March Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

CompTIA FC0-U61 Dumps

Page: 1 / 17
Total 231 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question 1

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

Options:

A.

Integer

B.

Float

C.

Double

D.

String

Question 2

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?

Options:

A.

Group license

B.

Concurrent license

C.

Subscription license

D.

Open-source license

Question 3

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

Options:

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Question 4

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

Options:

A.

Word processing

B.

Spreadsheet

C.

Text editor

D.

Visual diagramming

Question 5

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

Options:

A.

redundancy.

B.

replication.

C.

prioritization.

D.

fault tolerance.

Question 6

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Question 7

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Question 8

An IP address is 32 bits long. If converted to bytes, it would be:

Options:

A.

4 bytes

B.

8 bytes

C.

16 bytes

D.

64 bytes

Question 9

Which of the following programming languages would most likely include tables and the select command?

Options:

A.

Compiled

B.

Markup

C.

Query

D.

Scripting

Question 10

A business would like to create an employee portal that employees will have access to when they are at work.

The employees will not be able to connect to the portal from home without a VPN connection. Which of the

following types of application does this describe?

Options:

A.

Local application

B.

Intranet application

C.

Extranet application

D.

Internet application

Question 11

Which of the following is an advantage of a fiat file?

Options:

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Question 12

A user needs an interface that supports both video and data. Which of the following will meet this requirement?

Options:

A.

Thunderbolt

B.

VGA

C.

DVI

D.

FireWire

Question 13

Which of the following is a reason why complex passwords are required?

Options:

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Question 14

Which of the following language types most likely controls the way a web page looks?

Options:

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Question 15

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

Options:

A.

Duplicate the problem

B.

Gather information

C.

QUESTION NO: users

D.

Divide and conquer

Question 16

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

Options:

A.

Server

B.

Tape library

C.

External HDD

D.

Workstation

Question 17

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

Options:

A.

10

B.

14

C.

15

D.

17

Question 18

Which of the following database concepts would MOST likely use a CSV file?

Options:

A.

Data querying

B.

Data reports

C.

Data importing

D.

Data persistence

Question 19

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Question 20

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Question 21

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

Options:

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Question 22

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Options:

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Question 23

Which of the following is an example of multifactor authentication?

Options:

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Question 24

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Question 25

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Question 26

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

Options:

A.

Output

B.

Storage

C.

Input

D.

Processing

Question 27

Which of the following database structures is the most granular?

Options:

A.

Column

B.

Field

C.

Record

D.

Table

Question 28

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

Options:

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Question 29

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

Options:

A.

Fiber

B.

DSL

C.

Cable

D.

Satellite

Question 30

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

Options:

A.

127.0.0.1

B.

172.16.2.189

C.

192.168.257.1

D.

255.255.255.0

Question 31

Which of the following connection types is typically used for a display monitor?

Options:

A.

USB

B.

DVI

C.

Bluetooth

D.

RJ45

Question 32

Which of the following file extensions is used for a consolidated group of files?

Options:

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Question 33

Which of the following is an example of a compiled language?

Options:

A.

C++

B.

SQL

C.

Python

D.

XML

Question 34

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Question 35

Which of the following is a logical structure for storing files?

Options:

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Question 36

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Question 37

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Options:

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Question 38

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Question 39

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Question 40

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.

Loop

B.

Variable

C.

Constant

D.

Function

Question 41

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Question 42

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

Options:

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Question 43

Which of the following best protects data in transit?

Options:

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Question 44

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.

Web page

B.

List

C.

Flat file

D.

Database

Question 45

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Question 46

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Question 47

A technician has successfully verified full system functionality after implementing the solution to a problem.

Which of the following is the NEXT troubleshooting step the technician should do?

Options:

A.

Determine if anything has changed.

B.

Document lessons learned.

C.

Establish a theory of probable cause.

D.

Duplicate the problem, if possible.

Question 48

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.

Integer

B.

String

C.

Float

D.

Boolean

Question 49

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 50

Which of the following is a value that uniquely identifies a database record?

Options:

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Question 51

Which of the following interfaces is best for viewing database performance information?

Options:

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Question 52

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

Options:

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Question 53

Which of the following contains exactly four copper wires?

Options:

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Question 54

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Question 55

Which of the following are benefits of a security awareness training program9 (Select two).

Options:

A.

Enhances overall security

B.

Provides information on how to avoid phishing

C.

Lowers the incidence of hardware failures

D.

Increases the availability of computers

E.

Advances end users' technical skills

F.

Creates IT security opportunities for end users

Question 56

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Question 57

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Question 58

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

Options:

A.

Add a switch and hardwire the users' laptops.

B.

Add a network router.

C.

Replace the users' laptops with desktop computers.

D.

Add an access point for the users.

Question 59

A user logs into a laptop using a username and complex password. This is an example of:

Options:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Question 60

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

Options:

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Question 61

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

Options:

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Question 62

A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

Options:

A.

Database

B.

Webserver

C.

File

D.

Operating system

Question 63

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

Options:

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Question 64

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Options:

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Question 65

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Question 66

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

Options:

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Question 67

Which of the following allows wireless devices to communicate to a wired network?

Options:

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Question 68

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Question 69

Which of the following is a wireless communication that requires devices to be within 6in of each other to

transfer information?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

WiFi

Page: 1 / 17
Total 231 questions