Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Questions 4

After creating a database, which of the following would a developer most likely use to put data in the database?

Options:

A.

UPDATE

B.

ALTER

C.

INSERT

D.

SELECT

Buy Now
Questions 5

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

Options:

A.

Non-repudiation

B.

Authentication

C.

Integrity

D.

Accounting

Buy Now
Questions 6

Which of the following would MOST likely use an ARM processor?

Options:

A.

Laptop

B.

Tablet

C.

Workstation

D.

Server

Buy Now
Questions 7

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Buy Now
Questions 8

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Buy Now
Questions 9

Which of the following is the largest storage capacity?

Options:

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Buy Now
Questions 10

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Buy Now
Questions 11

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Buy Now
Questions 12

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Buy Now
Questions 13

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

Options:

A.

Cellular

B.

Satellite

C.

Cable

D.

Fiber

Buy Now
Questions 14

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

Options:

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Buy Now
Questions 15

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Buy Now
Questions 16

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Buy Now
Questions 17

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Buy Now
Questions 18

A company requires several reports that analyze related information from sales, inventory, marketing, and

compensation data. Which of the following is the BEST place to store this data?

Options:

A.

Flat file

B.

Word processor

C.

Database

D.

Network share

Buy Now
Questions 19

Which of the following should be done first when working on a potential issue?

Options:

A.

Implement a solution.

B.

Escalate the issue.

C.

Research the issue.

D.

Gather information.

Buy Now
Questions 20

Which of the following commands can be used to remove a database permanently?

Options:

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Buy Now
Questions 21

In an effort to reduce costs, a company decides not to renew its contract for a secure shredding service. Which of the following risks should the management team most likely be concerned with if employees fail to properly dispose of documents according to security protocols?

Options:

A.

Dumpster diving

B.

Snooping

C.

Unauthorized information alteration

D.

Social engineering

Buy Now
Questions 22

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Buy Now
Questions 23

An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?

Options:

A.

Presentation software

B.

Conferencing software

C.

Project management software

D.

Visual diagramming software

Buy Now
Questions 24

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.

Integer

B.

String

C.

Float

D.

Boolean

Buy Now
Questions 25

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 26

Which of the following commands would most likely be used to add data to an existing database table?

Options:

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Buy Now
Questions 27

Which of the following elements is most important in order for data reports to have value?

Options:

A.

Large sample sizes

B.

Daily data

C.

Frequent measurements

D.

Useful metrics

Buy Now
Questions 28

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Buy Now
Questions 29

Which of the following creates multifactor authentication when used with something you have?

Options:

A.

Single sign-on

B.

Hardware token

C.

Geolocation

D.

Password

Buy Now
Questions 30

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Options:

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Buy Now
Questions 31

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Options:

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Buy Now
Questions 32

Which of the following is primarily a confidentiality concern?

Options:

A.

Eavesdropping

B.

Impersonating

C.

Destructing

D.

Altering

Buy Now
Questions 33

Which of the following is an example of structured data?

Options:

A.

Video recordings

B.

Social media posts

C.

Photographs

D.

Phone numbers

Buy Now
Questions 34

of the following would most likely be used to protect the intellectual property of printed materials?

Options:

A.

Trademark

B.

Cease and desist

C.

Patent

D.

Copyright

Buy Now
Questions 35

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

Options:

A.

Password manager

B.

Password reuse

C.

Password history

D.

Password reset

Buy Now
Questions 36

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

Options:

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Buy Now
Questions 37

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

Options:

A.

Update from 802.11b to 802.11g.

B.

Ensure sources of EMI are removed.

C.

Enable WPA2-Enterprise.

D.

Use WiFi Protected Setup.

Buy Now
Questions 38

Which of the following security concerns is a threat to confidentiality?

Options:

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Buy Now
Questions 39

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

Options:

A.

Open

B.

WEP

C.

WPA

D.

WPA2

Buy Now
Questions 40

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.

Loop

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 41

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

Options:

A.

Turn on private browsing

B.

Delete browsing history on program close.

C.

Notify when downloads are complete.

D.

Configure prompting before downloading content.

Buy Now
Questions 42

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

Options:

A.

Performance Monitor

B.

Disk Management

C.

Event Viewer

D.

Device Manager

Buy Now
Questions 43

Which of the following is a reason why complex passwords are required?

Options:

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Buy Now
Questions 44

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of

application architectures did the employee use?

Options:

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

Buy Now
Questions 45

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

Options:

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Buy Now
Questions 46

Which of the following is a wireless communication that requires devices to be within 6in of each other to

transfer information?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

WiFi

Buy Now
Questions 47

Which of the following would most likely be used to verify a user is following an AUP?

Options:

A.

Application logs

B.

Security questions

C.

Access controls

D.

Biometric scans

Buy Now
Questions 48

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

Options:

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Buy Now
Questions 49

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Buy Now
Questions 50

Which of the following describes a unique entry to a data set?

