Pre-Winter Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

CompTIA IT Fundamentals+ Certification Exam Question and Answers

CompTIA IT Fundamentals+ Certification Exam

Last Update Oct 16, 2024
Total Questions : 318

We are offering FREE FC0-U61 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare FC0-U61 free exam questions and then go for complete pool of CompTIA IT Fundamentals+ Certification Exam test questions that will help you more.

FC0-U61 pdf

FC0-U61 PDF

$40  $99.99
FC0-U61 Engine

FC0-U61 Testing Engine

$48  $119.99
FC0-U61 PDF + Engine

FC0-U61 PDF + Testing Engine

$64  $159.99
Questions 1

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.  

WPA

B.  

SSID

C.  

WEP

D.  

WPA2

Discussion 0
Questions 2

Which of the following would be the most cost-effective method to increase availability?

Options:

A.  

Redundant equipment

B.  

Disaster recovery site

C.  

Continuity plan

D.  

Scheduled maintenance

Discussion 0
Questions 3

Which of the following interfaces is best for viewing database performance information?

Options:

A.  

Direct

B.  

Programmatic

C.  

Query

D.  

Utility

Discussion 0
Questions 4

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

Options:

A.  

Fiber

B.  

DSL

C.  

Cable

D.  

Satellite

Discussion 0
Questions 5

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

Options:

A.  

Oatmeal

B.  

Bacon and eggs

C.  

Waffles

D.  

Pancakes

Discussion 0
Questions 6

Which of the following database structures is the most granular?

Options:

A.  

Column

B.  

Field

C.  

Record

D.  

Table

Discussion 0
Questions 7

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.  

x86 only supports an installation on a 32-bit CPU architecture.

B.  

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.  

x86 only supports an installation on a 64-bit CPU architecture.

D.  

x86 supports an installation on a 16-bit CPU architecture.

Discussion 0
Questions 8

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

Options:

A.  

SELECT

B.  

INSERT

C.  

DELETE

D.  

UPDATE

Discussion 0
Questions 9

Which of the following relational database constructs is used to ensure valid values are entered for a column?

Options:

A.  

Schema

B.  

Permissions

C.  

Constraint

D.  

Column

Discussion 0
Questions 10

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.  

Patent

B.  

Trademark

C.  

License

D.  

Copyright

Discussion 0
Questions 11

Which of the following categories describes commands used to extract information from a database?

Options:

A.  

DDL

B.  

DDR

C.  

DLL

D.  

DML

Discussion 0
Questions 12

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

Options:

A.  

a storage area network.

B.  

an embedded OS.

C.  

network attached storage.

D.  

a Type 1 hypervisor.

Discussion 0
Questions 13

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Options:

A.  

Concurrency

B.  

Speed

C.  

Scalability

D.  

Variety

Discussion 0
Questions 14

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

Options:

A.  

SMTP

B.  

POP3

C.  

SNMP

D.  

DHCP

E.  

ICMP

F.  

SFTP

Discussion 0
Questions 15

Given the following pseudocode:

arduino

Copy code

WHILE X < 12

print "Counting"

X += 1

If X=7, which of the following is the number of times the message will be displayed?

Options:

A.  

Five

B.  

Seven

C.  

Eleven

D.  

Twelve

Discussion 0
Questions 16

Which of the following are most likely to have a GUI? (Select two).

Options:

A.  

PowerShell

B.  

Windows

C.  

Command Prompt

D.  

macOS

E.  

Z shell

F.  

Bash

Discussion 0
Questions 17

Which of the following is an example of a query language?

Options:

A.  

C++

B.  

Python

C.  

XML

D.  

SQL

Discussion 0
Questions 18

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

Options:

A.  

Site licensing

B.  

Open-source licensing

C.  

Product key licensing

D.  

Single-use licensing

Discussion 0
Questions 19

For which of the following is a relational database management system MOST commonly used?

Options:

A.  

Building flowcharts

B.  

Storing information

C.  

Generating reports

D.  

Creating diagrams

Discussion 0
Questions 20

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.  

Method

B.  

Object

C.  

Property

D.  

Attribute

Discussion 0
Questions 21

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is

confirmed. Which of the following should be the technician’s NEXT step?

Options:

A.  

Implement the solution.

B.  

Document lessons learned.

C.  

Establish a plan of action.

D.  

Verify full system functionality.

