Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA FC0-U61 CompTIA IT Fundamentals+ Certification Exam Exam Practice Test

Page: 1 / 34
Total 344 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

A database administrator has created a primary table and must ensure the date column in the table only accepts date values. Which of the following does the administrator need to set?

Options:

A.

Schema

B.

Primary key

C.

Constrain!

D.

Permissions

Question 2

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Options:

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Question 3

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

Options:

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Question 4

The computer language that is closest to machine code is:

Options:

A.

query language

B.

scripting language

C.

markup language

D.

assembly language

Question 5

A user is trying to set up a new wireless access point. Which of the following should the user do first?

Options:

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Question 6

Which of the following commands can be used to remove a database permanently?

Options:

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Question 7

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Question 8

Which of the following best explains the reason for password expiration?

Options:

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Question 9

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Options:

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Question 10

When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?

Options:

A.

SMTP

B.

DHCP

C.

WPA

D.

DNS

E.

WEP

Question 11

Which of the following concerns does installing cross-platform software address?

Options:

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Question 12

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Options:

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Question 13

Which of the following BEST describes the physical location of the data in the database?

Options:

A.

Table

B.

Column

C.

RAM

D.

HDD

Question 14

Which of the following is a value that uniquely identifies a database record?

Options:

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Question 15

Which of the following language types most likely controls the way a web page looks?

Options:

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Question 16

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

Options:

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Question 17

After purchasing a flash drive, the buyer notices that the packaging had already been opened. Which of the following is this is an example of?

Options:

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Non-repudiation

Question 18

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

Options:

A.

Branching

B.

Looping

C.

Pseudocode

D.

Syntax errors

Question 19

Which of the following is the equivalent of 1 KB?

Options:

A.

0.01 googol

B.

1,000 bits

C.

8,000 bits

D.

8,000 bytes

Question 20

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is

confirmed. Which of the following should be the technician’s NEXT step?

Options:

A.

Implement the solution.

B.

Document lessons learned.

C.

Establish a plan of action.

D.

Verify full system functionality.

Question 21

After a user connects a laptop to a newly purchased printer, the user is unable to print. Which of the following is most likely causing the issue?

Options:

A.

The OS updates have not been applied on the laptop.

B.

The security software is out of date.

C.

The printer drivers are not installed.

D.

The firewall has not been configured.

Question 22

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Question 23

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

Options:

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Question 24

A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?

Options:

A.

Private browsing

B.

Pop-up blockers

C.

Bookmarks

D.

Accessibility

Question 25

Which of following PC components operates only as an input device?

Options:

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Question 26

A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?

Options:

A.

RJ11

B.

RJ45

C.

USB

D.

Bluetooth

Question 27

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

Options:

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Question 28

Which of the following violates password best practices?

Options:

A.

Password reuse across sites

B.

Password history

C.

Password expiration

D.

Password complexity

Question 29

Which of the following are the primary functions of an operating system? (Choose two.)

Options:

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Question 30

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Question 31

Which of the following is best used to store many integers in one container?

Options:

A.

Array

B.

Function

C.

Variable

D.

Constant

Question 32

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

Options:

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Question 33

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

Options:

A.

10

B.

14

C.

15

D.

17

Question 34

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

Options:

A.

Integer

B.

Float

C.

Double

D.

String

Question 35

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Options:

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Question 36

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

Options:

A.

Performance Monitor

B.

Disk Management

C.

Event Viewer

D.

Device Manager

Question 37

Which of the following data types is used to implement a simple counter application?

Options:

A.

Boolean

B.

Integer

C.

String

D.

Floating point

Question 38

Which of the following filesystems is compatible with the greatest number of operating systems?

Options:

A.

ext4

B.

FAT32

C.

NTFS

D.

HFS

Question 39

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Question 40

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Question 41

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

Options:

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Question 42

Which of the following is required for a cloud network?

Options:

A.

Local applications

B.

Credentials

C.

Internet access

D.

Network infrastructure

Question 43

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

Options:

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Question 44

Which of the following is an example of a query language?

Options:

A.

C++

B.

Python

C.

XML

D.

SQL

Question 45

Which of the following file extensions is used for a consolidated group of files?

Options:

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Question 46

A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).

Options:

A.

Private browsing is enabled.

B.

Extensions are out-of-date.

C.

Proxy settings are incorrect.

D.

An incompatible browser is being used.

E.

A pop-up blocker is enabled.

F.

An invalid certificate has been issued.

Question 47

Which of the following would indicate the FASTEST processor speed?

Options:

A.

3.6GHz

B.

3.6MHz

C.

3.6Mbps

D.

3.6Gbps

Question 48

A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

Options:

A.

USB

B.

HDMI

C.

FireWire

D.

VGA

E.

Bluetooth

F.

RJ45

Question 49

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

Options:

A.

Fiber

B.

DSL

C.

Cable

D.

Satellite

Question 50

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Question 51

Which of the following best describes the process of comparing MD5 values after downloading software?

Options:

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Question 52

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

Options:

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Question 53

Which of the following describes the concept of a database record?

Options:

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Question 54

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

Options:

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Question 55

An engineer has been assigned the task of establishing network connectivity in a remote area where telephone lines are readily available but other infrastructure is limited. Which of the following technologies would be the best solution?

Options:

A.

Cable

B.

Fiber optic

C.

Wireless network

D.

