Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Questions 4

Which of the following best describes the differences between data and information?

Options:

A.

Data is a result of the analytical processing of information.

B.

Information is raw unstructured or uncorrected data.

C.

Information can exist without data.

D.

Data can be facts, figures, or events that can be processed to create information.

Buy Now
Questions 5

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

Options:

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Buy Now
Questions 6

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Buy Now
Questions 7

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Options:

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

Buy Now
Questions 8

A company is concerned with ensuring its databases are highly available. Which of the following can be used to

increase database availability?

Options:

A.

Backups

B.

Prioritization

C.

Indexes

D.

Failover

Buy Now
Questions 9

Which of the following database structures is the most granular?

Options:

A.

Column

B.

Field

C.

Record

D.

Table

Buy Now
Questions 10

Which of the following should be done first when working on a potential issue?

Options:

A.

Implement a solution.

B.

Escalate the issue.

C.

Research the issue.

D.

Gather information.

Buy Now
Questions 11

Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?

Options:

A.

RAM

B.

NIC

C.

GPU

D.

CPU

Buy Now
Questions 12

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Buy Now
Questions 13

Which of the following is an advantage of installing an application to the cloud?

Options:

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Buy Now
Questions 14

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

Options:

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Buy Now
Questions 15

Which of the following storage types is MOST vulnerable to magnetic damage?

Options:

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Buy Now
Questions 16

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Buy Now
Questions 17

Which of the following is most likely managed directly by the operating system?

Options:

A.

Email

B.

Database connections

C.

Memory allocation

D.

Instant messaging

Buy Now
Questions 18

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

Options:

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Buy Now
Questions 19

Which of the following describes the concept of a database record?

Options:

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Buy Now
Questions 20

Which of the following are the basic computing operations?

Options:

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Buy Now
Questions 21

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

Options:

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Buy Now
Questions 22

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.

Which of the following is the most likely cause?

Options:

A.

Firewall settings

B.

Improper switch configuration

C.

Incorrect IP address

D.

Misconfigured access point

Buy Now
Questions 23

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

Options:

A.

Permission

B.

Ink cartridge

C.

USB cable

D.

Driver

Buy Now
Questions 24

Which of the following is a reason why complex passwords are required?

Options:

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Buy Now
Questions 25

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

Options:

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Buy Now
Questions 26

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

Options:

A.

Add a switch and hardwire the users' laptops.

B.

Add a network router.

C.

Replace the users' laptops with desktop computers.

D.

Add an access point for the users.

Buy Now
Questions 27

A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?

Options:

A.

Sending it as an encrypted email to the other employee

B.

Putting it in a shared drive on the company's network

C.

Printing it out and giving it to the employee

D.

Putting it on the company's cloud document site

Buy Now
Questions 28

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Buy Now
Questions 29

Which of the following computer components allows for communication over a computer network?

Options:

A.

RAM

B.

NIC

C.

CPU

D.

NAS

Buy Now
Questions 30

Which of the following is most likely to disclose the data collection practices of an application?

Options:

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Buy Now
Questions 31

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Options:

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Buy Now
Questions 32

A company wants to provide encrypted remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would best fulfill these requirements?

Options:

A.

Disk-level encryption

B.

Secure web gateway

C.

VPN

D.

AES

Buy Now
Questions 33

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Buy Now
Questions 34

Which of the following best describes the technology utilized in digital wallets?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

RFID

Buy Now
Questions 35

A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

Options:

A.

USB

B.

HDMI

C.

FireWire

D.

VGA

E.

Bluetooth

F.

RJ45

Buy Now
Questions 36

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

Options:

A.

Output

B.

Storage

C.

Input

D.

Processing

Buy Now
Questions 37

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Buy Now
Questions 38

Which of the following is an example of an interpreted language?

Options:

A.

C++

B.

Java

C.

Python

D.

Go

Buy Now
Questions 39

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

Options:

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Buy Now
Questions 40

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

Options:

A.