Discussion 0
Questions 22

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

Options:

A.  

topsecret

B.  

normal

C.  

analyst

D.  

restricted

Discussion 0
Questions 23

Which of the following connection types is typically used for a display monitor?

Options:

A.  

USB

B.  

DVI

C.  

Bluetooth

D.  

RJ45

Discussion 0
Questions 24

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.  

Document sharing software

B.  

Instant messaging software

C.  

Conferencing software

D.  

Email software

Discussion 0
Questions 25

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.  

Work email

B.  

Job title

C.  

Hire date

D.  

Customers served

E.  

Contract

Discussion 0
Questions 26

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

Options:

A.  

Open

B.  

WEP

C.  

WPA

D.  

WPA2

Discussion 0
Questions 27

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.  

Email previewing

B.  

Patching

C.  

Clear browsing cache

D.  

Kill process

Discussion 0
Questions 28

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.  

Written procedure

B.  

Written policy

C.  

Written email

D.  

Written memo

Discussion 0
Questions 29

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

Options:

A.  

Site

B.  

Single-use

C.  

Concurrent

D.  

Device

Discussion 0
Questions 30

A script is designed to save the results of user input from a survey to a database table. Which of the following database access methods is used to add the survey data to the table?

Options:

A.  

Direct access

B.  

Query builder

C.  

User interface

D.  

Programmatic access

Discussion 0
Questions 31

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

Options:

A.  

Data capture and collections

B.  

Asset inventory inputs

C.  

Sales statistics

D.  

Average loss output

Discussion 0
Questions 32

Which of the following defines a reusable value that can be reassigned?

Options:

A.  

Method

B.  

Variable

C.  

Constant

D.  

Function

Discussion 0
Questions 33

Which of the following explains the concept of database scalability?

Options:

A.  

The ability to move from one vendor database to another

B.  

The ability to increase resources easily as demand grows

C.  

The ability to move from a flat file database to a relational database

D.  

The ability to document the database schema automatically

Discussion 0
Questions 34

Which of the following does a NoSQL database use to organize data?

Options:

A.  

Primary keys

B.  

Schemas

C.  

Keys/values

D.  

Tables

Discussion 0
Questions 35

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Options:

A.  

Installing a host-based firewall

B.  

Setting a BIOS password

C.  

Patching the operating system

D.  

Removing unnecessary software

Discussion 0
Questions 36

During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?

Options:

A.  

Instant messaging

B.  

Mobile applications

C.  

Social media

D.  

Video-sharing website

Discussion 0
Questions 37

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.  

Perform process management.

B.  

Perform task scheduling.

C.  

Set the system date and time.

D.  

Set a reminder to run the script.

Discussion 0
Questions 38

Which of the following filesystems would a Linux computer MOST likely use?

Options:

A.  

HFS

B.  

NTFS

C.  

FAT32

D.  

ext4

Discussion 0
Questions 39

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Options:

A.  

Antivirus

B.  

Anti-malware

C.  

Device Manager

D.  

Host firewall

Discussion 0
Questions 40

Which of the following storage types presents the most likely security risk?

Options:

A.  

Flash

B.  

NAS

C.  

SSD

D.  

Cloud

Discussion 0
Questions 41

A user is trying to set up a new wireless access point. Which of the following should the user do first?

Options:

A.  

Change the SSID to a unique name.

B.  

Change the default password.

C.  

Enable WPA2 encryption.

D.  

Enable the highest available wireless standard.

Discussion 0
Questions 42

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

Options:

A.  

Word processing

B.  

Spreadsheet

C.  

Text editor

D.  

Visual diagramming

Discussion 0
Questions 43

Employee information is stored in a database. Which of the following BEST describes where all of an

employee’s information is stored?

Options:

A.  

Record

B.  

Report

C.  

Column

D.  

Procedure

Discussion 0
Questions 44

Which of the following is the least expensive way for users at a large company to load a 2GB spreadsheet quickly?

Options:

A.  

Buy faster networking switches.

B.  

Upgrade the operating system and applications.

C.  

Move the file to a shared database.

D.  

Add more RAM to each workstation.

Discussion 0
Questions 45

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

Options:

A.  

Checking the proxy settings

B.  

Checking that caching is enabled

C.  

Checking browser add-ons

D.  

Checking certificate validity

Discussion 0
Questions 46

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

Options:

A.  