DSL

Question 56

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

Options:

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Question 57

Which of the following is required to view videos stored on a DVD?

Options:

A.

Solid-state drive

B.

Flash drive

C.

Hard drive

D.

Optical drive

Question 58

Which of the following best describes the technology utilized in digital wallets?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

RFID

Question 59

Which of the following business continuity concepts is the best example of fault tolerance?

Options:

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Question 60

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Question 61

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Question 62

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

Options:

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Question 63

Which of the following is an example of an interpreted language?

Options:

A.

C++

B.

Java

C.

Python

D.

Go

Question 64

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

Options:

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Question 65

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?

Options:

A.

Variable

B.

Attribute

C.

Method

D.

Looping

Question 66

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Question 67

A script is designed to save the results of user input from a survey to a database table. Which of the following database access methods is used to add the survey data to the table?

Options:

A.

Direct access

B.

Query builder

C.

User interface

D.

Programmatic access

Question 68

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

Options:

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Question 69

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.

Array

B.

Vector

C.

List

D.

String

Question 70

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Question 71

Which of the following should a technician do to fix stability issues on a workstation?

Options:

A.

Install a malicious software analyzer.

B.

Install a firewall.

C.

Install browsing controls.

D.

Install updates.

Question 72

A hotel guest is using the public computer to check travel plans. Which of the following is the best approach to prevent others from seeing what the guest was doing on the computer?

Options:

A.

Restart the computer when done.

B.

Log off the computer.

C.

Use private browsing.

D.

Enable pop-up blocker.

Question 73

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Question 74

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Question 75

A company wants to provide encrypted remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would best fulfill these requirements?

Options:

A.

Disk-level encryption

B.

Secure web gateway

C.

VPN

D.

AES

Question 76

After creating a database, which of the following would a developer most likely use to put data in the database?

Options:

A.

UPDATE

B.

ALTER

C.

INSERT

D.

SELECT

Question 77

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

Options:

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Question 78

Which of the following storage types is MOST vulnerable to magnetic damage?

Options:

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Question 79

Which of the following would most likely be used to protect the intellectual property of printed materials?

Options:

A.

Trademark

B.

Cease and desist

C.

Patent

D.

Copyright

Question 80

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Options:

A.

Antivirus

B.

Anti-malware

C.

Device Manager

D.

Host firewall

Question 81

A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of licenses is this an example of?

Options:

A.

Group license

B.

Concurrent license

C.

Subscription license

D.

Open-source license

Question 82

A technician has been asked to install a video interface that can support both high bandwidth digital video and audio on a single cable. Which of the following should the technician use?

Options:

A.

DVI

B.

VGA

C.

DisplayPort

D.

S-video

E.

HDMI

Question 83

Which of the following availability concerns is mitigated by having a business continuity site?

Options:

A.

Service outage

B.

Wiretapping

C.

Eavesdropping

D.

Replay attack

Question 84

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Options:

A.

Password reuse

B.

Snooping

C.

Social engineering

D.

Phishing

Question 85

Which of the following would be considered the BEST method of securely distributing medical records?

Options:

A.

Encrypted flash drive

B.

Social networking sites

C.

Fax

D.

FTP file sharing

Question 86

A technician has established a plan of action. Which of the following should the technician do next?

Options:

A.

Verify system functionality.

B.

Identify preventive measures.

C.

Document the findings.

D.

Implement a solution.

Question 87

Which of the following would be the most cost-effective method to increase availability?

Options:

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Question 88

Which of the following statements BEST describes binary?

Options:

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Question 89

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Options:

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Question 90

A function is BEST used for enabling programs to:

Options:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Question 91

A user logs into a laptop using a username and complex password. This is an example of:

Options:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Question 92

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Question 93

Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?

Options:

A.

Private

B.

Traditional

C.

Public

D.

Cloud

Question 94

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Options:

A.

Concurrency

B.

Speed

C.

Scalability

D.

Variety

Question 95

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently

released new device. After configuring the new device utilizing the old SSID and key, some light switches are

no longer communicating. Which of the following is the MOST likely cause?

Options:

A.

The light switches do not support WPA2.

B.

The router is operating on a different channel.

C.

The key does not meet password complexity requirements.

D.

The SSID is not being broadcast.

Question 96

Which of the following are benefits of a security awareness training program9 (Select two).

Options:

A.

Enhances overall security

B.

Provides information on how to avoid phishing

C.

Lowers the incidence of hardware failures

D.

Increases the availability of computers

E.

Advances end users' technical skills

F.

Creates IT security opportunities for end users

Question 97

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Question 98

A software developer has created a program for the accounting department. The finance department requests the same program but requires some changes to the code to meet its needs. Which of the following should be performed?

Options:

A.

Compiling

B.

Looping

C.

Sequencing

D.

Branching

Question 99

Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?

Options:

A.

Host-based firewall

B.

Antivirus

C.

Patching

D.

Network-based firewall

Question 100

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

Options:

A.

SMTP

B.

POP3

C.

SNMP

D.

DHCP

E.

ICMP

F.

SFTP

Question 101

Which of the following database types would be best in which to place financial data?

Options:

A.

Unstructured

B.

Semi-structured

C.

Structured

D.

Spreadsheet

Question 102

For which of the following is a relational database management system MOST commonly used?

Options:

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Question 103

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

Options:

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Page: 1 / 34
Total 344 questions