Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

CompTIA FC0-U61 Dumps

Page: 1 / 29
Total 286 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question 1

Which of the following is best used to store many integers in one container?

Options:

A.

Array

B.

Function

C.

Variable

D.

Constant

Question 2

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

Options:

A.

Output

B.

Storage

C.

Input

D.

Processing

Question 3

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

Options:

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Question 4

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Options:

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Question 5

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

Options:

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Question 6

Which of the following relational database constructs is used to ensure valid values are entered for a column?

Options:

A.

Schema

B.

Permissions

C.

Constraint

D.

Column

Question 7

Which of the following explains the concept of database scalability?

Options:

A.

The ability to move from one vendor database to another

B.

The ability to increase resources easily as demand grows

C.

The ability to move from a flat file database to a relational database

D.

The ability to document the database schema automatically

Question 8

Which of the following elements is most important in order for data reports to have value?

Options:

A.

Large sample sizes

B.

Daily data

C.

Frequent measurements

D.

Useful metrics

Question 9

A technician is investigating the who, what, when, where, and why of an issue. Which of the following steps of the troubleshooting methodology is the technician currently at?

Options:

A.

Identifying the problem

B.

Establishing a plan of action to resolve the issue

C.

Researching the issue

D.

Testing the theory to determine the cause

Question 10

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Question 11

Which of the following best explains the reason for password expiration?

Options:

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Question 12

Which of the following concerns does installing cross-platform software address?

Options:

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Question 13

An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?

Options:

A.

Presentation software

B.

Conferencing software

C.

Project management software

D.

Visual diagramming software

Question 14

Which of the following best protects data in transit?

Options:

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Question 15

Which of the following is the equivalent of 1 KB?

Options:

A.

0.01 googol

B.

1,000 bits

C.

8,000 bits

D.

8,000 bytes

Question 16

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Question 17

A technician is upgrading a company's Wi-Fi from 802.11a to support a range of 115ft (35m) indoors and a speed of 700Mbps. Which of the following should the technician select for the upgrade?

Options:

A.

802.11ac

B.

802.11b

C.

802.11g

D.

802.11n

Question 18

A program needs to choose apples, oranges, or bananas based on an input. Which of the following

programming constructs is BEST to use?

Options:

A.

Variable

B.

If

C.

Datatype

D.

Comment

Question 19

A UPS provides protection against:

Options:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Question 20

Which of the following is the largest storage capacity?

Options:

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Question 21

Which of the following terms best describes the outcome of a text message that is encrypted from its original form?

Options:

A.

Cipher

B.

Vector

C.

Plain

D.

Algorithm

Question 22

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

Options:

A.

Fiber

B.

DSL

C.

Cable

D.

Satellite

Question 23

A network administrator wants to keep track of all system messages and alerts. Which of the following would best allow for the administrator to follow trends?

Options:

A.

Logs

B.

Scheduled tasks

C.

Systems management console

D.

Systems notification tool

Question 24

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Question 25

Which of the following describes a unique entry to a data set?

Options:

A.

Schema

B.

Record

C.

Column

D.

Index

Question 26

A user connects a wireless router to a home network and notices another wireless access point uses the same name. Which of the following should the user change?

Options:

A.

Router default password

B.

Wireless channel

C.

Frequency

D.

Service set identifier

Question 27

Which of the following database structures is the most granular?

Options:

A.

Column

B.

Field

C.

Record

D.

Table

Question 28

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

Options:

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Question 29

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Options:

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Question 30

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

Options:

A.

Encryption

B.

Compression

C.

Permissions

D.

Auditing

Question 31

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

Options:

A.

USB

B.

NFC

C.

DSL

D.

DVI

Question 32

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Question 33

Consider the following statements:

as

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

Options:

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Question 34

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Question 35

Which of the following allows wireless devices to communicate to a wired network?

Options:

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Question 36

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

Options:

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Question 37

A function is BEST used for enabling programs to:

Options:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Question 38

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

Options:

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Question 39

A developer needs to add a table to a database. Which of the following database activities should the user

perform?

Options:

A.

UPDATE

B.

ALTER

C.

CREATE

D.

REPORT

Question 40

A company is concerned with ensuring its databases are highly available. Which of the following can be used to

increase database availability?

Options:

A.

Backups

B.

