Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CompTIA FC0-U61 Dumps

Page: 1 / 34
Total 344 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question 1

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Options:

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Question 2

A business would like to create an employee portal that employees will have access to when they are at work.

The employees will not be able to connect to the portal from home without a VPN connection. Which of the

following types of application does this describe?

Options:

A.

Local application

B.

Intranet application

C.

Extranet application

D.

Internet application

Question 3

Which of the following storage types presents the most likely security risk?

Options:

A.

Flash

B.

NAS

C.

SSD

D.

Cloud

Question 4

A small company wants to set up a server that is accessible from the company network as well as the Internet.

Which of the following is MOST important to determine before allowing employees to access the server

remotely?

Options:

A.

The quality of the computer used to connect

B.

A security method of allowing connections

C.

The employees’ home ISP speeds

D.

The geographical location of the employees

Question 5

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

Options:

A.

NFC

B.

Infrared

C.

Wi-Fi

D.

Bluetooth

Question 6

Which of the following is an example of a query language?

Options:

A.

C++

B.

Python

C.

XML

D.

SQL

Question 7

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Question 8

A user logs into a laptop using a username and complex password. This is an example of:

Options:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Question 9

Which of the following backup types is most likely to allow restoration of a fully bootable computer on new hardware?

Options:

A.

File-level backups

B.

Critical data backups

C.

System backups

D.

Database backups

Question 10

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

Options:

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Question 11

Which of the following contains exactly four copper wires?

Options:

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Question 12

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.

Loop

B.

Variable

C.

Constant

D.

Function

Question 13

Which of the following best describes the technology utilized in digital wallets?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

RFID

Question 14

Which of the following database concepts would MOST likely use a CSV file?

Options:

A.

Data querying

B.

Data reports

C.

Data importing

D.

Data persistence

Question 15

Which of the following is best used to store many integers in one container?

Options:

A.

Array

B.

Function

C.

Variable

D.

Constant

Question 16

When following the troubleshooting methodology, which of the following should be performed last?

Options:

A.

Document findings.

B.

Establish a plan.

C.

Determine the cause.

D.

Verify functionality.

Question 17

Which of following PC components operates only as an input device?

Options:

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Question 18

Which of the following is most likely to disclose the data collection practices of an application?

Options:

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Question 19

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Question 20

Which of the following shows how many results are possible when evaluating Boolean data types?

Options:

A.

Two

B.

Four

C.

Three

D.

Five

Question 21

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Question 22

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

Options:

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Question 23

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Question 24

Which of the following filesystems is compatible with the greatest number of operating systems?

Options:

A.

ext4

B.

FAT32

C.

NTFS

D.

HFS

Question 25

Which of the following relational database constructs is used to ensure valid values are entered for a column?

Options:

A.

Schema

B.

Permissions

C.

Constraint

D.

Column

Question 26

Which of the following would be considered the BEST method of securely distributing medical records?

Options:

A.

Encrypted flash drive

B.

Social networking sites

C.

Fax

D.

FTP file sharing

Question 27

For which of the following is a relational database management system MOST commonly used?

Options:

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Question 28

Which of the following computer components allows for communication over a computer network?

Options:

A.

RAM

B.

NIC

C.

CPU

D.

NAS

Question 29

Within a database, which of the following would be the best access method to use to display a subset of a table?

Options:

A.

UPDATE

B.

DROP

C.

SELECT

D.

INSERT

Question 30

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

Options:

A.

Branching

B.

Looping

C.

Pseudocode

D.

Syntax errors

Question 31

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Options:

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Question 32

A developer needs to add a table to a database. Which of the following database activities should the user

perform?

Options:

A.

UPDATE

B.

ALTER

C.

CREATE

D.

REPORT

Question 33

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

Options:

A.

T1 line

B.

Satellite

C.

Fiber optic

D.

DSL

Question 34

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.

Array

B.

Vector

C.

List

D.

String

Question 35

Which of the following would a company consider an asset?

Options:

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Question 36

A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?

Options:

A.

Restart the computer when done.

B.

Log off the computer.

C.

Use private browsing.

D.

Enable pop-up blocker.

Question 37

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Question 38

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

Options:

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Question 39

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this

document for public use. Which of the following should the developer use to BEST protect the document?

Options:

A.

Patent

B.

Trademark

C.

Watermark

D.

Copyright

Question 40

Which of the following is a characteristic of both a database and a flat file?

Options:

A.

Concurrent users

B.

Persistence

C.

Queries

D.

Data definition

Question 41

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Question 42

A technician has been asked to install a video interface that can support both high bandwidth digital video and audio on a single cable. Which of the following should the technician use?

Options:

A.

DVI

B.

VGA

C.

DisplayPort

D.

S-video

E.

HDMI

Question 43

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Question 44

Given the following pseudocode:

as

Which of the following is the output of the code?

Options:

A.

1

B.

9

C.

10

D.

11

Question 45

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

Options:

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Question 46

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

Options:

A.

Cellular

B.

Satellite

C.

Cable

D.

Fiber

Question 47

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

Options:

A.

Fiber

B.

DSL

C.

Cable

D.

Satellite

Question 48

Which of the following types of memory can retain its content after a system reboot?

Options:

A.

DDR

B.

DIMM

C.

RAM

D.

ROM

Question 49

Which of the following BEST describes the purpose of a vector in programming?

Options:

A.

Storing a collection of data

B.

Repeating a similar operation

C.

Capturing user input

D.

Performing mathematical calculations

Question 50

A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?

Options:

A.

2.5MHz

B.