Options:

A.

Schema

B.

Record

C.

Column

D.

Index

Buy Now
Questions 51

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

Options:

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Buy Now
Questions 52

A programmer uses DML to modify:

Options:

A.

files

B.

permissions

C.

data

D.

backups

Buy Now
Questions 53

A programmer is tasked with providing a human-readable rough draft of output. Which of the following techniques would be used?

Options:

A.

Flowchart

B.

Pseudocode

C.

Sequencing

D.

Network diagram

Buy Now
Questions 54

Which of the following protocols is used to relay email from a user's mail server?

Options:

A.

IMAP

B.

FTP

C.

SMTP

D.

POP3

Buy Now
Questions 55

Which of the following explains the concept of database scalability?

Options:

A.

The ability to move from one vendor database to another

B.

The ability to increase resources easily as demand grows

C.

The ability to move from a flat file database to a relational database

D.

The ability to document the database schema automatically

Buy Now
Questions 56

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

Options:

A.

a storage area network.

B.

an embedded OS.

C.

network attached storage.

D.

a Type 1 hypervisor.

Buy Now
Questions 57

Which of the following best describes when lo use an array?

Options:

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Buy Now
Questions 58

A technician is troubleshooting an important application that is crashing every hour. The technician suspects that the installation is corrupt and needs to be reinstalled. Which of the following steps should be performed next?

Options:

A.

Verify full system functionality.

B.

Research the knowledge base.

C.

Identify the problem.

D.

Test the theory.

Buy Now
Questions 59

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

Options:

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Buy Now
Questions 60

Which of the following is an example of PI I? (Select two).

Options:

A.

Full name

B.

Date of birth

C.

Employment status

D.

School attended

E.

Social media username

F.

City of residence

Buy Now
Questions 61

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Buy Now
Questions 62

Which of the following shows how many results are possible when evaluating Boolean data types?

Options:

A.

Two

B.

Four

C.

Three

D.

Five

Buy Now
Questions 63

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Buy Now
Questions 64

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Buy Now
Questions 65

A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?

Options:

A.

Web-based

B.

IP-based

C.

Driver

D.

Plug-and-play

Buy Now
Questions 66

A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?

Options:

A.

Update the device software.

B.

Enable passwords.

C.

Enable host IDS.

D.

Remove browser cookies.

Buy Now
Questions 67

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Options:

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Buy Now
Questions 68

Which of the following is an example of an interpreted language?

Options:

A.

C++

B.

Java

C.

Python

D.

Go

Buy Now
Questions 69

A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

Options:

A.

Database

B.

Webserver

C.

File

D.

Operating system

Buy Now
Questions 70

A function is BEST used for enabling programs to:

Options:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Buy Now
Questions 71

Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?

Options:

A.

Disk

B.

Email

C.

VPN

D.

HTTPS

Buy Now
Questions 72

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

Options:

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Buy Now
Questions 73

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

Options:

A.

Data capture and collections

B.

Asset inventory inputs

C.

Sales statistics

D.

Average loss output

Buy Now
Questions 74

SQL databases use primary and foreign keys to enable which of the following?

Options:

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Buy Now
Questions 75

Which of the following is a value that uniquely identifies a database record?

Options:

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Buy Now
Questions 76

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

Options:

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Buy Now
Questions 77

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

Options:

A.

SMTP

B.

POP3

C.

SNMP

D.

DHCP

E.

ICMP

F.

SFTP

Buy Now
Questions 78

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Buy Now
Questions 79

The IT department has established a new password policy for employees. Specifically, the policy reads:

  • Passwords must not contain common dictionary words
  • Passwords must contain at least one special character.
  • Passwords must be different from the las six passwords used.
  • Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

Options:

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Buy Now
Questions 80

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

Options:

A.

Word processing

B.

Spreadsheet

C.

Text editor

D.

Visual diagramming

Buy Now
Questions 81

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Options:

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

Buy Now
Questions 82

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

Options:

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Buy Now
Questions 83

A company is concerned with ensuring its databases are highly available. Which of the following can be used to

increase database availability?

Options:

A.

Backups

B.

Prioritization

C.

Indexes

D.

Failover

Buy Now
Questions 84

Which of the following methods of cooling is most commonly used for desktops?

Options:

A.

Active

B.

External

C.

Cryogenics

D.

Water

Buy Now
Questions 85

Which of the following is required to view videos stored on a DVD?

Options:

A.

Solid-state drive

B.

Flash drive

C.

Hard drive

D.

Optical drive

Buy Now
Questions 86

A user is trying to set up a new wireless access point. Which of the following should the user do first?

Options:

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Jun 17, 2024
Questions: 288
FC0-U61 pdf

FC0-U61 PDF

$28  $80
FC0-U61 Engine

FC0-U61 Testing Engine

$33.25  $95
FC0-U61 PDF + Engine

FC0-U61 PDF + Testing Engine

$45.5  $130