11.11 Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA FC0-U61 Dumps Questions Answers

Page: 1 / 26
Total 344 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question 1

Employee information is stored in a database. Which of the following BEST describes where all of an

employee’s information is stored?

Options:

A.

Record

B.

Report

C.

Column

D.

Procedure

Buy Now
Question 2

Which of the following best explains the reason for password expiration?

Options:

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Question 3

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

Options:

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Question 4

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

Options:

A.

NFC

B.

Infrared

C.

Wi-Fi

D.

Bluetooth

Question 5

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

Options:

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Question 6

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this

document for public use. Which of the following should the developer use to BEST protect the document?

Options:

A.

Patent

B.

Trademark

C.

Watermark

D.

Copyright

Question 7

Which of the following data types would be best for storing data representing a phone number?

Options:

A.

String

B.

Integer

C.

Float

D.

Char

Question 8

Which of the following shows how many results are possible when evaluating Boolean data types?

Options:

A.

Two

B.

Four

C.

Three

D.

Five

Question 9

SQL databases use primary and foreign keys to enable which of the following?

Options:

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Question 10

A technician has established a plan of action. Which of the following should the technician do next?

Options:

A.

Verify system functionality.

B.

Identify preventive measures.

C.

Document the findings.

D.

Implement a solution.

Question 11

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Question 12

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Question 13

Which of the following is an advantage of installing an application to the cloud?

Options:

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Question 14

During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?

Options:

A.

Instant messaging

B.

Mobile applications

C.

Social media

D.

Video-sharing website

Question 15

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

Options:

A.

Update from 802.11b to 802.11g.

B.

Ensure sources of EMI are removed.

C.

Enable WPA2-Enterprise.

D.

Use WiFi Protected Setup.

Question 16

Which of the following would be the most secure password reset process?

Options:

A.

Ask users for their date of birth over the phone and reset their password.

B.

Ask users to answer custom questions and send reset codes via text.

C.

Ask users for their mother’s maiden name and email them a reset link.

D.

Ask users for their phone number and call them back with a PIN.

Question 17

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

Options:

A.

Non-repudiation

B.

Authentication

C.

Integrity

D.

Accounting

Question 18

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Question 19

Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?

Options:

A.

Disk

B.

Email

C.

VPN

D.

HTTPS

Question 20

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.

Web page

B.

List

C.

Flat file

D.

Database

Question 21

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

Options:

A.

Output

B.

Storage

C.

Input

D.

Processing

Question 22

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

Options:

A.

Add a switch and hardwire the users' laptops.

B.

Add a network router.

C.

Replace the users' laptops with desktop computers.

D.

Add an access point for the users.

Question 23

Which of the following would indicate the FASTEST processor speed?

Options:

A.

3.6GHz

B.

3.6MHz

C.

3.6Mbps

D.

3.6Gbps

Question 24

Which of the following BEST describes a kilobyte?

Options:

A.

A kilobyte is a measurement of storage (e.g., 100KB).

B.

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.

A kilobyte is a measurement of power (e.g., 100KW).

D.

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Question 25

A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

Options:

A.

Database

B.

Webserver

C.

File

D.

Operating system

Question 26

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

Options:

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Question 27

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

Options:

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Question 28

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

Options:

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Question 29

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Question 30

Which of the following language types most likely controls the way a web page looks?

Options:

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Question 31

Which of the following is a wireless communication that requires devices to be within 6in of each other to

transfer information?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

WiFi

Question 32

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

Options:

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Question 33

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.

Method

B.

Object

C.

Property

D.

Attribute

Question 34

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Options:

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Question 35

A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?

Options:

A.

SSO

B.

Software token

C.

PIN

D.

Multifactor authentication

Question 36

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Question 37

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

Options:

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Question 38

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Question 39

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Question 40

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Options:

A.

Password reuse

B.

Snooping

C.

Social engineering

D.

Phishing

Question 41

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

Options:

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Question 42

Which of the following filesystems is most commonly found on a computer running macOS?

Options:

A.

ext4

B.

FAT32

C.

HFS

D.

NTFS

Question 43

Which of the following is a logical structure for storing files?

Options:

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Question 44

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

Options:

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Question 45

A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?

Options:

A.

Private browsing

B.

Pop-up blockers

C.

Bookmarks

D.

Accessibility

Question 46

Which of the following security concerns is a threat to confidentiality?

Options:

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Question 47

Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?

Options:

A.

Host-based firewall

B.

Antivirus

C.

Patching

D.

Network-based firewall

Question 48

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Options:

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Question 49

A UPS provides protection against:

Options:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Question 50

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Question 51

A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?

Options:

A.

Mobile phone

B.

Mouse

C.

Scanner

D.

External hard drive

Question 52

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

Options:

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Question 53

Which of the following is the main purpose for a MAC address to identify?

Options:

A.

A user

B.

