Summer Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > IT Fundamentals > FC0-U61

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Question and Answers

Question # 4

Given the following pseudocode:

Which of the following is the output of the code?

A.

1

B.

9

C.

10

D.

11

Full Access
Question # 5

Which of following PC components operates only as an input device?

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Full Access
Question # 6

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Full Access
Question # 7

Which of the following programming languages would most likely include tables and the select command?

A.

Compiled

B.

Markup

C.

Query

D.

Scripting

Full Access
Question # 8

Which of the following describes the concept of a database record?

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Full Access
Question # 9

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

A.

Workstation

B.

Laptop

C.

Cellphone

D.

Thin client

Full Access
Question # 10

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Full Access
Question # 11

Which of the following would work BEST stored as a flat file rather than stored in a database?

A.

Contact list

B.

Movie theater locations

C.

Directions to doctor’s office

D.

Store inventory

Full Access
Question # 12

A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?

A.

Update the device software.

B.

Enable passwords.

C.

Enable host IDS.

D.

Remove browser cookies.

Full Access
Question # 13

An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?

A.

Type 1 hypervisor OS

B.

Server OS

C.

Embedded OS

D.

Workstation OS

Full Access
Question # 14

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

A.

USB

B.

NFC

C.

DSL

D.

DVI

Full Access
Question # 15

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Full Access
Question # 16

Which of the following business continuity concepts is the best example of fault tolerance?

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Full Access
Question # 17

Which of the following contains exactly four copper wires?

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Full Access
Question # 18

Which of the following are the basic computing operations?

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Full Access
Question # 19

Which of the following storage types is MOST vulnerable to magnetic damage?

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Full Access
Question # 20

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Full Access
Question # 21

Which of the following storage devices have a spinning disk? (Choose two.)

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Full Access
Question # 22

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which

of the following devices is a user MOST likely to configure to allow this?

A.

Cable modem

B.

Wireless router

C.

Access point

D.

Network switch

Full Access
Question # 23

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Full Access
Question # 24

Which of the following would be the best reason to implement a host firewall?

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Full Access
Question # 25

A UPS provides protection against:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Full Access
Question # 26

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Full Access
Question # 27

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

A.

Word processing

B.

Spreadsheet

C.

Text editor

D.

Visual diagramming

Full Access
Question # 28

Which of the following would be the most secure password reset process?

A.

Ask users for their date of birth over the phone and reset their password.

B.

Ask users to answer custom questions and send reset codes via text.

C.

Ask users for their mother’s maiden name and email them a reset link.

D.

Ask users for their phone number and call them back with a PIN.

Full Access
Question # 29

Which of the following is the exact number of bytes in a gigabyte?

A.

1,024 bytes

B.

1,048,576 bytes

C.

1,073,741,824 bytes

D.

1,099,511,627,776 bytes

Full Access
Question # 30

SQL databases use primary and foreign keys to enable which of the following?

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Full Access
Question # 31

Which of the following elements is most important in order for data reports to have value?

A.

Large sample sizes

B.

Daily data

C.

Frequent measurements

D.

Useful metrics

Full Access
Question # 32

Which of the following terms best describes the outcome of a text message that is encrypted from its original form?

A.

Cipher

B.

Vector

C.

Plain

D.

Algorithm

Full Access
Question # 33

Which of the following is both an input and output device?

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Full Access
Question # 34

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Full Access
Question # 35

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Full Access
Question # 36

of the following would most likely be used to protect the intellectual property of printed materials?

A.

Trademark

B.

Cease and desist

C.

Patent

D.

Copyright

Full Access
Question # 37

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

A.

Add a switch and hardwire the users' laptops.

B.

Add a network router.

C.

Replace the users' laptops with desktop computers.

D.

Add an access point for the users.

Full Access
Question # 38

Which of the following BEST describes an application running on a typical operating system?

A.

Process

B.

Thread

C.

Function

D.

Task

Full Access
Question # 39

A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?

A.

Variable

B.

Vector

C.

Constant

D.

Array

Full Access
Question # 40

A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?

A.

Restart the computer when done.

B.

Log off the computer.

C.

Use private browsing.

D.

Enable pop-up blocker.

Full Access
Question # 41

Which of the following BEST describes a kilobyte?

A.

A kilobyte is a measurement of storage (e.g., 100KB).

B.

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.

A kilobyte is a measurement of power (e.g., 100KW).

D.

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Full Access
Question # 42

Which of the following is best used to store many integers in one container?

