Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > IT Fundamentals > FC0-U61

FC0-U61 CompTIA IT Fundamentals+ Certification Exam Question and Answers

Question # 4

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

A.

Phishing attack

B.

Social engineering

C.

On-path attack

D.

Eavesdropping

Full Access
Question # 5

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of

application architectures did the employee use?

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

Full Access
Question # 6

A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?

A.

SSO

B.

Software token

C.

PIN

D.

Multifactor authentication

Full Access
Question # 7

Which of the following commands can be used to remove a database permanently?

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Full Access
Question # 8

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

A.

a storage area network.

B.

an embedded OS.

C.

network attached storage.

D.

a Type 1 hypervisor.

Full Access
Question # 9

A company requires several reports that analyze related information from sales, inventory, marketing, and

compensation data. Which of the following is the BEST place to store this data?

A.

Flat file

B.

Word processor

C.

Database

D.

Network share

Full Access
Question # 10

Which of the following defines a reusable value that can be reassigned?

A.

Method

B.

Variable

C.

Constant

D.

Function

Full Access
Question # 11

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Full Access
Question # 12

Which of the following is the largest storage capacity?

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Full Access
Question # 13

An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?

A.

Presentation software

B.

Conferencing software

C.

Project management software

D.

Visual diagramming software

Full Access
Question # 14

A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator most likely choose for the project?

A.

USB flash drive

B.

Solid-state drive

C.

Tape drive

D.

Hard disk

Full Access
Question # 15

Which of the following describes the concept of a database record?

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Full Access
Question # 16

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Full Access
Question # 17

Which of the following is most likely to disclose the data collection practices of an application?

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Full Access
Question # 18

Which of the following would most likely be used to verify a user is following an AUP?

A.

Application logs

B.

Security questions

C.

Access controls

D.

Biometric scans

Full Access
Question # 19

A UPS provides protection against:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Full Access
Question # 20

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this

document for public use. Which of the following should the developer use to BEST protect the document?

A.

Patent

B.

Trademark

C.

Watermark

D.

Copyright

Full Access
Question # 21

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

A.

Web page

B.

List

C.

Flat file

D.

Database

Full Access
Question # 22

Which of the following best protects data in transit?

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Full Access
Question # 23

Which of the following types of memory can retain its content after a system reboot?

A.

DDR

B.

DIMM

C.

RAM

D.

ROM

Full Access
Question # 24

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Full Access
Question # 25

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Full Access
Question # 26

Which of the following explains the concept of database scalability?

A.

The ability to move from one vendor database to another

B.

The ability to increase resources easily as demand grows

C.

The ability to move from a flat file database to a relational database

D.

The ability to document the database schema automatically

Full Access
Question # 27

Which of the following are most likely to have a GUI? (Select two).

A.

PowerShell

B.

Windows

C.

Command Prompt

D.

macOS

E.

Z shell

F.

Bash

Full Access
Question # 28

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Full Access
Question # 29

Which of the following would indicate the FASTEST processor speed?

A.

3.6GHz

B.

3.6MHz

C.

3.6Mbps

D.

3.6Gbps

Full Access
Question # 30

The computer language that is closest to machine code is:

A.

query language

B.

scripting language

C.

markup language

D.

assembly language

Full Access
Question # 31

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

A.

Integer

B.

Float

C.

Double

D.

String

Full Access
Question # 32

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

A.

Cellular

B.

Satellite

C.

Cable

D.

Fiber

Full Access
Question # 33

After purchasing a flash drive, the buyer notices that the packaging had already been opened. Which of the following is this is an example of?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Non-repudiation

Full Access
Question # 34

Given the following pseudocode:

Which of the following is the output of the code?

A.

1

B.

9

C.

10

D.

11

Full Access
Question # 35

Which of the following contains exactly four copper wires?

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Full Access
Question # 36

Which of the following interfaces is best for viewing database performance information?

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Full Access
Question # 37

Which of the following backup types is most likely to allow restoration of a fully bootable computer on new hardware?