Workstation

B.

Laptop

C.

Cellphone

D.

Thin client

Buy Now
Questions 41

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

Options:

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Buy Now
Questions 42

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of

application architectures did the employee use?

Options:

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

Buy Now
Questions 43

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

Options:

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Buy Now
Questions 44

Which of the following BEST explains the use of float over integer to store monetary values?

Options:

A.

It accepts negative values.

B.

It stores symbols

C.

It accommodates larger values.

D.

It supports decimals.

Buy Now
Questions 45

A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?

Options:

A.

Web-based

B.

IP-based

C.

Driver

D.

Plug-and-play

Buy Now
Questions 46

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Buy Now
Questions 47

Which of the following would be the most cost-effective method to increase availability?

Options:

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Buy Now
Questions 48

Which of the following is the largest storage capacity?

Options:

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Buy Now
Questions 49

Which of the following programming languages would most likely include tables and the select command?

Options:

A.

Compiled

B.

Markup

C.

Query

D.

Scripting

Buy Now
Questions 50

Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?

Options:

A.

Host-based firewall

B.

Antivirus

C.

Patching

D.

Network-based firewall

Buy Now
Questions 51

Which of the following data types would be best for storing data representing a phone number?

Options:

A.

String

B.

Integer

C.

Float

D.

Char

Buy Now
Questions 52

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

Options:

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Buy Now
Questions 53

Which of the following methods of cooling is most commonly used for desktops?

Options:

A.

Active

B.

External

C.

Cryogenics

D.

Water

Buy Now
Questions 54

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is

confirmed. Which of the following should be the technician’s NEXT step?

Options:

A.

Implement the solution.

B.

Document lessons learned.

C.

Establish a plan of action.

D.

Verify full system functionality.

Buy Now
Questions 55

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Options:

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Buy Now
Questions 56

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

Options:

A.

Performance Monitor

B.

Disk Management

C.

Event Viewer

D.

Device Manager

Buy Now
Questions 57

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Buy Now
Questions 58

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Buy Now
Questions 59

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Buy Now
Questions 60

Which of the following terms best describes the outcome of a text message that is encrypted from its original form?

Options:

A.

Cipher

B.

Vector

C.

Plain

D.

Algorithm

Buy Now
Questions 61

A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?

Options:

A.

Restart the computer when done.

B.

Log off the computer.

C.

Use private browsing.

D.

Enable pop-up blocker.

Buy Now
Questions 62

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

Options:

A.

Branching

B.

Looping

C.

Pseudocode

D.

Syntax errors

Buy Now
Questions 63

Which of the following should privacy expectations on a company intranet be limited to?

Options:

A.

Precedents

B.

HR policy

C.

Word of mouth

D.

System usage agreements

Buy Now
Questions 64

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Buy Now
Questions 65

Which of the following requires the MOST frequent updating to remain effective?

Options:

A.

Antivirus

B.

Host firewall

C.

Web browser

D.

Device drivers

Buy Now
Questions 66

Employee information is stored in a database. Which of the following BEST describes where all of an

employee’s information is stored?

Options:

A.

Record

B.

Report

C.

Column

D.

Procedure

Buy Now
Questions 67

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Buy Now
Questions 68

A function is BEST used for enabling programs to:

Options:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Buy Now
Questions 69

After purchasing a flash drive, the buyer notices that the packaging had already been opened. Which of the following is this is an example of?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Non-repudiation

Buy Now
Questions 70

A user is selecting software to visually display information in a marketing meeting. Which of the following software types should the user select?

Options:

A.

Spreadsheet

B.

Word processing

C.

Web browsing

D.

Presentation

Buy Now
Questions 71

A technician is investigating the who, what, when, where, and why of an issue. Which of the following steps of the troubleshooting methodology is the technician currently at?

Options:

A.

Identifying the problem

B.

Establishing a plan of action to resolve the issue

C.

