Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA FC0-U61 CompTIA IT Fundamentals+ Certification Exam Exam Practice Test

Page: 1 / 23
Total 231 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question 1

Which of the following contains exactly four copper wires?

Options:

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Question 2

Which of the following would be best to use to store a project task list that will be updated by multiple team members?

Options:

A.

Visual diagramming software

B.

Document sharing software

C.

Conferencing software

D.

Database software

Question 3

Privacy expectations on a company intranet should be limited to:

Options:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Question 4

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

Options:

A.

Open

B.

WEP

C.

WPA

D.

WPA2

Question 5

Which of the following best describes when lo use an array?

Options:

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Question 6

Which of the following BEST describes an application running on a typical operating system?

Options:

A.

Process

B.

Thread

C.

Function

D.

Task

Question 7

Given the following pseudocode:

Question # 7

Which of the following would be the output of the program?

Options:

A.

foohappy

B.

barsad

C.

foosad

D.

barhappy

Question 8

Which of the following best explains the reason for password expiration?

Options:

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Question 9

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Question 10

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Question 11

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

Options:

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Question 12

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Question 13

Which of the following types of encryptions would BEST protect a laptop computer in the event of theft?

Options:

A.

Disk

B.

Email

C.

VPN

D.

HTTPS

Question 14

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.

Array

B.

Vector

C.

List

D.

String

Question 15

A company is concerned with ensuring its databases are highly available. Which of the following can be used to

increase database availability?

Options:

A.

Backups

B.

Prioritization

C.

Indexes

D.

Failover

Question 16

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Question 17

Which of the following is an advantage of installing an application to the cloud?

Options:

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Question 18

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Question 19

Which of the following does a NoSQL database use to organize data?

Options:

A.

Primary keys

B.

Schemas

C.

Keys/values

D.

Tables

Question 20

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

Options:

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Question 21

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

Options:

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Question 22

Which of the following storage devices have a spinning disk? (Choose two.)

Options:

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Question 23

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

Options:

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Question 24

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

Options:

A.

Integer

B.

Float

C.

Double

D.

String

Question 25

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Question 26

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

Options:

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Question 27

A UPS provides protection against:

Options:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Question 28

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

Options:

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Question 29

Which of the following BEST describes the physical location of the data in the database?

Options:

A.

Table

B.

Column

C.

RAM

D.

HDD

Question 30

An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?

Options:

A.

Type 1 hypervisor OS

B.

Server OS

C.

Embedded OS

D.

Workstation OS

Question 31

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Question 32

Which of the following commands would most likely be used to add data to an existing database table?

Options:

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Question 33

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Question 34

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Question 35

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

Options:

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Question 36

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

Options:

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Question 37

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Question 38

Which of the following would be the most cost-effective method to increase availability?

Options:

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Question 39

Which of the following concerns does installing cross-platform software address?

Options:

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Question 40

Which of the following filesystems would a Linux computer MOST likely use?

Options:

A.

HFS

B.

NTFS

C.

FAT32

D.

ext4

Question 41

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

Options:

A.

Output

B.

Storage

C.

Input

D.

Processing

Question 42

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Question 43

A programmer uses DML to modify:

Options:

A.

files

B.

permissions

C.

data

D.

backups

Question 44

Which of the following commands can be used to remove a database permanently?

Options:

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Question 45

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Question 46

The computer language that is closest to machine code is:

Options:

A.

query language

B.

scripting language

C.

markup language

D.

assembly language

Question 47

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

Options:

A.

T1 line

B.

Satellite

C.

Fiber optic

D.

DSL

Question 48

Which of the following is the exact number of bytes in a gigabyte?

Options:

A.

1,024 bytes

B.

1,048,576 bytes

C.

1,073,741,824 bytes

D.

1,099,511,627,776 bytes

Question 49

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Options:

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Question 50

Which of the following database concepts would MOST likely use a CSV file?

Options:

A.

Data querying

B.

Data reports

C.

Data importing

D.

Data persistence

Question 51

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

Options:

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Question 52

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Question 53

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

Options:

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Question 54

Which of the following creates multifactor authentication when used with something you have?

Options:

A.

Single sign-on

B.

Hardware token

C.

Geolocation

D.

Password

Question 55

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Question 56

Which of the following is an example of multifactor authentication?

Options:

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Question 57

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Options:

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Question 58

Which of the following is the closest to machine language?

Options:

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Question 59

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Question 60

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

Options:

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Question 61

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

Options:

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Question 62

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

Options:

A.

Data capture and collections

B.

Asset inventory inputs

C.

Sales statistics

D.

Average loss output

Question 63

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Question 64

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

Options:

A.

Turn on private browsing

B.

Delete browsing history on program close.

C.

Notify when downloads are complete.

D.

Configure prompting before downloading content.

Question 65

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Options:

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

Question 66

Which of the following file extensions is used for a consolidated group of files?

Options:

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Question 67

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Question 68

SQL databases use primary and foreign keys to enable which of the following?

Options:

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Question 69

Which of the following protocols is used to relay email from a user's mail server?

Options:

A.

IMAP

B.

FTP

C.

SMTP

D.

POP3

Page: 1 / 23
Total 231 questions