Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CompTIA FC0-U61 CompTIA IT Fundamentals+ Certification Exam Exam Practice Test

Demo: 69 questions
Total 231 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question 1

A technician has successfully verified full system functionality after implementing the solution to a problem.

Which of the following is the NEXT troubleshooting step the technician should do?

Options:

A.

Determine if anything has changed.

B.

Document lessons learned.

C.

Establish a theory of probable cause.

D.

Duplicate the problem, if possible.

Question 2

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

Options:

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Question 3

Which of the following is an advantage of installing an application to the cloud?

Options:

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Question 4

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Question 5

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Question 6

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

Options:

A.

Server

B.

Tape library

C.

External HDD

D.

Workstation

Question 7

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?

Options:

A.

Private

B.

Traditional

C.

Public

D.

Cloud

Question 8

Which of the following concerns does installing cross-platform software address?

Options:

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Question 9

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

Options:

A.

Integer

B.

Float

C.

Double

D.

String

Question 10

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

Options:

A.

Check Knowledge Base.

B.

Search local logs.

C.

Research possible theories.

D.

No. of users.

Question 11

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

Options:

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Question 12

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

Options:

A.

Update from 802.11b to 802.11g.

B.

Ensure sources of EMI are removed.

C.

Enable WPA2-Enterprise.

D.

Use WiFi Protected Setup.

Question 13

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Question 14

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.

Method

B.

Object

C.

Property

D.

Attribute

Question 15

Which of the following business continuity concepts is the best example of fault tolerance?

Options:

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Question 16

Which of the following would be the most cost-effective method to increase availability?

Options:

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Question 17

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

Options:

A.

Turn on private browsing

B.

Delete browsing history on program close.

C.

Notify when downloads are complete.

D.

Configure prompting before downloading content.

Question 18

A developer needs to add a table to a database. Which of the following database activities should the user

perform?

Options:

A.

UPDATE

B.

ALTER

C.

CREATE

D.

REPORT

Question 19

An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?

Options:

A.

Type 1 hypervisor OS

B.

Server OS

C.

Embedded OS

D.

Workstation OS

Question 20

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

Options:

A.

Data capture and collections

B.

Asset inventory inputs

C.

Sales statistics

D.

Average loss output

Question 21

To establish a theory of probable cause, one technician investigates network issues in the server room while

another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies

is being performed?

Options:

A.

QUESTION NO: the obvious.

B.

Divide and conquer.

C.

Duplicate the problem

D.

Research the knowledge base.

Question 22

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

Options:

A.

Establish a plan of action.

B.

Gather information

C.

Duplicate the problem.

D.

Find the root cause.

Question 23

Which of the following security concerns is a threat to confidentiality?

Options:

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Question 24

Which of the following are the basic computing operations?

Options:

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Question 25

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

Options:

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Question 26

Which of the following is an example of an interpreted language?

Options:

A.

C++

B.

Java

C.

Python

D.

Go

Question 27

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Question 28

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Question 29

Which of the following shows how many results are possible when evaluating Boolean data types?

Options:

A.

Two

B.

Four

C.

Three

D.

Five

Question 30

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Question 31

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Question 32

Which of the following would be the best reason to implement a host firewall?

Options:

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Question 33

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Options:

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Question 34

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Question 35

Which of the following database structures is the most granular?

Options:

A.

Column

B.

Field

C.

Record

D.

Table

Question 36

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which

of the following devices is a user MOST likely to configure to allow this?

Options:

A.

Cable modem

B.

Wireless router

C.

Access point

D.

Network switch

Question 37

Which of the following is an example of a compiled language?

Options:

A.

C++

B.

SQL

C.

Python

D.

XML

Question 38

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

Options:

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Question 39

A company requires several reports that analyze related information from sales, inventory, marketing, and

compensation data. Which of the following is the BEST place to store this data?

Options:

A.

Flat file

B.

Word processor

C.

Database

D.

Network share

Question 40

A business would like to create an employee portal that employees will have access to when they are at work.

The employees will not be able to connect to the portal from home without a VPN connection. Which of the

following types of application does this describe?

Options:

A.

Local application

B.

Intranet application

C.

Extranet application

D.

Internet application

Question 41

Which of the following does a NoSQL database use to organize data?

Options:

A.

Primary keys

B.

Schemas

C.

Keys/values

D.

Tables

Question 42

Which of the following best describes when lo use an array?

Options:

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Question 43

Which of the following are benefits of a security awareness training program9 (Select two).

Options:

A.

Enhances overall security

B.

Provides information on how to avoid phishing

C.

Lowers the incidence of hardware failures

D.

Increases the availability of computers

E.

Advances end users' technical skills

F.

Creates IT security opportunities for end users

Question 44

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Options:

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Question 45

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

Options:

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Question 46

Which of the following is a value that uniquely identifies a database record?

Options:

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Question 47

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Options:

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

Question 48

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.

Array

B.

Vector

C.

List

D.

String

Question 49

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

Options:

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Question 50

Which of the following internet service types is most susceptible to weather disruptions?

Options:

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Question 51

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

Options:

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Question 52

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Question 53

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

Options:

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Question 54

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

Options:

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Question 55

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

Options:

A.

Output

B.

Storage

C.

Input

D.

Processing

Question 56

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Question 57

Which of the following is an example of multifactor authentication?

Options:

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Question 58

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Question 59

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

Options:

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Question 60

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

Options:

A.

T1 line

B.

Satellite

C.

Fiber optic

D.

DSL

Question 61

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

Options:

A.

Proprietary software

B.

Commercial software

C.

Open-source software

D.

Cross-platform software

Question 62

Which of the following is most likely to disclose the data collection practices of an application?

Options:

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Question 63

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

Options:

A.

Boolean

B.

Integer

C.

Float

D.

Char

Question 64

Which of the following database concepts would MOST likely use a CSV file?

Options:

A.

Data querying

B.

Data reports

C.

Data importing

D.

Data persistence

Question 65

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Question 66

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

Options:

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Question 67

SQL databases use primary and foreign keys to enable which of the following?

Options:

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Question 68

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

Options:

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Question 69

Which of the following BEST describes a kilobyte?

Options:

A.

A kilobyte is a measurement of storage (e.g., 100KB).

B.

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.

A kilobyte is a measurement of power (e.g., 100KW).

D.

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Demo: 69 questions
Total 231 questions