A.

File-level backups

B.

Critical data backups

C.

System backups

D.

Database backups

Full Access
Question # 38

Which of the following security concerns is a threat to confidentiality?

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Full Access
Question # 39

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

A.

Password manager

B.

Password reuse

C.

Password history

D.

Password reset

Full Access
Question # 40

When a user types a web page name in an internet browser address field, this information is translated to an IP address behind the scenes. Which of the following is being used?

A.

SMTP

B.

DHCP

C.

WPA

D.

DNS

E.

WEP

Full Access
Question # 41

Which of the following would MOST likely use an ARM processor?

A.

Laptop

B.

Tablet

C.

Workstation

D.

Server

Full Access
Question # 42

For which of the following is a relational database management system MOST commonly used?

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Full Access
Question # 43

Given the following pseudocode:

arduino

Copy code

WHILE X < 12

print "Counting"

X += 1

If X=7, which of the following is the number of times the message will be displayed?

A.

Five

B.

Seven

C.

Eleven

D.

Twelve

Full Access
Question # 44

Which of the following is a logical structure for storing files?

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Full Access
Question # 45

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Full Access
Question # 46

Which of the following would be considered the BEST method of securely distributing medical records?

A.

Encrypted flash drive

B.

Social networking sites

C.

Fax

D.

FTP file sharing

Full Access
Question # 47

Which of the following data types should a developer use when creating a variable to hold a postal code?

A.

Integer

B.

String

C.

Float

D.

Boolean

Full Access
Question # 48

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.

Which of the following is the most likely cause?

A.

Firewall settings

B.

Improper switch configuration

C.

Incorrect IP address

D.

Misconfigured access point

Full Access
Question # 49

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Full Access
Question # 50

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Full Access
Question # 51

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Full Access
Question # 52

A business would like to create an employee portal that employees will have access to when they are at work.

The employees will not be able to connect to the portal from home without a VPN connection. Which of the

following types of application does this describe?

A.

Local application

B.

Intranet application

C.

Extranet application

D.

Internet application

Full Access
Question # 53

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Full Access
Question # 54

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Full Access
Question # 55

After creating a database, which of the following would a developer most likely use to put data in a table?

A.

Concatenation

B.

Query

C.

Loop

D.

Macro

Full Access
Question # 56

A script is designed to save the results of user input from a survey to a database table. Which of the following database access methods is used to add the survey data to the table?

A.

Direct access

B.

Query builder

C.

User interface

D.

Programmatic access

Full Access
Question # 57

A program needs to choose apples, oranges, or bananas based on an input. Which of the following

programming constructs is BEST to use?

A.

Variable

B.

If

C.

Datatype

D.

Comment

Full Access
Question # 58

A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

A.

USB

B.

HDMI

C.

FireWire

D.

VGA

E.

Bluetooth

F.

RJ45

Full Access
Question # 59

Which of the following should have the HIGHEST expectation of privacy?

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Full Access
Question # 60

Which of following PC components operates only as an input device?

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Full Access
Question # 61

Which of the following concerns does installing cross-platform software address?

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Full Access
Question # 62

A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?

A.

NTFS

B.

FAT32

C.

HFS

D.

ext4

Full Access
Question # 63

Which of the following is an example of structured data?

A.

Video recordings

B.

Social media posts

C.

Photographs

D.

Phone numbers

Full Access
Question # 64

Which of the following is considered a traditional input and output device?

A.

Printer

B.

Hard drive

C.

Keyboard

D.

Display monitor

Full Access
Question # 65

Which of the following shows how many results are possible when evaluating Boolean data types?

A.

Two

B.

Four

C.

Three

D.

Five

Full Access
Question # 66

Which of the following is required for a cloud network?

A.

Local applications

B.

Credentials

C.

Internet access

D.

Network infrastructure

Full Access
Question # 67

A user needs an interface that supports both video and data. Which of the following will meet this requirement?

A.

Thunderbolt

B.

VGA

C.

DVI

D.

