New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! FC0-U51 has been withdrawn. The new exam code is FC0-U61

Practice Free FC0-U51 CompTIA IT Fundamentals Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA FC0-U51 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA IT Fundamentals exam materials available for free to everyone. You can take the Free FC0-U51 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?

A.

Enabling full disk encryption

B.

Requiring screensaver password

C.

Disabling Bluetooth adapters

D.

Adding multifactor authentication

Question # 7

A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?

A.

Dumpster diving

B.

Shoulder surfing

C.

Phishing

D.

Social engineering

Question # 8

Which of the following is the BEST reason to backup data?

A.

To ensure data encryption

B.

To ensure data stability

C.

To ensure data security

D.

To ensure data availability

Question # 9

Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?

A.

Shortcut

B.

URL

C.

Attachment

D.

FTP

Question # 10

When connecting a printer to a network, which of the following is needed to complete the process? (Select TWO).

A.

IP address

B.

User's password

C.

Computer’s name

D.

Subnet mask

E.

HTTP port

F.

Fax number

Question # 11

After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?

A.

The application has to be registered to the user.

B.

The application must be upgraded to a 64-bit version.

C.

The application must be activated.

D.

The application needs to be reinstalled.

Question # 12

Which of the following BEST describes the pros and cons of a home wired network?

A.

Low throughput, low mobility, high availability, high latency, high security

B.

High throughput, high mobility, low availability, low latency, high security

C.

High throughput, low mobility, high availability, low latency, high security

D.

Low throughput, high mobility, low availability, high latency, low security

Question # 13

An employee’s new computer came with a free 30-day trial version of antivirus software. The employee’s company provides enterprise antivirus software from a different vendor. Which of the following should the employee do in order to use a full version of antivirus software?

A.

Enter the company product key for the antivirus software, enabling the full version.

B.

Uninstall the current version antivirus software and install the company version.

C.

Verify Internet connectivity and run online virus scanning software.

D.

Update the trial antivirus software to the latest version.

Question # 14

After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?

A.

The application has to be registered to the user.

B.

The application must be upgraded to a 64-bit version.

C.

The application must be activated.

D.

The application needs to be reinstalled.

Question # 15

Which of the following data connections would provide a user the BEST Internet availability while traveling?

A.

Workstation with only RJ-45 connectors

B.

Smartphone with cellular service

C.

Laptop with Bluetooth wireless connectivity

D.

Tablet connected to a SOHO wireless network

Question # 16

A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user’s laptop. How could the user have prevented this breach?

A.

Disable file and print sharing on the laptop.

B.

Delete unused drives from network.

C.

Remove shared keys from the key ring.

D.

Set the read-only attribute on the files.

Question # 17

Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?

A.

Micro SD card

B.

Bluetooth

C.

USB connection

D.

Infrared

Question # 18

Which of the following are secure network protocols? (Select TWO).

A.

IMAP

B.

FTPS

C.

SMTP

D.

HTTPS

E.

DNS

Question # 19

A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?

A.

Swap the mouse and keyboard to the other PS/2 ports.

B.

Remap the mouse and keyboard in the BIOS.

C.

Update the BIOS to recognize the newer keyboard and mouse.

D.

Configure the keyboard localization settings.

Question # 20

Which of the following computer components are used to store data? (Select TWO).

A.

GPU

B.

HDD

C.

RAM

D.

NIC

E.

CPU

Question # 21

Which of the following has the lowest latency?

A.

SSD

B.

NAS

C.

Blu-Ray

D.

DVD

Question # 22

Which of the following are considered input devices for a computer? (Select TWO).

A.

Mouse

B.

Printer

C.

Speakers

D.

Microphone

E.

Monitor

Question # 23

A user installing a printer can connect it to which of the following ports? (Select FOUR).

A.

PS/2

B.

VGA

C.

DVI

D.

USB

E.

FireWire

F.

Serial

G.

RJ-11

Question # 24

Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

A.

Large USB flash drive connected to a PC

B.

Medium capacity SATA hard drive

C.

Network attached storage appliance

D.

Firewall with security management

Question # 25

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?

A.

8-bit

B.

16-bit

C.

32-bit

D.

64-bit

Question # 26

Which of the following is the BEST example of productivity software?

A.

Word processing software

B.

Entertainment software

C.

Image editing software

D.

Anti-malware software

Question # 27

Which of the following is a common characteristic of open source software?

A.

Update cycles are dictated by the manufacturer

B.

Modifications to core functionalities are made by the manufacturer

C.

Can only run on certain manufacturer processors

D.

Can be fully modified by the user

Question # 28

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

A.

Social engineering

B.

Phishing

C.

Virus attack

D.

License theft

Question # 29

Which of the following file formats contain other files within them? (Select TWO).

A.

tiff

B.

dmg

C.

png

D.

mp3

E.

iso

F.

flac

Question # 30

A user has purchased some new software from a vendor and wants to install it on all of the Windows computers in the house. Which of the following will help the user accomplish the task and ensure compliance with the software vendor?

A.

Copy and paste the program between computers.

B.

Purchase a multi-user license.

C.

Purchase a single-user license.

D.

Use remote desktop to share the program between computers.

Question # 31

A technician needs to troubleshoot a user’s computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?

A.

Password confidentiality

B.

Password complexity

C.

Password reuse

D.

Password expiration