A.

Array

B.

Function

C.

Variable

D.

Constant

Full Access
Question # 43

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Full Access
Question # 44

Which of the following commands would most likely be used to add data to an existing database table?

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Full Access
Question # 45

Which of the following would be the most cost-effective method to increase availability?

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Full Access
Question # 46

An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the best choice to perform this task?

A.

Router

B.

Firewall

C.

Switch

D.

Access point

Full Access
Question # 47

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Full Access
Question # 48

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Full Access
Question # 49

Which of the following concerns does installing cross-platform software address?

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Full Access
Question # 50

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Full Access
Question # 51

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Full Access
Question # 52

Which of the following is the largest storage capacity?

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Full Access
Question # 53

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

A.

Password reuse

B.

Snooping

C.

Social engineering

D.

Phishing

Full Access
Question # 54

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Full Access
Question # 55

Which of the following is most appropriate to list on a social media site about an employer?

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Full Access
Question # 56

A technician has successfully verified full system functionality after implementing the solution to a problem.

Which of the following is the NEXT troubleshooting step the technician should do?

A.

Determine if anything has changed.

B.

Document lessons learned.

C.

Establish a theory of probable cause.

D.

Duplicate the problem, if possible.

Full Access
Question # 57

Which of the following is something that would likely need a copyright?

A.

A new commercial software program

B.

A company's brand name

C.

A copy of a business contract

D.

An idea for computer communication

Full Access
Question # 58

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Full Access
Question # 59

Which of the following data types would be best for storing data representing a phone number?

A.

String

B.

Integer

C.

Float

D.

Char

Full Access
Question # 60

Which of the following programming concepts uses properties and attributes?

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Full Access
Question # 61

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?

A.

Group license

B.

Concurrent license

C.

Subscription license

D.

Open-source license

Full Access
Question # 62

Which of the following does a NoSQL database use to organize data?

A.

Primary keys

B.

Schemas

C.

Keys/values

D.

Tables

Full Access
Question # 63

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Full Access
Question # 64

Which of the following internet service types is most susceptible to weather disruptions?

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Full Access
Question # 65

A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?

A.

Motherboard

B.

BIOS

C.

SSD

D.

CPU

Full Access
Question # 66

Which of the following notational systems uses the most characters to represent the decimal number 10?

A.

Octal

B.

Hexadecimal

C.

Decimal

D.

Binary

Full Access
Question # 67

Which of the following should be done first when working on a potential issue?

A.

Implement a solution.

B.

Escalate the issue.

C.

Research the issue.

D.

Gather information.

Full Access
Question # 68

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Full Access
Question # 69

Which of the following interfaces is best for viewing database performance information?

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Full Access
Question # 70

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

A.

Integer

B.

Float

C.

Double

D.

String

Full Access
Question # 71

Which of the following best describes when lo use an array?

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Full Access
Question # 72

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

A.

Turn on private browsing

B.

Delete browsing history on program close.

C.

Notify when downloads are complete.

D.

Configure prompting before downloading content.

Full Access
Question # 73

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

A.

Output

B.

Storage

C.

Input

D.

Processing

Full Access
Question # 74

Which of the following categories describes commands used to extract information from a database?

A.

DDL

B.

DDR

C.

DLL

D.

DML

Full Access
Question # 75

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

A.

Data capture and collections

B.

Asset inventory inputs

C.

Sales statistics

D.

Average loss output

Full Access
Question # 76

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Full Access
Question # 77

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Full Access
Question # 78

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Full Access
Question # 79

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Full Access
Question # 80

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Full Access
Question # 81

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

A.

Input

B.

Output

C.

Storage

D.

Processing

Full Access
Question # 82

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

A.

Method

B.

Object

C.

Property

D.

Attribute

Full Access
Question # 83

Which of the following is primarily a confidentiality concern?

A.

Eavesdropping

B.

Impersonating

C.

Destructing

D.

Altering

Full Access
Question # 84

A user needs an interface that supports both video and data. Which of the following will meet this requirement?

A.

Thunderbolt

B.

VGA

C.

DVI

D.

FireWire

Full Access
Question # 85

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.

Which of the following is the most likely cause?

A.

Firewall settings

B.

Improper switch configuration

C.

Incorrect IP address

D.

Misconfigured access point

Full Access
Question # 86

Within a database, which of the following would be the best access method to use to display a subset of a table?

A.

UPDATE

B.

DROP

C.

SELECT

D.

INSERT

Full Access