2.4GHz

B.  

5GHz

C.  

802.11b

D.  

802.11g

Discussion 0
Questions 47

Within a database, which of the following would be the best access method to use to display a subset of a table?

Options:

A.  

UPDATE

B.  

DROP

C.  

SELECT

D.  

INSERT

Discussion 0
Questions 48

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.  

It accepts negative values.

B.  

It stores symbols

C.  

It accommodates larger values.

D.  

It supports decimals.

Discussion 0
Questions 49

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.  

Algorithm

B.  

Software

C.  

Pseudocode

D.  

Flowchart

Discussion 0
Questions 50

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.  

Text file on a shared drive

B.  

Managed relational database

C.  

Informational intranet page

D.  

Locally installed productivity software

Discussion 0
Questions 51

Which of the following best practices can be used to mitigate password reuse?

Options:

A.  

Password length

B.  

Password complexity

C.  

Password reset

D.  

Password history

Discussion 0
Questions 52

Which of the following would MOST likely use an ARM processor?

Options:

A.  

Laptop

B.  

Tablet

C.  

Workstation

D.  

Server

Discussion 0
Questions 53

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.  

Word processing document

B.  

Flat file

C.  

Database

D.  

Spreadsheet

Discussion 0
Questions 54

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Options:

A.  

Laptop

B.  

Workstation

C.  

Mobile phone

D.  

Server

Discussion 0
Questions 55

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.  

Web page

B.  

List

C.  

Flat file

D.  

Database

Discussion 0
Questions 56

After creating a database, which of the following would a developer most likely use to put data in the database?

Options:

A.  

UPDATE

B.  

ALTER

C.  

INSERT

D.  

SELECT

Discussion 0
Questions 57

A company is looking at locations for a new datacenter. The Chief Executive Officer (CEO) has stated that the new datacenter should be at least 500mi (805km) from the existing datacenter so one natural disaster will be unlikely to impact both datacenters. Which of the following is this best an example of?

Options:

A.  

Confidentiality concerns

B.  

Integrity concerns

C.  

Replication concerns

D.  

Availability concerns

Discussion 0
Questions 58

Which of the following file extensions is used for a consolidated group of files?

Options:

A.  

.bat

B.  

.avi

C.  

.rar

D.  

.rtf

Discussion 0
Questions 59

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.  

Patent

B.  

Copyright

C.  

NDA

D.  

Trademark

E.  

EULA

Discussion 0
Questions 60

Which of the following can transmit graphics but not sound?

Options:

A.  

HDMI

B.  

FireWire

C.  

VGA

D.  

DisplayPort

Discussion 0
Questions 61

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

Options:

A.  

Branching

B.  

Looping

C.  

Pseudocode

D.  

Syntax errors

Discussion 0
Questions 62

A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?

Options:

A.  

NTFS

B.  

FAT32

C.  

HFS

D.  

ext4

Discussion 0
Questions 63

Which of the following storage types uses platters to store data?

Options:

A.  

Hard drive

B.  

Solid-state drive

C.  

Optical drive

D.  

Flash drive

Discussion 0
Questions 64

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

Options:

A.  

Performance Monitor

B.  

Disk Management

C.  

Event Viewer

D.  

Device Manager

Discussion 0
Questions 65

Which of the following is a compiled language?

Options:

A.  

Perl

B.  

JScript

C.  

Java

D.  

PowerShell

Discussion 0
Questions 66

A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?

Options:

A.  

RJ11

B.  

RJ45

C.  

USB

D.  

Bluetooth

Discussion 0
Questions 67

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

Options:

A.  

Text editing software

B.  

Visual diagramming software

C.  

Spreadsheet software

D.  

Web browsing software

Discussion 0
Questions 68

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

Options:

A.  

Password manager

B.  

Password reuse

C.  

Password history

D.  

Password reset

Discussion 0
Questions 69

Which of the following would be considered the BEST method of securely distributing medical records?

Options:

A.  

Encrypted flash drive

B.  

Social networking sites

C.  

Fax

D.  

FTP file sharing

Discussion 0
Questions 70

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

Options:

A.  

NFC

B.  

Infrared

C.  

Wi-Fi

D.  

Bluetooth

Discussion 0
Questions 71

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.  

Loop

B.  

Variable

C.  

Constant

D.  

