Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Questions 4

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Options:

A.

Phishing attack

B.

Social engineering

C.

On-path attack

D.

Eavesdropping

Buy Now
Questions 5

Which of the following concerns does installing cross-platform software address?

Options:

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Buy Now
Questions 6

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Options:

A.

Password reuse

B.

Snooping

C.

Social engineering

D.

Phishing

Buy Now
Questions 7

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Buy Now
Questions 8

Which of the following should privacy expectations on a company intranet be limited to?

Options:

A.

Precedents

B.

HR policy

C.

Word of mouth

D.

System usage agreements

Buy Now
Questions 9

Which of the following allows network traffic to pass through it and filters specific packets?

Options:

A.

Switch

B.

Access point

C.

Modem

D.

Firewall

Buy Now
Questions 10

Which of the following is a reason for using a UPS?

Options:

A.

To help with posture

B.

To clean power

C.

To prevent viruses

D.

To lessen eye strain

Buy Now
Questions 11

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

Options:

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Buy Now
Questions 12

A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?

Options:

A.

LAN-hosted

B.

Local server-hosted

C.

Locally installed

D.

Cloud-hosted

Buy Now
Questions 13

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?

Options:

A.

Variable

B.

Attribute

C.

Method

D.

Looping

Buy Now
Questions 14

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Buy Now
Questions 15

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

Options:

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Buy Now
Questions 16

Which of the following is the least expensive way for users at a large company to load a 2GB spreadsheet quickly?

Options:

A.

Buy faster networking switches.

B.

Upgrade the operating system and applications.

C.

Move the file to a shared database.

D.

Add more RAM to each workstation.

Buy Now
Questions 17

Which of the following BEST describes an application running on a typical operating system?

Options:

A.

Process

B.

Thread

C.

Function

D.

Task

Buy Now
Questions 18

Which of the following is an example of structured data?

Options:

A.

Video recordings

B.

Social media posts

C.

Photographs

D.

Phone numbers

Buy Now
Questions 19

An administrator is preparing a workstation for deployment. Which of the following is the first step the administrator should take in this process?

Options:

A.

Enable the host firewall.

B.

Install OS updates.

C.

Change the default administrator password.

D.

Remove unnecessary software.

Buy Now
Questions 20

Which of the following storage types presents the most likely security risk?

Options:

A.

Flash

B.

NAS

C.

SSD

D.

Cloud

Buy Now
Questions 21

Which of the following OS features would be best to use to remove unnecessary programs?

Options:

A.

Application management

B.

Disk management

C.

Process management

D.

Memory management

Buy Now
Questions 22

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

Options:

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Buy Now
Questions 23

After a patch of an enterprise server, applications were unable to load. The server administrator was able to resolve the issue. Which of the following is the next step the administrator should take?

Options:

A.

Test the theory to determine the cause.

B.

Document findings, actions, and outcomes.

C.

Establish a plan of action.

D.

Verify full system functionality.

Buy Now
Questions 24

An IP address is 32 bits long. If converted to bytes, it would be:

Options:

A.

4 bytes

B.

8 bytes

C.

16 bytes

D.

64 bytes

Buy Now
Questions 25

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Buy Now
Questions 26

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Options:

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Buy Now
Questions 27

Which of the following is most likely to disclose the data collection practices of an application?

Options:

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Buy Now
Questions 28

A user needs an interface that supports both video and data. Which of the following will meet this requirement?

Options:

A.

Thunderbolt

B.

VGA

C.

DVI

D.

FireWire

Buy Now
Questions 29

Which of the following contains reusable code?

Options:

A.

Constant

B.

Variable

C.

Function

D.

Array

Buy Now
Questions 30

A company is looking at locations for a new datacenter. The Chief Executive Officer (CEO) has stated that the new datacenter should be at least 500mi (805km) from the existing datacenter so one natural disaster will be unlikely to impact both datacenters. Which of the following is this best an example of?

Options:

A.

Confidentiality concerns

B.

Integrity concerns

C.

Replication concerns

D.

Availability concerns

Buy Now
Questions 31

A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?

Options:

A.

2.5MHz

B.

2.5Tbps

C.

2.5GB

D.

2.5GHz

Buy Now
Questions 32

Which of the following is most likely managed directly by the operating system?

Options:

A.

Email

B.

