Weekend Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Questions 4

Which of the following best describes when lo use an array?

Options:

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Buy Now
Questions 5

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Buy Now
Questions 6

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Options:

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Buy Now
Questions 7

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

Options:

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Buy Now
Questions 8

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Buy Now
Questions 9

Which of the following should be done first when working on a potential issue?

Options:

A.

Implement a solution.

B.

Escalate the issue.

C.

Research the issue.

D.

Gather information.

Buy Now
Questions 10

Given the following pseudocode:

FC0-U61 Question 10

Which of the following would be the output of the program?

Options:

A.

foohappy

B.

barsad

C.

foosad

D.

barhappy

Buy Now
Questions 11

Which of the following BEST describes a kilobyte?

Options:

A.

A kilobyte is a measurement of storage (e.g., 100KB).

B.

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.

A kilobyte is a measurement of power (e.g., 100KW).

D.

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Buy Now
Questions 12

A technician is investigating the who, what, when, where, and why of an issue. Which of the following steps of the troubleshooting methodology is the technician currently at?

Options:

A.

Identifying the problem

B.

Establishing a plan of action to resolve the issue

C.

Researching the issue

D.

Testing the theory to determine the cause

Buy Now
Questions 13

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Options:

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Buy Now
Questions 14

An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?

Options:

A.

Type 1 hypervisor OS

B.

Server OS

C.

Embedded OS

D.

Workstation OS

Buy Now
Questions 15

Which of the following language types most likely controls the way a web page looks?

Options:

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Buy Now
Questions 16

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.

Method

B.

Object

C.

Property

D.

Attribute

Buy Now
Questions 17

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

Options:

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Buy Now
Questions 18

A user logs into a laptop using a username and complex password. This is an example of:

Options:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Buy Now
Questions 19

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

Options:

A.

Server

B.

Tape library

C.

External HDD

D.

Workstation

Buy Now
Questions 20

When following the troubleshooting methodology, which of the following should be performed last?

Options:

A.

Document findings.

B.

Establish a plan.

C.

Determine the cause.

D.

Verify functionality.

Buy Now
Questions 21

In an effort to reduce costs, a company decides not to renew its contract for a secure shredding service. Which of the following risks should the management team most likely be concerned with if employees fail to properly dispose of documents according to security protocols?

Options:

A.

Dumpster diving

B.

Snooping

C.

Unauthorized information alteration

D.

Social engineering

Buy Now
Questions 22

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Buy Now
Questions 23

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

Options:

A.

Establish a plan of action.

B.

Gather information

C.

Duplicate the problem.

D.

Find the root cause.

Buy Now
Questions 24

Which of following PC components operates only as an input device?

Options:

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Buy Now
Questions 25

Which of the following describes the concept of a database record?

Options:

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Buy Now
Questions 26

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently

released new device. After configuring the new device utilizing the old SSID and key, some light switches are

no longer communicating. Which of the following is the MOST likely cause?

Options:

A.

The light switches do not support WPA2.

B.

The router is operating on a different channel.

C.

The key does not meet password complexity requirements.

D.

The SSID is not being broadcast.

Buy Now
Questions 27

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

Options:

A.

Integer

B.

Float

C.

Double

D.

String

Buy Now
Questions 28

During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?

Options:

A.

Instant messaging

B.

Mobile applications

C.

Social media

D.

Video-sharing website

Buy Now
Questions 29

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

Options:

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Buy Now
Questions 30

A UPS provides protection against:

Options:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Buy Now
Questions 31

Which of the following categories describes commands used to extract information from a database?

Options:

A.

DDL

B.

DDR

C.

DLL

D.

DML

Buy Now
Questions 32

Which of the following is the equivalent of 1 KB?

Options:

A.

0.01 googol

B.

1,000 bits

C.

8,000 bits

D.

8,000 bytes

Buy Now
Questions 33

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Options:

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Buy Now
Questions 34

Which of the following is best used to store many integers in one container?

Options:

A.

Array

B.

Function

C.

Variable

D.

Constant

Buy Now
Questions 35

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Buy Now
Questions 36

Which of the following connection types is typically used for a display monitor?

Options:

A.

USB

B.

DVI

C.

Bluetooth

D.

RJ45

Buy Now
Questions 37

A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).

Options:

A.

Private browsing is enabled.

B.

Extensions are out-of-date.

C.

Proxy settings are incorrect.

D.

An incompatible browser is being used.

E.

A pop-up blocker is enabled.

F.

An invalid certificate has been issued.

Buy Now
Questions 38

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Buy Now
Questions 39

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

Options:

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Buy Now
Questions 40

Which of the following is a logical structure for storing files?

Options:

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Buy Now
Questions 41

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

Options:

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Buy Now
Questions 42

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

Options:

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Buy Now
Questions 43

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

Options:

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Buy Now
Questions 44

Which of the following database types would be best in which to place financial data?

Options:

A.

Unstructured

B.

Semi-structured

C.

Structured

D.

