Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CompTIA IT Fundamentals+ Certification Exam Question and Answers

CompTIA IT Fundamentals+ Certification Exam

Last Update May 1, 2024
Total Questions : 231

We are offering FREE FC0-U61 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare FC0-U61 free exam questions and then go for complete pool of CompTIA IT Fundamentals+ Certification Exam test questions that will help you more.

FC0-U61 pdf

FC0-U61 PDF

$35  $99.99
FC0-U61 Engine

FC0-U61 Testing Engine

$42  $119.99
FC0-U61 PDF + Engine

FC0-U61 PDF + Testing Engine

$56  $159.99
Questions 1

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

Options:

A.  

T1 line

B.  

Satellite

C.  

Fiber optic

D.  

DSL

Discussion 0
Questions 2

Which of the following BEST describes the purpose of a vector in programming?

Options:

A.  

Storing a collection of data

B.  

Repeating a similar operation

C.  

Capturing user input

D.  

Performing mathematical calculations

Discussion 0
Questions 3

Which of the following commands can be used to remove a database permanently?

Options:

A.  

DENY

B.  

DROP

C.  

ALTER

D.  

DUMP

Discussion 0
Questions 4

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.  

Patent

B.  

Trademark

C.  

License

D.  

Copyright

Discussion 0
Questions 5

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

Options:

A.  

Thunderbolt cable

B.  

Bluetooth module

C.  

Infrared port

D.  

WLAN card

Discussion 0
Questions 6

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

Options:

A.  

2.4GHz

B.  

5GHz

C.  

802.11b

D.  

802.11g

Discussion 0
Questions 7

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Options:

A.  

Phishing attack

B.  

Social engineering

C.  

On-path attack

D.  

Eavesdropping

Discussion 0
Questions 8

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which

of the following devices is a user MOST likely to configure to allow this?

Options:

A.  

Cable modem

B.  

Wireless router

C.  

Access point

D.  

Network switch

Discussion 0
Questions 9

A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?

Options:

A.  

Mobile phone

B.  

Mouse

C.  

Scanner

D.  

External hard drive

Discussion 0
Questions 10

Which of the following types of memory can retain its content after a system reboot?

Options:

A.  

DDR

B.  

DIMM

C.  

RAM

D.  

ROM

Discussion 0
Questions 11

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

Options:

A.  

Password history

B.  

Password reuse

C.  

Password expiration

D.  

Password age

Discussion 0
Questions 12

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Options:

A.  

Optical drive

B.  

Hard disk drive

C.  

Solid state drive

D.  

Flash drive

Discussion 0
Questions 13

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

Options:

A.  

SSD

B.  

CPU

C.  

RAM

D.  

GPU

Discussion 0
Questions 14

Which of the following database structures is the most granular?

Options:

A.  

Column

B.  

Field

C.  

Record

D.  

Table

Discussion 0
Questions 15

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.  

Method

B.  

Object

C.  

Property

D.  

Attribute

Discussion 0
Questions 16

Which of the following is secure?

Options:

A.  

.edu

B.  

FTP

C.  

HTTPS

D.  

.org

E.  

FAT32

Discussion 0
Questions 17

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.  

Question the users.

B.  

Determine if anything has changed.

C.  

Document the findings.

D.  

Gather Information.

Discussion 0
Questions 18

Which of the following computer components allows for communication over a computer network?

Options:

A.  

RAM

B.  

NIC

C.  

CPU

D.  

NAS

Discussion 0
Questions 19

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

Options:

A.  

Attribute

B.  

Constraint

C.  

Foreign key

D.  

Schema

Discussion 0
Questions 20

Which of the following is both an input and output device?

Options:

A.  

Microphone

B.  

Speaker

C.  

Touch-screen monitor

D.  

Keyboard

Discussion 0
Questions 21

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.  

Database software

B.  

Word processing software

C.  

Conferencing software

D.  

Presentation software

Discussion 0
Questions 22

Which of the following relational database constructs is used to ensure valid values are entered for a column?

Options:

A.  

Schema

B.  

Permissions

C.  

Constraint

D.  

Column

Discussion 0
Questions 23

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

Options:

A.  

CREATE

B.  

UPDATE

C.  

ALTER

D.  