2.5Tbps

C.

2.5GB

D.

2.5GHz

Question 51

The IT department has established a new password policy for employees. Specifically, the policy reads:

    Passwords must not contain common dictionary words

    Passwords must contain at least one special character.

    Passwords must be different from the las six passwords used.

    Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

Options:

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Question 52

of the following would most likely be used to protect the intellectual property of printed materials?

Options:

A.

Trademark

B.

Cease and desist

C.

Patent

D.

Copyright

Question 53

A technician has established a plan of action. Which of the following should the technician do next?

Options:

A.

Verify system functionality.

B.

Identify preventive measures.

C.

Document the findings.

D.

Implement a solution.

Question 54

Which of the following is a wireless communication that requires devices to be within 6in of each other to

transfer information?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

WiFi

Question 55

A user is selecting software to visually display information in a marketing meeting. Which of the following software types should the user select?

Options:

A.

Spreadsheet

B.

Word processing

C.

Web browsing

D.

Presentation

Question 56

Which of the following is an advantage of installing an application to the cloud?

Options:

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Question 57

A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).

Options:

A.

Private browsing is enabled.

B.

Extensions are out-of-date.

C.

Proxy settings are incorrect.

D.

An incompatible browser is being used.

E.

A pop-up blocker is enabled.

F.

An invalid certificate has been issued.

Question 58

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

Options:

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Question 59

Which of the following are the primary functions of an operating system? (Choose two.)

Options:

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Question 60

A company wants to provide encrypted remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would best fulfill these requirements?

Options:

A.

Disk-level encryption

B.

Secure web gateway

C.

VPN

D.

AES

Question 61

An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?

Options:

A.

Flat file

B.

Document

C.

Database

D.

Spreadsheet

Question 62

An application is hosted on a local network. Which of the following descriptions is correct?

Options:

A.

LAN access Is required.

B.

The application exists locally.

C.

Files are saved in the cloud.

D.

Internet access Is required.

Question 63

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

Options:

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Question 64

Which of the following database structures is the most granular?

Options:

A.

Column

B.

Field

C.

Record

D.

Table

Question 65

An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?

Options:

A.

Presentation software

B.

Conferencing software

C.

Project management software

D.

Visual diagramming software

Question 66

Which of the following is the equivalent of 1 KB?

Options:

A.

0.01 googol

B.

1,000 bits

C.

8,000 bits

D.

8,000 bytes

Question 67

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

Options:

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Question 68

Which of the following statements BEST describes binary?

Options:

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Question 69

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

Options:

A.

USB

B.

NFC

C.

DSL

D.

DVI

Question 70

Which of the following notational systems does the value 10AF01 indicate?

Options:

A.

Unicode

B.

Binary

C.

Hexadecimal

D.

Octal

Question 71

Which of the following is a value that uniquely identifies a database record?

Options:

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Question 72

Which of the following software types is best suited for storing large amounts of data in a way that allows for concurrent, indexed access?

Options:

A.

Spreadsheet software

B.

Visual diagramming software

C.

Database software

D.

Presentation software

Question 73

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

Options:

A.

Word processing

B.

Spreadsheet

C.

Text editor

D.

Visual diagramming

Question 74

Which of the following is an example of multifactor authentication?

Options:

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Question 75

A function is BEST used for enabling programs to:

Options:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Question 76

Which of the following units of storage would be used to measure the amount of RAM on a desktop computer?

Options:

A.

TB

B.

GB

C.

MB

D.

KB

Question 77

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Question 78

Which of the following elements is most important in order for data reports to have value?

Options:

A.

Large sample sizes

B.

Daily data

C.

Frequent measurements

D.

Useful metrics

Question 79

A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?

Options:

A.

LAN-hosted

B.

Local server-hosted

C.

Locally installed

D.

Cloud-hosted

Question 80

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

Options:

A.

Boolean

B.

Integer

C.

Float

D.

Char

Question 81

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?

Options:

A.

Variable

B.

Attribute

C.

Method

D.

Looping

Question 82

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Question 83

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

Options:

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Question 84

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Question 85

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

Options:

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Question 86

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Question 87

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

Options:

A.

SMTP

B.

POP3

C.

SNMP

D.

DHCP

E.

ICMP

F.

SFTP

Question 88

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Question 89

Which of the following is a compiled language?

Options:

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Question 90

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Question 91

After purchasing a flash drive, the buyer notices that the packaging had already been opened. Which of the following is this is an example of?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Non-repudiation

Question 92

Which of the following storage devices have a spinning disk? (Choose two.)

Options:

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Question 93

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Question 94

Privacy expectations on a company intranet should be limited to:

Options:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Question 95

Given the following pseudocode:

as

Which of the following would be the output of the program?

Options:

A.

foohappy

B.

barsad

C.

foosad

D.

barhappy

Question 96

Which of the following best protects data in transit?

Options:

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Question 97

Which of the following connection types is typically used for a display monitor?

Options:

A.

USB

B.

DVI

C.

Bluetooth

D.

RJ45

Question 98

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

Options:

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Question 99

A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?

Options:

A.

Motherboard

B.

BIOS

C.

SSD

D.

CPU

Question 100

Which of the following is required for a cloud network?

Options:

A.

Local applications

B.

Credentials

C.

Internet access

D.

Network infrastructure

Question 101

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

Options:

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Question 102

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

Question 103

Which of the following should be done first when working on a potential issue?

Options:

A.

Implement a solution.

B.

Escalate the issue.

C.

Research the issue.

D.

Gather information.

Page: 1 / 34
Total 344 questions