CompTIA IT Fundamentals+ Certification Exam
Last Update May 1, 2024
Total Questions : 231
We are offering FREE FC0-U61 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare FC0-U61 free exam questions and then go for complete pool of CompTIA IT Fundamentals+ Certification Exam test questions that will help you more.
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.
Which of the following types of Internet service connections would BEST meet the user’s needs?
Which of the following BEST describes the purpose of a vector in programming?
Which of the following commands can be used to remove a database permanently?
Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the
following would be the BEST choice to accomplish this task?
A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?
An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which
of the following devices is a user MOST likely to configure to allow this?
A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?
Which of the following types of memory can retain its content after a system reboot?
A large payment website was breached recently. A user is concerned that the breach will affect account
security on other sites. Which of the following password best practices would mitigate this risk?
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?
When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following
programming concepts does jump represent?
A technician has verified full system functionality. Which of the following actions should the technician take next?
Which of the following computer components allows for communication over a computer network?
Which of the following describes something in a database that refers to the unique identifier in the parent
table?
The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
Which of the following relational database constructs is used to ensure valid values are entered for a column?
A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is
confirmed. Which of the following should be the technician’s NEXT step?
Which of the following programming languages would most likely include tables and the select command?
Employee information is stored in a database. Which of the following BEST describes where all of an
employee’s information is stored?
Which of the following data types should a developer use when creating a variable to hold a postal code?
Which of the following are benefits of a security awareness training program9 (Select two).
Which of the following are the primary functions of an operating system? (Choose two.)
Which of the following network protocols will MOST likely be used when sending and receiving Internet email?
(Select TWO.)
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
When following the troubleshooting methodology, which of the following should be performed last?
A program needs to choose apples, oranges, or bananas based on an input. Which of the following
programming constructs is BEST to use?
A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating
system functions would the term BEST apply?
Which of the following best describes the differences between data and information?
An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?
Which of the following tasks is typically performed during the identification phase of the troubleshooting
methodology?
Which of the following shows how many results are possible when evaluating Boolean data types?
The IT department has established a new password policy for employees. Specifically, the policy reads:
Which of the following practices are being employed? (Select TWO).
A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
Which of the following data types should a database administrator use to store customer postal codes?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
Which of the following filesystems would a Linux computer MOST likely use?
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently
released new device. After configuring the new device utilizing the old SSID and key, some light switches are
no longer communicating. Which of the following is the MOST likely cause?
A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?
Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?
A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?
A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?
A database administrator finds that a table is not needed in a relational database. Which of the following
commands is used to completely remove the table and its data?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
Given the following pseudocode:
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this
document for public use. Which of the following should the developer use to BEST protect the document?
Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?
A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST
way to achieve this?
A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?
A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?
Given the following pseudocode:
Which of the following would be the output of the program?
A company wants its employee to use an email client that downloads and removes messages from the email
server. Which of the following protocols must be configured in the email client to facilitate this?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?