DROP

Discussion 0
Questions 24

A programmer uses DML to modify:

Options:

A.  

files

B.  

permissions

C.  

data

D.  

backups

Discussion 0
Questions 25

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is

confirmed. Which of the following should be the technician’s NEXT step?

Options:

A.  

Implement the solution.

B.  

Document lessons learned.

C.  

Establish a plan of action.

D.  

Verify full system functionality.

Discussion 0
Questions 26

Which of the following programming languages would most likely include tables and the select command?

Options:

A.  

Compiled

B.  

Markup

C.  

Query

D.  

Scripting

Discussion 0
Questions 27

Employee information is stored in a database. Which of the following BEST describes where all of an

employee’s information is stored?

Options:

A.  

Record

B.  

Report

C.  

Column

D.  

Procedure

Discussion 0
Questions 28

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.  

Integer

B.  

String

C.  

Float

D.  

Boolean

Discussion 0
Questions 29

Which of the following are benefits of a security awareness training program9 (Select two).

Options:

A.  

Enhances overall security

B.  

Provides information on how to avoid phishing

C.  

Lowers the incidence of hardware failures

D.  

Increases the availability of computers

E.  

Advances end users' technical skills

F.  

Creates IT security opportunities for end users

Discussion 0
Questions 30

Which of the following BEST describes a kilobyte?

Options:

A.  

A kilobyte is a measurement of storage (e.g., 100KB).

B.  

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.  

A kilobyte is a measurement of power (e.g., 100KW).

D.  

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Discussion 0
Questions 31

Which of the following are the primary functions of an operating system? (Choose two.)

Options:

A.  

Provide structure for file and data management.

B.  

Provide protection against malware and viruses.

C.  

Provide peer-to-peer networking capability.

D.  

Provide user data encryption.

E.  

Provide virtual desktop capability.

F.  

Provide system resources.

Discussion 0
Questions 32

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

Options:

A.  

SMTP

B.  

POP3

C.  

SNMP

D.  

DHCP

E.  

ICMP

F.  

SFTP

Discussion 0
Questions 33

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.  

Word processing document

B.  

Flat file

C.  

Database

D.  

Spreadsheet

Discussion 0
Questions 34

When following the troubleshooting methodology, which of the following should be performed last?

Options:

A.  

Document findings.

B.  

Establish a plan.

C.  

Determine the cause.

D.  

Verify functionality.

Discussion 0
Questions 35

A program needs to choose apples, oranges, or bananas based on an input. Which of the following

programming constructs is BEST to use?

Options:

A.  

Variable

B.  

If

C.  

Datatype

D.  

Comment

Discussion 0
Questions 36

A function is BEST used for enabling programs to:

Options:

A.  

hold a list of numbers.

B.  

be divided into reusable components.

C.  

define needed constant values.

D.  

define variables to hold different values.

Discussion 0
Questions 37

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

Options:

A.  

Disk management

B.  

Process management

C.  

Application management

D.  

Service management

Discussion 0
Questions 38

Which of the following best describes the differences between data and information?

Options:

A.  

Data is a result of the analytical processing of information.

B.  

Information is raw unstructured or uncorrected data.

C.  

Information can exist without data.

D.  

Data can be facts, figures, or events that can be processed to create information.

Discussion 0
Questions 39

Which of the following is the exact number of bytes in a gigabyte?

Options:

A.  

1,024 bytes

B.  

1,048,576 bytes

C.  

1,073,741,824 bytes

D.  

1,099,511,627,776 bytes

Discussion 0
Questions 40

Which of the following is an example of a compiled language?

Options:

A.  

C++

B.  

SQL

C.  

Python

D.  

XML

Discussion 0
Questions 41

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

Options:

A.  

Restart the computer.

B.  

Contact other users.

C.  

Disconnect the peripherals.

D.  

Document the findings.

Discussion 0
Questions 42

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

Options:

A.  

QUESTION NO: users.

B.  

Verify functionality.

C.  

Divide and conquer.

D.  

Implement the solution.

Discussion 0
Questions 43

Which of the following shows how many results are possible when evaluating Boolean data types?

Options:

A.  

Two

B.  

Four

C.  

Three

D.  

Five

Discussion 0
Questions 44

The IT department has established a new password policy for employees. Specifically, the policy reads:

  • Passwords must not contain common dictionary words
  • Passwords must contain at least one special character.
  • Passwords must be different from the las six passwords used.
  • Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

Options:

A.  

