION NO: users

D.

Divide and conquer

Buy Now
Questions 47

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

Options:

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Buy Now
Questions 48

Which of the following types of memory can retain its content after a system reboot?

Options:

A.

DDR

B.

DIMM

C.

RAM

D.

ROM

Buy Now
Questions 49

A software developer has created a program for the accounting department. The finance department requests the same program but requires some changes to the code to meet its needs. Which of the following should be performed?

Options:

A.

Compiling

B.

Looping

C.

Sequencing

D.

Branching

Buy Now
Questions 50

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Buy Now
Questions 51

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Buy Now
Questions 52

An application is hosted on a local network. Which of the following descriptions is correct?

Options:

A.

LAN access Is required.

B.

The application exists locally.

C.

Files are saved in the cloud.

D.

Internet access Is required.

Buy Now
Questions 53

Which of the following storage devices have a spinning disk? (Choose two.)

Options:

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Buy Now
Questions 54

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

Options:

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Buy Now
Questions 55

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Buy Now
Questions 56

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Buy Now
Questions 57

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?

Options:

A.

Private

B.

Traditional

C.

Public

D.

Cloud

Buy Now
Questions 58

Which of the following filesystems is compatible with the greatest number of operating systems?

Options:

A.

ext4

B.

FAT32

C.

NTFS

D.

HFS

Buy Now
Questions 59

A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).

Options:

A.

Private browsing is enabled.

B.

Extensions are out-of-date.

C.

Proxy settings are incorrect.

D.

An incompatible browser is being used.

E.

A pop-up blocker is enabled.

F.

An invalid certificate has been issued.

Buy Now
Questions 60

Which of the following programming languages would most likely include tables and the select command?

Options:

A.

Compiled

B.

Markup

C.

Query

D.

Scripting

Buy Now
Questions 61

Which of the following would be the best reason to implement a host firewall?

Options:

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Buy Now
Questions 62

Which of the following best describes the process of comparing MD5 values after downloading software?

Options:

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Buy Now
Questions 63

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?

Options:

A.

Group license

B.

Concurrent license

C.

Subscription license

D.

Open-source license

Buy Now
Questions 64

Multiple users need to access the same data simultaneously. Which of the following is the best place to store the data?

Options:

A.

Database

B.

Spreadsheet

C.

Text file

D.

Word processing document

Buy Now
Questions 65

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Buy Now
Questions 66

Which of the following allows wireless devices to communicate to a wired network?

Options:

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Buy Now
Questions 67

A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?

Options:

A.

Mobile phone

B.

Mouse

C.

Scanner

D.

External hard drive

Buy Now
Questions 68

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Buy Now
Questions 69

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Options:

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

Buy Now
Questions 70

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Buy Now
Questions 71

A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?

Options:

A.

Sending it as an encrypted email to the other employee

B.

Putting it in a shared drive on the company's network

C.

Printing it out and giving it to the employee

D.

Putting it on the company's cloud document site

Buy Now
Questions 72

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

Options:

A.

Branching

B.

Looping

C.

Pseudocode

D.

Syntax errors

Buy Now
Questions 73

Which of the following categories describes commands used to extract information from a database?

Options:

A.

DDL

B.

DDR

C.

DLL

D.

DML

Buy Now
Questions 74

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Buy Now
Questions 75

Which of the following best protects data in transit?

Options:

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Buy Now
Questions 76

NO: 56

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 77

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Buy Now
Questions 78

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Buy Now
Questions 79

Which of the following commands would most likely be used to add data to an existing database table?

Options:

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Buy Now
Questions 80

A small company wants to set up a server that is accessible from the company network as well as the Internet.

Which of the following is MOST important to determine before allowing employees to access the server

remotely?

Options:

A.

The quality of the computer used to connect

B.

A security method of allowing connections

C.

The employees’ home ISP speeds

D.

The geographical location of the employees

Buy Now
Questions 81

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

Options:

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Buy Now
Questions 82

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Options:

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Buy Now
Questions 83

A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator most likely choose for the project?

Options:

A.

USB flash drive

B.

Solid-state drive

C.

Tape drive

D.

Hard disk

Buy Now
Questions 84

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

Options:

A.

Establish a plan of action.

B.

Gather information

C.

Duplicate the problem.

D.

Find the root cause.

Buy Now
Questions 85

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Buy Now
Questions 86

Which of the following is required to view videos stored on a DVD?

Options:

A.

Solid-state drive

B.

Flash drive

C.

Hard drive

D.

Optical drive

Buy Now
Questions 87

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

Options:

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Buy Now
Questions 88

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Options:

A.

Antivirus

B.

Anti-malware

C.

Device Manager

D.

Host firewall

Buy Now
Questions 89

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Options:

A.

Password reuse

B.

Snooping

C.

Social engineering

D.

Phishing

Buy Now
Questions 90

Which of the following contains exactly four copper wires?

Options:

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Buy Now
Questions 91

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Options:

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Buy Now
Questions 92

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Buy Now
Questions 93

Which of the following programming concepts uses properties and attributes?

Options:

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Buy Now
Questions 94

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.

Loop

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 95

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Options:

A.

Concurrency

B.

Speed

C.

Scalability

D.

Variety

Buy Now
Questions 96

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

Options:

A.

SMTP

B.

POP3

C.

SNMP

D.

DHCP

E.

ICMP

F.

SFTP

Buy Now
Questions 97

An administrator is preparing a workstation for deployment. Which of the following is the first step the administrator should take in this process?

Options:

A.

Enable the host firewall.

B.

Install OS updates.

C.

Change the default administrator password.

D.

Remove unnecessary software.

Buy Now
Questions 98

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

Buy Now
Questions 99

Which of the following connection types is typically used for a display monitor?

Options:

A.

USB

B.

DVI

C.

Bluetooth

D.

RJ45

Buy Now
Questions 100

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

Options:

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Buy Now
Questions 101

Given the following pseudocode:

Which of the following is the output of the code?

Options:

A.

1

B.

9

C.

10

D.

11

Buy Now
Questions 102

Which of the following are the basic computing operations?

Options:

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Buy Now
Questions 103

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

Options:

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Nov 23, 2024
Questions: 344

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90