Prioritization

C.

Indexes

D.

Failover

Question 41

Which of the following is the most secure fllesystem?

Options:

A.

FAT32

B.

NFS

C.

NTFS

D.

exFAT

Question 42

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

Options:

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Question 43

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.

Array

B.

Vector

C.

List

D.

String

Question 44

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

Options:

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Question 45

A technician is troubleshooting an important application that is crashing every hour. The technician suspects that the installation is corrupt and needs to be reinstalled. Which of the following steps should be performed next?

Options:

A.

Verify full system functionality.

B.

Research the knowledge base.

C.

Identify the problem.

D.

Test the theory.

Question 46

Which of the following commands would most likely be used to add data to an existing database table?

Options:

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Question 47

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Question 48

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Options:

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Question 49

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

Options:

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Question 50

Which of the following does a NoSQL database use to organize data?

Options:

A.

Primary keys

B.

Schemas

C.

Keys/values

D.

Tables

Question 51

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Question 52

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Question 53

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

Options:

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Question 54

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Options:

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Question 55

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Options:

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Question 56

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Question 57

Given the following pseudocode:

as

Which of the following would be the output of the program?

Options:

A.

foohappy

B.

barsad

C.

foosad

D.

barhappy

Question 58

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Question 59

Which of the following is a reason why complex passwords are required?

Options:

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Question 60

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

Options:

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Question 61

Which of the following programming languages would most likely include tables and the select command?

Options:

A.

Compiled

B.

Markup

C.

Query

D.

Scripting

Question 62

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.

Method

B.

Object

C.

Property

D.

Attribute

Question 63

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Question 64

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Options:

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Question 65

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

Options:

A.

NFC

B.

Infrared

C.

Wi-Fi

D.

Bluetooth

Question 66

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

Options:

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Question 67

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which

of the following devices is a user MOST likely to configure to allow this?

Options:

A.

Cable modem

B.

Wireless router

C.

Access point

D.

Network switch

Question 68

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Options:

A.

Phishing attack

B.

Social engineering

C.

On-path attack

D.

Eavesdropping

Question 69

When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?

Options:

A.

SMTP

B.

DHCP

C.

WPA

D.

DNS

E.

WEP

Question 70

Which of the following is an example of a query language?

Options:

A.

C++

B.

Python

C.

XML

D.

SQL

Question 71

Which of the following statements BEST describes binary?

Options:

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Question 72

A technician has successfully verified full system functionality after implementing the solution to a problem.

Which of the following is the NEXT troubleshooting step the technician should do?

Options:

A.

Determine if anything has changed.

B.

Document lessons learned.

C.

Establish a theory of probable cause.

D.

Duplicate the problem, if possible.

Question 73

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 74

Which of the following storage devices have a spinning disk? (Choose two.)

Options:

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Question 75

Which of the following BEST describes the physical location of the data in the database?

Options:

A.

Table

B.

Column

C.

RAM

D.

HDD

Question 76

SQL databases use primary and foreign keys to enable which of the following?

Options:

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Question 77

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

Options:

A.

Open

B.

WEP

C.

WPA

D.

WPA2

Question 78

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Question 79

When following the troubleshooting methodology, which of the following should be performed last?

Options:

A.

Document findings.

B.

Establish a plan.

C.

Determine the cause.

D.

Verify functionality.

Question 80

Which of the following is something that would likely need a copyright?

Options:

A.

A new commercial software program

B.

A company's brand name

C.

A copy of a business contract

D.

An idea for computer communication

Question 81

Which of the following would be the most secure password reset process?

Options:

A.

Ask users for their date of birth over the phone and reset their password.

B.

Ask users to answer custom questions and send reset codes via text.

C.

Ask users for their mother’s maiden name and email them a reset link.

D.

Ask users for their phone number and call them back with a PIN.

Question 82

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

Options:

A.

redundancy.

B.

replication.

C.

prioritization.

D.

fault tolerance.

Question 83

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

Options:

A.

Word processing

B.

Spreadsheet

C.

Text editor

D.

Visual diagramming

Question 84

Which of the following OS features would be best to use to remove unnecessary programs?

Options:

A.

Application management

B.

Disk management

C.

Process management

D.

Memory management

Question 85

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Options:

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Page: 1 / 29
Total 286 questions