Database connections

C.

Memory allocation

D.

Instant messaging

Buy Now
Questions 33

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

Options:

A.

Establish a plan of action.

B.

Gather information

C.

Duplicate the problem.

D.

Find the root cause.

Buy Now
Questions 34

During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?

Options:

A.

Instant messaging

B.

Mobile applications

C.

Social media

D.

Video-sharing website

Buy Now
Questions 35

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.

Loop

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 36

Which of the following would work BEST stored as a flat file rather than stored in a database?

Options:

A.

Contact list

B.

Movie theater locations

C.

Directions to doctor’s office

D.

Store inventory

Buy Now
Questions 37

Which of the following is an advantage of installing an application to the cloud?

Options:

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Buy Now
Questions 38

A user is trying to set up a new wireless access point. Which of the following should the user do first?

Options:

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Buy Now
Questions 39

Which of the following can a company use to protect its logo?

Options:

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Buy Now
Questions 40

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Buy Now
Questions 41

Which of the following relational database constructs is used to ensure valid values are entered for a column?

Options:

A.

Schema

B.

Permissions

C.

Constraint

D.

Column

Buy Now
Questions 42

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

Options:

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Buy Now
Questions 43

of the following would most likely be used to protect the intellectual property of printed materials?

Options:

A.

Trademark

B.

Cease and desist

C.

Patent

D.

Copyright

Buy Now
Questions 44

Which of the following connection types is typically used for a display monitor?

Options:

A.

USB

B.

DVI

C.

Bluetooth

D.

RJ45

Buy Now
Questions 45

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Buy Now
Questions 46

A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?

Options:

A.

Sending it as an encrypted email to the other employee

B.

Putting it in a shared drive on the company's network

C.

Printing it out and giving it to the employee

D.

Putting it on the company's cloud document site

Buy Now
Questions 47

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

Options:

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Buy Now
Questions 48

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Buy Now
Questions 49

Which of the following operating systems is best used in creating and managing virtual machines?

Options:

A.

Mobile

B.

Hypervisor

C.

Embedded

D.

Firewall

Buy Now
Questions 50

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

Options:

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Buy Now
Questions 51

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

Buy Now
Questions 52

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

Options:

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Buy Now
Questions 53

Which of following PC components operates only as an input device?

Options:

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Buy Now
Questions 54

Which of the following is a compiled language?

Options:

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Buy Now
Questions 55

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

Options:

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Buy Now
Questions 56

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.

Integer

B.

String

C.

Float

D.

Boolean

Buy Now
Questions 57

Which of the following violates password best practices?

Options:

A.

Password reuse across sites

B.

Password history

C.

Password expiration

D.

Password complexity

Buy Now
Questions 58

Which of the following does a NoSQL database use to organize data?

Options:

A.

Primary keys

B.

Schemas

C.

Keys/values

D.

Tables

Buy Now
Questions 59

When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?

Options:

A.

SMTP

B.

DHCP

C.

WPA

D.

DNS

E.

WEP

Buy Now
Questions 60

An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?

Options:

A.

Type 1 hypervisor OS

B.

Server OS

C.

Embedded OS

D.

Workstation OS

Buy Now
Questions 61

Which of the following best describes when lo use an array?

Options:

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Buy Now
Questions 62

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Buy Now
Questions 63

Which of the following storage devices have a spinning disk? (Choose two.)

Options:

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Buy Now
Questions 64

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

Options:

A.

Add a switch and hardwire the users' laptops.

B.

Add a network router.

C.

Replace the users' laptops with desktop computers.

D.

Add an access point for the users.

Buy Now
Questions 65

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this

document for public use. Which of the following should the developer use to BEST protect the document?

Options:

A.

Patent

B.

Trademark

C.

Watermark

D.

Copyright

Buy Now
Questions 66

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

Options:

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Buy Now
Questions 67

Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?

Options:

A.

Host-based firewall

B.

Antivirus

C.

Patching

D.

Network-based firewall

Buy Now
Questions 68

Which of the following best protects data in transit?

Options:

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Buy Now
Questions 69

A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?

Options:

A.

Mobile phone

B.

Mouse

C.

Scanner

D.

External hard drive

Buy Now
Questions 70

Which of the following is the closest to machine language?

Options:

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Buy Now
Questions 71

Which of the following language types most likely controls the way a web page looks?