Researching the issue

D.

Testing the theory to determine the cause

Buy Now
Questions 72

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Options:

A.

Concurrency

B.

Speed

C.

Scalability

D.

Variety

Buy Now
Questions 73

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Buy Now
Questions 74

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

Options:

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Buy Now
Questions 75

Which of the following would a company consider an asset?

Options:

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Buy Now
Questions 76

Which of the following is the most secure fllesystem?

Options:

A.

FAT32

B.

NFS

C.

NTFS

D.

exFAT

Buy Now
Questions 77

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?

Options:

A.

Private

B.

Traditional

C.

Public

D.

Cloud

Buy Now
Questions 78

Which of the following programming concepts uses properties and attributes?

Options:

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Buy Now
Questions 79

Which of the following notational systems does the value 10AF01 indicate?

Options:

A.

Unicode

B.

Binary

C.

Hexadecimal

D.

Octal

Buy Now
Questions 80

A program needs to choose apples, oranges, or bananas based on an input. Which of the following

programming constructs is BEST to use?

Options:

A.

Variable

B.

If

C.

Datatype

D.

Comment

Buy Now
Questions 81

Which of the following creates multifactor authentication when used with something you have?

Options:

A.

Single sign-on

B.

Hardware token

C.

Geolocation

D.

Password

Buy Now
Questions 82

Which of the following describes a unique entry to a data set?

Options:

A.

Schema

B.

Record

C.

Column

D.

Index

Buy Now
Questions 83

Which of the following is an example of multifactor authentication?

Options:

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Buy Now
Questions 84

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 85

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Buy Now
Questions 86

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

Options:

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Buy Now
Questions 87

Which of the following would most likely be used to verify a user is following an AUP?

Options:

A.

Application logs

B.

Security questions

C.

Access controls

D.

Biometric scans

Buy Now
Questions 88

Given the following pseudocode:

FC0-U61 Question 88

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

Options:

A.

10

B.

14

C.

15

D.

17

Buy Now
Questions 89

Which of the following is an example of a compiled language?

Options:

A.

C++

B.

SQL

C.

Python

D.

XML

Buy Now
Questions 90

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

Options:

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Buy Now
Questions 91

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Buy Now
Questions 92

A programmer is tasked with providing a human-readable rough draft of output. Which of the following techniques would be used?

Options:

A.

Flowchart

B.

Pseudocode

C.

Sequencing

D.

Network diagram

Buy Now
Questions 93

Which of the following data types should a database administrator use to store customer postal codes?

Options:

A.

Float

B.

String

C.

Boolean

D.

Integer

Buy Now
Questions 94

Which of the following allows network traffic to pass through it and filters specific packets?

Options:

A.

Switch

B.

Access point

C.

Modem

D.

Firewall

Buy Now
Questions 95

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Options:

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Buy Now
Questions 96

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

Options:

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Buy Now
Questions 97

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

Options:

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Buy Now
Questions 98

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

Options:

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Buy Now
Questions 99

After creating a database, which of the following would a developer most likely use to put data in the database?

Options:

A.

UPDATE

B.

ALTER

C.

INSERT

D.

SELECT

Buy Now
Questions 100

Which of the following is required to view videos stored on a DVD?

Options:

A.

Solid-state drive

B.

Flash drive

C.

Hard drive

D.

Optical drive

Buy Now
Questions 101

A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?

Options:

A.

Flowchart schema

B.

Physical schema

C.

Logical schema

D.

Table schema

Buy Now
Questions 102

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Options:

A.

Antivirus

B.

Anti-malware

C.

Device Manager

D.

Host firewall

Buy Now
Questions 103

Which of the following best describes the process of comparing MD5 values after downloading software?

Options:

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Nov 26, 2024
Questions: 344

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now FC0-U61 testing engine

PDF (Q&A)

$36.75  $104.99
buy now FC0-U61 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 03 Dec 2024