New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free FC0-U61 CompTIA IT Fundamentals+ Certification Exam Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA FC0-U61 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA IT Fundamentals+ Certification Exam exam materials available for free to everyone. You can take the Free FC0-U61 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

A.

Password manager

B.

Password reuse

C.

Password history

D.

Password reset

Question # 7

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Question # 8

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Question # 9

Given the following pseudocode:

FC0-U61 question answer

Which of the following is the output of the code?

A.

1

B.

9

C.

10

D.

11

Question # 10

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Question # 11

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

A.

Loop

B.

Variable

C.

Constant

D.

Function

Question # 12

Which of the following allows wireless devices to communicate to a wired network?

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Question # 13

Which of the following storage devices have a spinning disk? (Choose two.)

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Question # 14

Multiple users need to access the same data simultaneously. Which of the following is the best place to store the data?

A.

Database

B.

Spreadsheet

C.

Text file

D.

Word processing document

Question # 15

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

A.

Encryption

B.

Compression

C.

Permissions

D.

Auditing

Question # 16

Which of the following is best used to store many integers in one container?

A.

Array

B.

Function

C.

Variable

D.

Constant

Question # 17

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A.

Proprietary software

B.

Commercial software

C.

Open-source software

D.

Cross-platform software

Question # 18

Which of the following would most likely be used to verify a user is following an AUP?

A.

Application logs

B.

Security questions

C.

Access controls

D.

Biometric scans

Question # 19

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Question # 20

A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?

A.

NTFS

B.

FAT32

C.

HFS

D.

ext4

Question # 21

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Question # 22

A building has two legacy APs. A new AP was recently installed within 30ft (9m) of the legacy APs. Multiple users have been reporting intermittent internet connectivity since the new AP was installed. Which of the following explains what is happening?

A.

WEP is enabled.

B.

There are inference and attenuation factors.

C.

There are speed limitations.

D.

The passwords are not synced.

Question # 23

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

A.

Web page

B.

List

C.

Flat file

D.

Database

Question # 24

A developer needs to add a table to a database. Which of the following database activities should the user

perform?

A.

UPDATE

B.

ALTER

C.

CREATE

D.

REPORT

Question # 25

In which of the following situations should there be come expectation of privacy?

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Question # 26

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Question # 27

Which of the following is considered a traditional input and output device?

A.

Printer

B.

Hard drive

C.

Keyboard

D.

Display monitor

Question # 28

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Question # 29

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Question # 30

A company is looking at locations for a new datacenter. The Chief Executive Officer (CEO) has stated that the new datacenter should be at least 500mi (805km) from the existing datacenter so one natural disaster will be unlikely to impact both datacenters. Which of the following is this best an example of?

A.

Confidentiality concerns

B.

Integrity concerns

C.

Replication concerns

D.

Availability concerns

Question # 31

SQL databases use primary and foreign keys to enable which of the following?

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Question # 32

Which of the following is a logical structure for storing files?

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Question # 33

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Question # 34

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Question # 35

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Question # 36

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Question # 37

Which of the following requires the MOST frequent updating to remain effective?

A.

Antivirus

B.

Host firewall

C.

Web browser

D.

Device drivers

Question # 38

Which of the following is a reason why complex passwords are required?

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Question # 39

After a user connects a laptop to a newly purchased printer, the user is unable to print. Which of the following is most likely causing the issue?

A.

The OS updates have not been applied on the laptop.

B.

The security software is out of date.

C.

The printer drivers are not installed.

D.

The firewall has not been configured.

Question # 40

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Question # 41

A company wants to provide encrypted remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would best fulfill these requirements?

A.

Disk-level encryption

B.

Secure web gateway

C.

VPN

D.

AES

Question # 42

Which of the following would a company consider an asset?

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Question # 43

A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?

A.

Flowchart schema

B.

Physical schema

C.

Logical schema

D.

Table schema

Question # 44

An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?

A.

Flat file

B.

Document

C.

Database

D.

Spreadsheet

Question # 45

A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?

A.

LAN-hosted

B.

Local server-hosted

C.

Locally installed

D.

Cloud-hosted

Question # 46

Which of the following can transmit graphics but not sound?

A.

HDMI

B.

FireWire

C.

VGA

D.

DisplayPort

Question # 47

Which of the following storage types is MOST vulnerable to magnetic damage?

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Question # 48

When following the troubleshooting methodology, which of the following should be performed last?

A.

Document findings.

B.

Establish a plan.

C.

Determine the cause.

D.

Verify functionality.

Question # 49

Which of the following would be the most cost-effective method to increase availability?

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Question # 50

A user connects a wireless router to a home network and notices another wireless access point uses the same name. Which of the following should the user change?

A.

Router default password

B.

Wireless channel

C.

Frequency

D.

Service set identifier

Question # 51

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Question # 52

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

A.

Permission

B.

Ink cartridge

C.

USB cable

D.

Driver

Question # 53

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?

A.

Variable

B.

Attribute

C.

Method

D.

Looping

Question # 54

A program needs to choose apples, oranges, or bananas based on an input. Which of the following

programming constructs is BEST to use?

A.

Variable

B.

If

C.

Datatype

D.

Comment

Question # 55

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Question # 56

A technician reading workstation security logs notices that an unidentified device is plugged into a USB port several hours a day but is never plugged in when the technician goes to check the machine. File audits reveal nothing unexpected. Which of the following devices is most likely causing this message?

A.

Mobile phone

B.

Mouse

C.

Scanner

D.

External hard drive

Question # 57

Which of the following methods of cooling is most commonly used for desktops?

A.

Active

B.

External

C.

Cryogenics

D.