A piece of hardware

C.

An IP address

D.

A network

Question 54

Which of the following database types would be best in which to place financial data?

Options:

A.

Unstructured

B.

Semi-structured

C.

Structured

D.

Spreadsheet

Question 55

Which of the following programming concepts uses properties and attributes?

Options:

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Question 56

Which of the following is a reason why complex passwords are required?

Options:

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Question 57

Which of the following types of memory can retain its content after a system reboot?

Options:

A.

DDR

B.

DIMM

C.

RAM

D.

ROM

Question 58

Given the following pseudocode:

Which of the following is the output of the code?

Options:

A.

1

B.

9

C.

10

D.

11

Question 59

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

Options:

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Question 60

On which of the following distinct numbers of digits is the hexadecimal numbering system based?

Options:

A.

2

B.

8

C.

10

D.

16

Question 61

Which of the following allows wireless devices to communicate to a wired network?

Options:

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Question 62

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.

Integer

B.

String

C.

Float

D.

Boolean

Question 63

Which of the following software types is best suited for storing large amounts of data in a way that allows for concurrent, indexed access?

Options:

A.

Spreadsheet software

B.

Visual diagramming software

C.

Database software

D.

Presentation software

Question 64

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Options:

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Question 65

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Question 66

Which of the following business continuity concepts is the best example of fault tolerance?

Options:

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Question 67

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

Options:

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Question 68

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

Options:

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Question 69

Which of the following describes the concept of a database record?

Options:

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Question 70

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Question 71

A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?

Options:

A.

2.5MHz

B.

2.5Tbps

C.

2.5GB

D.

2.5GHz

Question 72

An IP address is 32 bits long. If converted to bytes, it would be:

Options:

A.

4 bytes

B.

8 bytes

C.

16 bytes

D.

64 bytes

Question 73

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Question 74

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

Options:

A.

Performance Monitor

B.

Disk Management

C.

Event Viewer

D.

Device Manager

Question 75

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Question 76

Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?

Options:

A.

RAM

B.

NIC

C.

GPU

D.

CPU

Question 77

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

Options:

A.

Integer

B.

Float

C.

Double

D.

String

Question 78

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Options:

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Question 79

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

Options:

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Question 80

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Options:

A.

Phishing attack

B.

Social engineering

C.

On-path attack

D.

Eavesdropping

Question 81

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Options:

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Question 82

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

Options:

A.

USB

B.

NFC

C.

DSL

D.

DVI

Question 83

An application is hosted on a local network. Which of the following descriptions is correct?

Options:

A.

LAN access Is required.

B.

The application exists locally.

C.

Files are saved in the cloud.

D.

Internet access Is required.

Question 84

Which of the following operating systems is best used in creating and managing virtual machines?

Options:

A.

Mobile

B.

Hypervisor

C.

Embedded

D.

Firewall

Question 85

A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?

Options:

A.

Variable

B.

Vector

C.

Constant

D.

Array

Question 86

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

Options:

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Question 87

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

Options:

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Question 88

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

Options:

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Question 89

Which of the following BEST describes the purpose of a vector in programming?

Options:

A.

Storing a collection of data

B.

Repeating a similar operation

C.

Capturing user input

D.

Performing mathematical calculations

Question 90

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Options:

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Question 91

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Question 92

Which of the following is most likely to disclose the data collection practices of an application?

Options:

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Question 93

Which of the following can a company use to protect its logo?

Options:

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Question 94

A user is trying to set up a new wireless access point. Which of the following should the user do first?

Options:

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Question 95

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Question 96

Which of the following is an advantage of using locally saved files?

Options:

A.

Readily shareable with others

B.

No reliance on local backups

C.

Immediately accessible by others on the cloud

D.

No dependence on network connection

Question 97

After creating a database, which of the following would a developer most likely use to put data in the database?

Options:

A.

UPDATE

B.

ALTER

C.

INSERT

D.

SELECT

Question 98

Which of the following connection types provides the fastest internet speed?

Options:

A.

Cellular

B.

Asymmetric DSL

C.

Symmetric DSL

D.

Fiber to the curb

Question 99

Which of the following would most likely be used to verify a user is following an AUP?

Options:

A.

Application logs

B.

Security questions

C.

Access controls

D.

Biometric scans

Question 100

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Question 101

Which of the following operating systems is most likely to be used to provide the GUI for a workplace employee?

Options:

A.

Hypervisor

B.

Firmware

C.

Server

D.

Workstation

Question 102

Which of the following is secure?

Options:

A.

.edu

B.

FTP

C.

HTTPS

D.

.org

E.

FAT32

Question 103

Which of the following would work BEST stored as a flat file rather than stored in a database?

Options:

A.

Contact list

B.

Movie theater locations

C.

Directions to doctor’s office

D.

Store inventory

Page: 1 / 26
Total 344 questions