CompTIA IT Fundamentals+ Certification Exam
Last Update Oct 16, 2024
Total Questions : 318
We are offering FREE FC0-U61 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare FC0-U61 free exam questions and then go for complete pool of CompTIA IT Fundamentals+ Certification Exam test questions that will help you more.
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access. Which of the following protocols would be the MOST secure?
Which of the following would be the most cost-effective method to increase availability?
Which of the following interfaces is best for viewing database performance information?
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
Given the following pseudocode:
If the Breakfast program ran on Sunday, which of the following would be the output?
A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A systems administrator wants to return results for a time range within a database. Which of the following
commands should the administrator use?
Which of the following relational database constructs is used to ensure valid values are entered for a column?
Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?
Which of the following categories describes commands used to extract information from a database?
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:
A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?
Which of the following network protocols will MOST likely be used when sending and receiving Internet email?
(Select TWO.)
Given the following pseudocode:
arduino
Copy code
WHILE X < 12
print "Counting"
X += 1
If X=7, which of the following is the number of times the message will be displayed?
Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?
For which of the following is a relational database management system MOST commonly used?
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following
programming concepts does jump represent?
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is
confirmed. Which of the following should be the technician’s NEXT step?
Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
Which of the following connection types is typically used for a display monitor?
Which of the following would be used to send messages using the SMTP protocol?
Which of the following is most appropriate to list on a social media site about an employer?
Which of the following WiFi security options would create the MOST need for a VPN connection on the client
device?
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?
A script is designed to save the results of user input from a survey to a database table. Which of the following database access methods is used to add the survey data to the table?
Meaningful and accurate reporting is essential to retailers in making business decisions while managing
inventory. Which of the following offers the BEST assistance in generating reports?
An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?
During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST
way to achieve this?
Which of the following filesystems would a Linux computer MOST likely use?
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Which of the following storage types presents the most likely security risk?
A user is trying to set up a new wireless access point. Which of the following should the user do first?
A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?
Employee information is stored in a database. Which of the following BEST describes where all of an
employee’s information is stored?
Which of the following is the least expensive way for users at a large company to load a 2GB spreadsheet quickly?
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click
a link to continue to the site. Which of the following would MOST likely identify the issue?
A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?
Within a database, which of the following would be the best access method to use to display a subset of a table?
Which of the following BEST explains the use of float over integer to store monetary values?
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the
same time?
Which of the following best practices can be used to mitigate password reuse?
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?
A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?
After creating a database, which of the following would a developer most likely use to put data in the database?
A company is looking at locations for a new datacenter. The Chief Executive Officer (CEO) has stated that the new datacenter should be at least 500mi (805km) from the existing datacenter so one natural disaster will be unlikely to impact both datacenters. Which of the following is this best an example of?
Which of the following file extensions is used for a consolidated group of files?
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).
A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?
A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?
Which of the following utilities has the ability to remove drivers and scan for hardware changes?
A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?
A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the
following types of software would BEST complete this task?
Which of the following describes the ability to recover access to a specific account if a credential is forgotten?
Which of the following would be considered the BEST method of securely distributing medical records?
Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?
A technician is troubleshooting an error message and tests the same program on a separate, identical
machine. Which of the following troubleshooting methodology steps is this an example of?
A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?
Which of the following would be the best reason to implement a host firewall?
When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?
Which of the following BEST describes an application running on a typical operating system?
Which of the following language types most likely controls the way a web page looks?
A company desires to implement a six-month survey site within a remote location. Which of the following is the
BEST option for Internet service?
Which of the following units of storage would be used to measure the amount of RAM on a desktop computer?
Which of the following BEST describes the physical location of the data in the database?
A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
A software developer has created a program for the accounting department. The finance department requests the same program but requires some changes to the code to meet its needs. Which of the following should be performed?
Given the following pseudocode:
Which of the following is the output of the code?
An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following
is the MOST likely cause?
Which of the following would most likely be used to verify a user is following an AUP?
A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?
A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?
Given the following pseudocode:
Which of the following would be the output of the program?