Password lockout

B.  

Password complexity

C.  

Password expiration

D.  

Passwords history

E.  

Password length

F.  

Password age

Discussion 0
Questions 45

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

Options:

A.  

Proxy server

B.  

Browser add-on

C.  

Corrupted cache

D.  

Script blocker

Discussion 0
Questions 46

Which of the following data types should a database administrator use to store customer postal codes?

Options:

A.  

Float

B.  

String

C.  

Boolean

D.  

Integer

Discussion 0
Questions 47

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.  

Array

B.  

Vector

C.  

List

D.  

String

Discussion 0
Questions 48

Which of the following filesystems would a Linux computer MOST likely use?

Options:

A.  

HFS

B.  

NTFS

C.  

FAT32

D.  

ext4

Discussion 0
Questions 49

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently

released new device. After configuring the new device utilizing the old SSID and key, some light switches are

no longer communicating. Which of the following is the MOST likely cause?

Options:

A.  

The light switches do not support WPA2.

B.  

The router is operating on a different channel.

C.  

The key does not meet password complexity requirements.

D.  

The SSID is not being broadcast.

Discussion 0
Questions 50

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

Options:

A.  

Wi-Fi

B.  

IR

C.  

Bluetooth

D.  

NFC

Discussion 0
Questions 51

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

Options:

A.  

Disk optimizer

B.  

Operating system

C.  

Type 1 hypervisor

D.  

Anti-malware

Discussion 0
Questions 52

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.  

Replace the user’s display.

B.  

Update the PC’s operating system.

C.  

Replace the video cable.

D.  

Install new video drivers.

Discussion 0
Questions 53

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.  

Hardware failure

B.  

Denial of service

C.  

On-path attack

D.  

Social engineering

Discussion 0
Questions 54

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Options:

A.  

Unnecessary OEM software

B.  

Lack of antivirus present

C.  

Online gaming activity

D.  

Firewalls are not configured

Discussion 0
Questions 55

Which of the following is an advantage of a fiat file?

Options:

A.  

Variety of data

B.  

Scalability

C.  

Portability

D.  

Multiple concurrent users

Discussion 0
Questions 56

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

Options:

A.  

UPDATE

B.  

DELETE

C.  

ALTER

D.  

DROP

Discussion 0
Questions 57

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

Options:

A.  

Cellular

B.  

Satellite

C.  

Cable

D.  

Fiber

Discussion 0
Questions 58

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

Options:

A.  

10

B.  

14

C.  

15

D.  

17

Discussion 0
Questions 59

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this

document for public use. Which of the following should the developer use to BEST protect the document?

Options:

A.  

Patent

B.  

Trademark

C.  

Watermark

D.  

Copyright

Discussion 0
Questions 60

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.  

Rule-based access control

B.  

Mandatory access control

C.  

Role-based access control

D.  

Discretionary access control

Discussion 0
Questions 61

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Options:

A.  

Network and Sharing Center

B.  

System

C.  

Programs and Features

D.  

Internet Options

Discussion 0
Questions 62

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

Options:

A.  

Fiber

B.  

DSL

C.  

Satellite

D.  

Cable

Discussion 0
Questions 63

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.  

1001Kbps

B.  

110Mbps

C.  

1.22Gbps

D.  

123Mbps

Discussion 0
Questions 64

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.  

Perform process management.

B.  

Perform task scheduling.

C.  

Set the system date and time.

D.  

Set a reminder to run the script.

Discussion 0
Questions 65

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

Options:

A.  

Add a switch and hardwire the users' laptops.

B.  

Add a network router.

C.  

Replace the users' laptops with desktop computers.

D.  

Add an access point for the users.

Discussion 0
Questions 66

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

Options:

A.  

Web-based

B.  

Plug-and-play

C.  

Driver-based

D.  

Server-based

Discussion 0
Questions 67

Given the following pseudocode:

Which of the following would be the output of the program?

Options:

A.  

foohappy

B.  

barsad

C.  

foosad

D.  

barhappy

Discussion 0
Questions 68

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.  

POP3

B.  

IMAP

C.  

ICMP

D.  

SMTP

Discussion 0
Questions 69

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

Options:

A.  

Encryption

B.  

Compression

C.  

Permissions

D.  

Auditing

Discussion 0