Water

Question # 58

An IP address is 32 bits long. If converted to bytes, it would be:

A.

4 bytes

B.

8 bytes

C.

16 bytes

D.

64 bytes

Question # 59

NO: 56

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question # 60

After creating a database, which of the following would a developer most likely use to put data in a table?

A.

Concatenation

B.

Query

C.

Loop

D.

Macro

Question # 61

A company requires several reports that analyze related information from sales, inventory, marketing, and

compensation data. Which of the following is the BEST place to store this data?

A.

Flat file

B.

Word processor

C.

Database

D.

Network share

Question # 62

Which of the following BEST describes the physical location of the data in the database?

A.

Table

B.

Column

C.

RAM

D.

HDD

Question # 63

A business would like to create an employee portal that employees will have access to when they are at work.

The employees will not be able to connect to the portal from home without a VPN connection. Which of the

following types of application does this describe?

A.

Local application

B.

Intranet application

C.

Extranet application

D.

Internet application

Question # 64

A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?

A.

Motherboard

B.

BIOS

C.

SSD

D.

CPU

Question # 65

Which of the following is both an input and output device?

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Question # 66

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

A.

Method

B.

Object

C.

Property

D.

Attribute

Question # 67

Which of the following is secure?

A.

.edu

B.

FTP

C.

HTTPS

D.

.org

E.

FAT32

Question # 68

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Question # 69

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

A.

Open

B.

WEP

C.

WPA

D.

WPA2

Question # 70

Which of the following OS features would be best to use to remove unnecessary programs?

A.

Application management

B.

Disk management

C.

Process management

D.

Memory management

Question # 71

A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?

A.

Private browsing

B.

Pop-up blockers

C.

Bookmarks

D.

Accessibility

Question # 72

Which of the following is the exact number of bytes in a gigabyte?

A.

1,024 bytes

B.

1,048,576 bytes

C.

1,073,741,824 bytes

D.

1,099,511,627,776 bytes

Question # 73

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Question # 74

Which of the following language types most likely controls the way a web page looks?

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Question # 75

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Question # 76

Which of the following is a value that uniquely identifies a database record?

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Question # 77

Which of the following is required for a cloud network?

A.

Local applications

B.

Credentials

C.

Internet access

D.

Network infrastructure

Question # 78

Which of the following allows network traffic to pass through it and filters specific packets?

A.

Switch

B.

Access point

C.

Modem

D.

Firewall

Question # 79

Which of the following is an example of an interpreted language?

A.

C++

B.

Java

C.

Python

D.

Go

Question # 80

Which of the following best practices can be used to mitigate password reuse?

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Question # 81

Which of the following is MOST likely used to represent international text data?

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Question # 82

Which of the following computer components allows for communication over a computer network?

A.

RAM

B.

NIC

C.

CPU

D.

NAS

Question # 83

Which of the following software types is best suited for storing large amounts of data in a way that allows for concurrent, indexed access?

A.

Spreadsheet software

B.

Visual diagramming software

C.

Database software

D.

Presentation software

Question # 84

Which of the following security concerns is a threat to confidentiality?

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Question # 85

A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).

A.

Private browsing is enabled.

B.

Extensions are out-of-date.

C.

Proxy settings are incorrect.

D.

An incompatible browser is being used.

E.

A pop-up blocker is enabled.

F.

An invalid certificate has been issued.

Question # 86

Which of the following should a technician do to fix stability issues on a workstation?

A.

Install a malicious software analyzer.

B.

Install a firewall.

C.

Install browsing controls.

D.

Install updates.

Question # 87

Which of the following backup types is most likely to allow restoration of a fully bootable computer on new hardware?

A.

File-level backups

B.

Critical data backups

C.

System backups

D.

Database backups

Question # 88

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Question # 89

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Question # 90

A database administrator has created a primary table and must ensure the date column in the table only accepts date values. Which of the following does the administrator need to set?

A.

Schema

B.

Primary key

C.

Constrain!

D.

Permissions

Question # 91

Which of the following defines a reusable value that can be reassigned?

A.

Method

B.

Variable

C.

Constant

D.

Function

Question # 92

Which of the following describes a unique entry to a data set?

A.

Schema

B.

Record

C.

Column

D.

Index

Question # 93

Which of the following is the largest storage capacity?

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Question # 94

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

A.

T1 line

B.

Satellite

C.

Fiber optic

D.

DSL

Question # 95

Which of the following types of memory can retain its content after a system reboot?

A.

DDR

B.

DIMM

C.

RAM

D.

ROM

Question # 96

A network administrator wants to keep track of all system messages and alerts. Which of the following would best allow for the administrator to follow trends?

A.

Logs

B.

Scheduled tasks

C.

Systems management console

D.

Systems notification tool

Question # 97

A programmer uses DML to modify:

A.

files

B.

permissions

C.

data

D.

backups

Question # 98

Employee information is stored in a database. Which of the following BEST describes where all of an

employee’s information is stored?

A.

Record

B.

Report

C.

Column

D.

Procedure

Question # 99

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Question # 100

An application is hosted on a local network. Which of the following descriptions is correct?

A.

LAN access Is required.

B.

The application exists locally.

C.

Files are saved in the cloud.

D.

Internet access Is required.

Question # 101

A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?

A.

Web-based

B.

IP-based

C.

Driver

D.

Plug-and-play

Question # 102

Which of the following commands would most likely be used to add data to an existing database table?

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Question # 103

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

A.

USB

B.

NFC

C.

DSL

D.

DVI

FC0-U61 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

FC0-U61 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CompTIA IT Fundamentals+ Certification Exam
  • Last Update: Dec 14, 2025
  • Questions and Answers: 344
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

FC0-U61 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included