Function

Discussion 0
Questions 72

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

Options:

A.  

Duplicate the problem

B.  

Gather information

C.  

QUESTION NO: users

D.  

Divide and conquer

Discussion 0
Questions 73

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.  

Driver installation

B.  

Plug-and-play

C.  

IP-based

D.  

Web-based

Discussion 0
Questions 74

Which of the following would be the best reason to implement a host firewall?

Options:

A.  

To prevent external access

B.  

To prevent hardware failures

C.  

To prevent the removal of software

D.  

To prevent wiretapping

Discussion 0
Questions 75

When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?

Options:

A.  

SMTP

B.  

DHCP

C.  

WPA

D.  

DNS

E.  

WEP

Discussion 0
Questions 76

Which of the following BEST describes an application running on a typical operating system?

Options:

A.  

Process

B.  

Thread

C.  

Function

D.  

Task

Discussion 0
Questions 77

Which of the following is both an input and output device?

Options:

A.  

Microphone

B.  

Speaker

C.  

Touch-screen monitor

D.  

Keyboard

Discussion 0
Questions 78

Which of the following language types most likely controls the way a web page looks?

Options:

A.  

Assembly language

B.  

Markup language

C.  

Compiled language

D.  

Scripted language

Discussion 0
Questions 79

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

Options:

A.  

Cellular

B.  

Satellite

C.  

Cable

D.  

Fiber

Discussion 0
Questions 80

Which of the following is required to view videos stored on a DVD?

Options:

A.  

Solid-state drive

B.  

Flash drive

C.  

Hard drive

D.  

Optical drive

Discussion 0
Questions 81

Which of the following units of storage would be used to measure the amount of RAM on a desktop computer?

Options:

A.  

TB

B.  

GB

C.  

MB

D.  

KB

Discussion 0
Questions 82

Which of the following BEST describes the physical location of the data in the database?

Options:

A.  

Table

B.  

Column

C.  

RAM

D.  

HDD

Discussion 0
Questions 83

A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?

Options:

A.  

LAN-hosted

B.  

Local server-hosted

C.  

Locally installed

D.  

Cloud-hosted

Discussion 0
Questions 84

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

Options:

A.  

Turn on private browsing

B.  

Delete browsing history on program close.

C.  

Notify when downloads are complete.

D.  

Configure prompting before downloading content.

Discussion 0
Questions 85

A software developer has created a program for the accounting department. The finance department requests the same program but requires some changes to the code to meet its needs. Which of the following should be performed?

Options:

A.  

Compiling

B.  

Looping

C.  

Sequencing

D.  

Branching

Discussion 0
Questions 86

Given the following pseudocode:

Which of the following is the output of the code?

Options:

A.  

1

B.  

9

C.  

10

D.  

11

Discussion 0
Questions 87

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

Options:

A.  

Script blocker

B.  

Proxy settings

C.  

Private browsing

D.  

Full browser cache

Discussion 0
Questions 88

Which of the following would most likely be used to verify a user is following an AUP?

Options:

A.  

Application logs

B.  

Security questions

C.  

Access controls

D.  

Biometric scans

Discussion 0
Questions 89

A function is BEST used for enabling programs to:

Options:

A.  

hold a list of numbers.

B.  

be divided into reusable components.

C.  

define needed constant values.

D.  

define variables to hold different values.

Discussion 0
Questions 90

A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?

Options:

A.  

Compression

B.  

Encryption

C.  

Journaling

D.  

Formatting

Discussion 0
Questions 91

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.  

Array

B.  

Vector

C.  

List

D.  

String

Discussion 0
Questions 92

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

Options:

A.  

Add a switch and hardwire the users' laptops.

B.  

Add a network router.

C.  

Replace the users' laptops with desktop computers.

D.  

Add an access point for the users.

Discussion 0
Questions 93

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

Options:

A.  

Encryption

B.  

Compression

C.  

Permissions

D.  

Auditing

Discussion 0
Questions 94

Which of the following are the basic computing operations?

Options:

A.  

Input, process, output, and feedback

B.  

Input, output, storage, and feedback

C.  

Input, process, and output

D.  

Input, process, output, and storage

Discussion 0
Questions 95

Given the following pseudocode:

Which of the following would be the output of the program?

Options:

A.  

foohappy

B.  

barsad

C.  

foosad

D.  

barhappy

Discussion 0