Pre Black Friday Sale Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

FC0-U61 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

FC0-U61 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: CompTIA IT Fundamentals+ Certification Exam
  • Last Update: Dec 2, 2023
  • Questions and Answers: 199
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

FC0-U61 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question # 6

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Full Access
Question # 7

Which of the following is an example of multifactor authentication?

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Full Access
Question # 8

A technician has verified full system functionality. Which of the following actions should the technician take next?

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Full Access
Question # 9

Which of the following statements BEST describes binary?

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Full Access
Question # 10

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Full Access
Question # 11

Within a database, which of the following would be the best access method to use to display a subset of a table?

A.

UPDATE

B.

DROP

C.

SELECT

D.

INSERT

Full Access
Question # 12

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Full Access
Question # 13

A user needs an interface that supports both video and data. Which of the following will meet this requirement?

A.

Thunderbolt

B.

VGA

C.

DVI

D.

FireWire

Full Access
Question # 14

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Full Access
Question # 15

A company has installed an application that only requires a workstation to function. Which of the following

architecture types is this application using?

A.

One-tier

B.

Two-tier

C.

Three-tier

D.

n-tier

Full Access
Question # 16

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Full Access
Question # 17

Which of the following database structures is the most granular?

A.

Column

B.

Field

C.

Record

D.

Table

Full Access
Question # 18

Which of the following contains exactly four copper wires?

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Full Access
Question # 19

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Full Access
Question # 20

Which of the following protocols is used to relay email from a user's mail server?

A.

IMAP

B.

FTP

C.

SMTP

D.

POP3

Full Access
Question # 21

Which of the following is the exact number of bytes in a gigabyte?

A.

1,024 bytes

B.

1,048,576 bytes

C.

1,073,741,824 bytes

D.

1,099,511,627,776 bytes

Full Access
Question # 22

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Full Access
Question # 23

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Full Access
Question # 24

An IP address is 32 bits long. If converted to bytes, it would be:

A.

4 bytes

B.

8 bytes

C.

16 bytes

D.

64 bytes

Full Access
Question # 25

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Full Access
Question # 26

Which of the following is most likely to disclose the data collection practices of an application?

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Full Access
Question # 27

Which of the following best describes when lo use an array?

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Full Access
Question # 28

A technician has successfully verified full system functionality after implementing the solution to a problem.

Which of the following is the NEXT troubleshooting step the technician should do?

A.

Determine if anything has changed.

B.

Document lessons learned.

C.

Establish a theory of probable cause.

D.

Duplicate the problem, if possible.

Full Access
Question # 29

Which of the following are benefits of a security awareness training program9 (Select two).

A.

Enhances overall security

B.

Provides information on how to avoid phishing

C.

Lowers the incidence of hardware failures

D.

Increases the availability of computers

E.

Advances end users' technical skills

F.

Creates IT security opportunities for end users

Full Access
Question # 30

An application is hosted on a local network. Which of the following descriptions is correct?

A.

LAN access Is required.

B.

The application exists locally.

C.

Files are saved in the cloud.

D.

Internet access Is required.

Full Access
Question # 31

Which of the following are the primary functions of an operating system? (Choose two.)

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Full Access
Question # 32

Which of the following is MOST likely used to represent international text data?

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Full Access
Question # 33

Which of the following is the slowest processing speed?

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Full Access
Question # 34

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Full Access
Question # 35

Consider the following statements:

FC0-U61 question answer

Given the input (userin) of“analyst”, to which of the following would the clearance variable be set?

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Full Access
Question # 36

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Full Access
Question # 37

Which of the following BEST describes a kilobyte?

A.

A kilobyte is a measurement of storage (e.g., 100KB).

B.

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.

A kilobyte is a measurement of power (e.g., 100KW).

D.

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Full Access
Question # 38

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the

workspace, the employee requests that the laptop be installed with the cover closed. Which of the following

would be required to satisfy this request? (Choose two.)

A.

Printer

B.

Mouse

C.

Webcam

D.

External hard drive

E.

Speakers

F.

Display

Full Access
Question # 39

Which of the following filesystems would a Linux computer MOST likely use?

A.

HFS

B.

NTFS

C.

FAT32

D.

ext4

Full Access
Question # 40

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 41

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

A.

Output

B.

Storage

C.

Input

D.

Processing

Full Access
Question # 42

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Full Access
Question # 43

Which of the following is an example of a compiled language?

A.

C++

B.

SQL

C.

Python

D.

XML

Full Access
Question # 44

Which of the following concerns does installing cross-platform software address?

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Full Access
Question # 45

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

A.

Duplicate the problem

B.

Gather information

C.

QUESTION NO: users

D.

Divide and conquer

Full Access
Question # 46

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Full Access
Question # 47

Which of the following does a NoSQL database use to organize data?

A.

Primary keys

B.

Schemas

C.

Keys/values

D.

Tables

Full Access
Question # 48

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Full Access
Question # 49

Which of the following is a value that uniquely identifies a database record?

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Full Access
Question # 50

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Full Access
Question # 51

Given the following pseudocode:

FC0-U61 question answer

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

A.

10

B.

14

C.

15

D.

17

Full Access
Question # 52

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

A.

Permission

B.

Ink cartridge

C.

USB cable

D.

Driver

Full Access
Question # 53

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Full Access
Question # 54

Which of the following types of encryption would BEST protect a laptop computer in the event of theft?

A.

Disk

B.

Email

C.

VPN

D.

HTTPS

Full Access
Question # 55

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

A.

SMTP

B.

POP3

C.

SNMP

D.

DHCP

E.

ICMP

F.

SFTP

Full Access
Question # 56

Which of the following is a compiled language?

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Full Access
Question # 57

A function is BEST used for enabling programs to:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Full Access
Question # 58

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Full Access
Question # 59

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of

application architectures did the employee use?

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

Full Access