Spreadsheet

Buy Now
Questions 45

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Buy Now
Questions 46

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Buy Now
Questions 47

A developer needs to add a table to a database. Which of the following database activities should the user

perform?

Options:

A.

UPDATE

B.

ALTER

C.

CREATE

D.

REPORT

Buy Now
Questions 48

When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?

Options:

A.

SMTP

B.

DHCP

C.

WPA

D.

DNS

E.

WEP

Buy Now
Questions 49

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

Options:

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Buy Now
Questions 50

Which of the following is something that would likely need a copyright?

Options:

A.

A new commercial software program

B.

A company's brand name

C.

A copy of a business contract

D.

An idea for computer communication

Buy Now
Questions 51

Which of the following connection types provides the fastest internet speed?

Options:

A.

Cellular

B.

Asymmetric DSL

C.

Symmetric DSL

D.

Fiber to the curb

Buy Now
Questions 52

Which of the following filesystems would a Linux computer MOST likely use?

Options:

A.

HFS

B.

NTFS

C.

FAT32

D.

ext4

Buy Now
Questions 53

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Options:

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Buy Now
Questions 54

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

Options:

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Buy Now
Questions 55

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

Options:

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Buy Now
Questions 56

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Buy Now
Questions 57

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

Options:

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Buy Now
Questions 58

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

Options:

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Buy Now
Questions 59

A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the

following types of software would BEST complete this task?

Options:

A.

Text editing software

B.

Visual diagramming software

C.

Spreadsheet software

D.

Web browsing software

Buy Now
Questions 60

Which of the following OS features would be best to use to remove unnecessary programs?

Options:

A.

Application management

B.

Disk management

C.

Process management

D.

Memory management

Buy Now
Questions 61

To establish a theory of probable cause, one technician investigates network issues in the server room while

another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies

is being performed?

Options:

A.

QUESTION NO: the obvious.

B.

Divide and conquer.

C.

Duplicate the problem

D.

Research the knowledge base.

Buy Now
Questions 62

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Buy Now
Questions 63

Which of the following storage types is MOST vulnerable to magnetic damage?

Options:

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Buy Now
Questions 64

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

Options:

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Buy Now
Questions 65

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

Options:

A.

Password manager

B.

Password reuse

C.

Password history

D.

Password reset

Buy Now
Questions 66

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Options:

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Buy Now
Questions 67

Which of the following is the most secure fllesystem?

Options:

A.

FAT32

B.

NFS

C.

NTFS

D.

exFAT

Buy Now
Questions 68

Which of the following is an example of structured data?

Options:

A.

Video recordings

B.

Social media posts

C.

Photographs

D.

Phone numbers

Buy Now
Questions 69

of the following would most likely be used to protect the intellectual property of printed materials?

Options:

A.

Trademark

B.

Cease and desist

C.

Patent

D.

Copyright

Buy Now
Questions 70

A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

Options:

A.

USB

B.

HDMI

C.

FireWire

D.

VGA

E.

Bluetooth

F.

RJ45

Buy Now
Questions 71

Which of the following storage devices have a spinning disk? (Choose two.)

Options:

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Buy Now
Questions 72

A company requires several reports that analyze related information from sales, inventory, marketing, and

compensation data. Which of the following is the BEST place to store this data?

Options:

A.

Flat file

B.

Word processor

C.

Database

D.

Network share

Buy Now
Questions 73

Which of the following business continuity concepts is the best example of fault tolerance?

Options:

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Buy Now
Questions 74

Which of the following commands can be used to remove a database permanently?

Options:

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Buy Now
Questions 75

Which of the following contains exactly four copper wires?

Options:

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Buy Now
Questions 76

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Buy Now
Questions 77

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Buy Now
Questions 78

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Buy Now
Questions 79

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this

document for public use. Which of the following should the developer use to BEST protect the document?

Options:

A.

Patent

B.

Trademark

C.

Watermark

D.

Copyright

Buy Now
Questions 80

Which of the following types of memory can retain its content after a system reboot?

Options:

A.

DDR

B.

DIMM

C.

RAM

D.

ROM

Buy Now
Questions 81

Which of the following are the primary functions of an operating system? (Choose two.)

Options:

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Buy Now
Questions 82

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

Options:

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Buy Now
Questions 83

Which of the following methods of cooling is most commonly used for desktops?

Options:

A.

Active

B.

External

C.

Cryogenics

D.

Water

Buy Now
Questions 84

Within a database, which of the following would be the best access method to use to display a subset of a table?

Options:

A.

UPDATE

B.

DROP

C.

SELECT

D.

INSERT

Buy Now
Questions 85

A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?

Options:

A.

Delete the tracking cookies.

B.

Avoid password reuse.

C.

Use a complex password.

D.

Clear the browser cache.

Buy Now
Questions 86

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Options:

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: May 17, 2024
Questions: 288

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now FC0-U61 testing engine

PDF (Q&A)

$35  $99.99
buy now FC0-U61 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 20 May 2024