Options:

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Buy Now
Questions 72

Which of the following best describes the process of comparing MD5 values after downloading software?

Options:

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Buy Now
Questions 73

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

Options:

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Buy Now
Questions 74

For which of the following is a relational database management system MOST commonly used?

Options:

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Buy Now
Questions 75

An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?

Options:

A.

Flat file

B.

Document

C.

Database

D.

Spreadsheet

Buy Now
Questions 76

Which of the following security concerns is a threat to confidentiality?

Options:

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Buy Now
Questions 77

Multiple users need to access the same data simultaneously. Which of the following is the best place to store the data?

Options:

A.

Database

B.

Spreadsheet

C.

Text file

D.

Word processing document

Buy Now
Questions 78

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

Options:

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Buy Now
Questions 79

Which of the following would be the best reason to implement a host firewall?

Options:

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Buy Now
Questions 80

Which of the following are most likely to have a GUI? (Select two).

Options:

A.

PowerShell

B.

Windows

C.

Command Prompt

D.

macOS

E.

Z shell

F.

Bash

Buy Now
Questions 81

Which of the following is the exact number of bytes in a gigabyte?

Options:

A.

1,024 bytes

B.

1,048,576 bytes

C.

1,073,741,824 bytes

D.

1,099,511,627,776 bytes

Buy Now
Questions 82

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

Options:

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Buy Now
Questions 83

Which of the following is the most secure fllesystem?

Options:

A.

FAT32

B.

NFS

C.

NTFS

D.

exFAT

Buy Now
Questions 84

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Options:

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Buy Now
Questions 85

A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?

Options:

A.

SSO

B.

Software token

C.

PIN

D.

Multifactor authentication

Buy Now
Questions 86

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

Options:

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Buy Now
Questions 87

Which of the following is considered a traditional input and output device?

Options:

A.

Printer

B.

Hard drive

C.

Keyboard

D.

Display monitor

Buy Now
Questions 88

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

Options:

A.

Duplicate the problem

B.

Gather information

C.

QUESTION NO: users

D.

Divide and conquer

Buy Now
Questions 89

Which of the following categories describes commands used to extract information from a database?

Options:

A.

DDL

B.

DDR

C.

DLL

D.

DML

Buy Now
Questions 90

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Buy Now
Questions 91

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.

Web page

B.

List

C.

Flat file

D.

Database

Buy Now
Questions 92

Which of the following interfaces is best for viewing database performance information?

Options:

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Buy Now
Questions 93

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

Options:

A.

Cellular

B.

Satellite

C.

Cable

D.

Fiber

Buy Now
Questions 94

Which of the following should a technician do to fix stability issues on a workstation?

Options:

A.

Install a malicious software analyzer.

B.

Install a firewall.

C.

Install browsing controls.

D.

Install updates.

Buy Now
Questions 95

Which of the following best describes the differences between data and information?

Options:

A.

Data is a result of the analytical processing of information.

B.

Information is raw unstructured or uncorrected data.

C.

Information can exist without data.

D.

Data can be facts, figures, or events that can be processed to create information.

Buy Now
Questions 96

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Buy Now
Questions 97

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Buy Now
Questions 98

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

Options:

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Buy Now
Questions 99

Which of the following filesystems is most commonly found on a computer running macOS?

Options:

A.

ext4

B.

FAT32

C.

HFS

D.

NTFS

Buy Now
Questions 100

A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator most likely choose for the project?

Options:

A.

USB flash drive

B.

Solid-state drive

C.

Tape drive

D.

Hard disk

Buy Now
Questions 101

After a user connects a laptop to a newly purchased printer, the user is unable to print. Which of the following is most likely causing the issue?

Options:

A.

The OS updates have not been applied on the laptop.

B.

The security software is out of date.

C.

The printer drivers are not installed.

D.

The firewall has not been configured.

Buy Now
Questions 102

Which of the following best describes the technology utilized in digital wallets?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

RFID

Buy Now
Questions 103

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Nov 24, 2024
Questions: 344
FC0-U61 pdf

FC0-U61 PDF

$25.5  $84.99
FC0-U61 Engine

FC0-U61 Testing Engine

$30  $99.99
FC0-U61 PDF + Engine

FC0-U61 PDF + Testing Engine

$40.5  $134.99