Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > IT Fundamentals > FC0-U61

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Question and Answers

Question # 4

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Full Access
Question # 5

Which of the following BEST describes the purpose of a vector in programming?

A.

Storing a collection of data

B.

Repeating a similar operation

C.

Capturing user input

D.

Performing mathematical calculations

Full Access
Question # 6

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Full Access
Question # 7

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Full Access
Question # 8

Which of the following creates multifactor authentication when used with something you have?

A.

Single sign-on

B.

Hardware token

C.

Geolocation

D.

Password

Full Access
Question # 9

Which of the following best practices can be used to mitigate password reuse?

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Full Access
Question # 10

A programmer uses DML to modify:

A.

files

B.

permissions

C.

data

D.

backups

Full Access
Question # 11

Which of the following best describes the differences between data and information?

A.

Data is a result of the analytical processing of information.

B.

Information is raw unstructured or uncorrected data.

C.

Information can exist without data.

D.

Data can be facts, figures, or events that can be processed to create information.

Full Access
Question # 12

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Full Access
Question # 13

Which of the following is the closest to machine language?

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Full Access
Question # 14

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

A.

SMTP

B.

POP3

C.

SNMP

D.

DHCP

E.

ICMP

F.

SFTP

Full Access
Question # 15

The IT department has established a new password policy for employees. Specifically, the policy reads:

  • Passwords must not contain common dictionary words
  • Passwords must contain at least one special character.
  • Passwords must be different from the las six passwords used.
  • Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Full Access
Question # 16

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Full Access
Question # 17

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

A.

Encryption

B.

Compression

C.

Permissions

D.

Auditing

Full Access
Question # 18

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Full Access
Question # 19

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Full Access
Question # 20

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Full Access
Question # 21

Which of the following would be used to send messages using the SMTP protocol?

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Full Access
Question # 22

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Full Access
Question # 23

Which of the following best protects data in transit?

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Full Access
Question # 24

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A.

Proprietary software

B.

Commercial software

C.

Open-source software

D.

Cross-platform software

Full Access
Question # 25

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Full Access
Question # 26

Which of the following is both an input and output device?

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Full Access
Question # 27

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Full Access
Question # 28

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Full Access
Question # 29

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Full Access
Question # 30

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Full Access
Question # 31

Which of the following BEST describes the physical location of the data in the database?

A.

Table

B.

Column

C.

RAM

D.

HDD

Full Access
Question # 32

A small company wants to set up a server that is accessible from the company network as well as the Internet.

Which of the following is MOST important to determine before allowing employees to access the server

remotely?

A.

The quality of the computer used to connect

B.

A security method of allowing connections

C.

The employees’ home ISP speeds

D.

The geographical location of the employees

Full Access
Question # 33

A UPS provides protection against:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Full Access
Question # 34

When following the troubleshooting methodology, which of the following should be performed last?

A.

Document findings.

B.

Establish a plan.

C.

Determine the cause.

D.

Verify functionality.

Full Access
Question # 35

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

A.

Integer

B.

Float

C.

Double

D.

String

Full Access
Question # 36

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Full Access
Question # 37

Which of the following is an advantage of a fiat file?

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Full Access
Question # 38

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Full Access
Question # 39

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

A.

Permission

B.

Ink cartridge

C.

USB cable

D.

Driver

Full Access
Question # 40

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Full Access
Question # 41

Which of the following internet service types is most susceptible to weather disruptions?

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Full Access
Question # 42

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Full Access
Question # 43

Which of the following terms best describes the outcome of a text message that is encrypted from its original form?

A.

Cipher

B.

Vector

C.

Plain

D.

Algorithm

Full Access
Question # 44

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

A.

Output

B.

Storage

C.

Input

D.

Processing

Full Access
Question # 45

Which of the following commands can be used to remove a database permanently?

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Full Access
Question # 46

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Full Access
Question # 47

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Full Access
Question # 48

Which of the following data types should a database administrator use to store customer postal codes?

A.

Float

B.

String

C.

Boolean

D.

Integer

Full Access
Question # 49

Which of the following programming concepts uses properties and attributes?

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Full Access
Question # 50

A business would like to create an employee portal that employees will have access to when they are at work.

The employees will not be able to connect to the portal from home without a VPN connection. Which of the

following types of application does this describe?

A.

Local application

B.

Intranet application

C.

Extranet application

D.

Internet application

Full Access
Question # 51

A user needs an interface that supports both video and data. Which of the following will meet this requirement?

A.

Thunderbolt

B.

VGA

C.

DVI

D.

FireWire

Full Access
Question # 52

An application is hosted on a local network. Which of the following descriptions is correct?

A.

LAN access Is required.

B.

The application exists locally.

C.

Files are saved in the cloud.

D.

Internet access Is required.

Full Access
Question # 53

A technician has successfully verified full system functionality after implementing the solution to a problem.

Which of the following is the NEXT troubleshooting step the technician should do?

A.

Determine if anything has changed.

B.

Document lessons learned.

C.

Establish a theory of probable cause.

D.

Duplicate the problem, if possible.

Full Access
Question # 54

A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?

A.

Delete the tracking cookies.

B.

Avoid password reuse.

C.

Use a complex password.

D.

Clear the browser cache.

Full Access
Question # 55

A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

A.

Database

B.

Webserver

C.

File

D.

Operating system

Full Access
Question # 56

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Full Access
Question # 57

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Full Access
Question # 58

Which of the following requires the MOST frequent updating to remain effective?

A.

Antivirus

B.

Host firewall

C.

Web browser

D.

Device drivers

Full Access
Question # 59

Which of the following allows wireless devices to communicate to a wired network?

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Full Access
Question # 60

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

A.

10

B.

14

C.

15

D.

17

Full Access
Question # 61

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Full Access
Question # 62

In which of the following situations should there be come expectation of privacy?

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Full Access
Question # 63

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Full Access
Question # 64

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Full Access
Question # 65

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Full Access
Question # 66

Which of the following file extensions is used for a consolidated group of files?

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Full Access
Question # 67

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

A.

Server

B.

Tape library

C.

External HDD

D.

Workstation

Full Access
Question # 68

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Full Access
Question # 69

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

A.

Boolean

B.

Integer

C.

Float

D.

Char

Full Access