FireWire

Full Access
Question # 68

Which of the following best explains the reason for password expiration?

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Full Access
Question # 69

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A.

Proprietary software

B.

Commercial software

C.

Open-source software

D.

Cross-platform software

Full Access
Question # 70

Which of the following programming concepts uses properties and attributes?

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Full Access
Question # 71

Which of the following operating systems is most likely to be used to provide the GUI for a workplace employee?

A.

Hypervisor

B.

Firmware

C.

Server

D.

Workstation

Full Access
Question # 72

Which of the following operating systems is best used in creating and managing virtual machines?

A.

Mobile

B.

Hypervisor

C.

Embedded

D.

Firewall

Full Access
Question # 73

A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?

A.

RJ11

B.

RJ45

C.

USB

D.

Bluetooth

Full Access
Question # 74

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Full Access
Question # 75

Which of the following is an advantage of a fiat file?

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Full Access
Question # 76

Which of the following storage types is MOST vulnerable to magnetic damage?

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Full Access
Question # 77

Which of the following should privacy expectations on a company intranet be limited to?

A.

Precedents

B.

HR policy

C.

Word of mouth

D.

System usage agreements

Full Access
Question # 78

Which of the following methods of cooling is most commonly used for desktops?

A.

Active

B.

External

C.

Cryogenics

D.

Water

Full Access
Question # 79

A function is BEST used for enabling programs to:

A.

hold a list of numbers.

B.

be divided into reusable components.

C.

define needed constant values.

D.

define variables to hold different values.

Full Access
Question # 80

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

A.

Array

B.

Vector

C.

List

D.

String

Full Access
Question # 81

An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the best choice to perform this task?

A.

Router

B.

Firewall

C.

Switch

D.

Access point

Full Access
Question # 82

Which of the following is most likely managed directly by the operating system?

A.

Email

B.

Database connections

C.

Memory allocation

D.

Instant messaging

Full Access
Question # 83

Which of the following is an advantage of installing an application to the cloud?

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Full Access
Question # 84

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

A.

127.0.0.1

B.

172.16.2.189

C.

192.168.257.1

D.

255.255.255.0

Full Access
Question # 85

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Full Access
Question # 86

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

A.

Word processing

B.

Spreadsheet

C.

Text editor

D.

Visual diagramming

Full Access
Question # 87

Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?

A.

Host-based firewall

B.

Antivirus

C.

Patching

D.

Network-based firewall

Full Access
Question # 88

Which of the following would be the best reason to implement a host firewall?

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Full Access
Question # 89

Which of the following filesystems is most commonly found on a computer running macOS?

A.

ext4

B.

FAT32

C.

HFS

D.

NTFS

Full Access
Question # 90

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Full Access
Question # 91

In an effort to reduce costs, a company decides not to renew its contract for a secure shredding service. Which of the following risks should the management team most likely be concerned with if employees fail to properly dispose of documents according to security protocols?

A.

Dumpster diving

B.

Snooping

C.

Unauthorized information alteration

D.

Social engineering

Full Access
Question # 92

During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?

A.

Instant messaging

B.

Mobile applications

C.

Social media

D.

Video-sharing website

Full Access
Question # 93

Which of the following BEST describes the purpose of a vector in programming?

A.

Storing a collection of data

B.

Repeating a similar operation

C.

Capturing user input

D.

Performing mathematical calculations

Full Access
Question # 94

Which of the following is the exact number of bytes in a gigabyte?

A.

1,024 bytes

B.

1,048,576 bytes

C.

1,073,741,824 bytes

D.

1,099,511,627,776 bytes

Full Access
Question # 95

Which of the following categories describes commands used to extract information from a database?

A.

DDL

B.

DDR

C.

DLL

D.

DML

Full Access
Question # 96

SQL databases use primary and foreign keys to enable which of the following?

A.

Rows

B.

Fields

C.

Schemas

D.

Relationships

Full Access
Question # 97

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Full Access
Question # 98

Which of the following is an example of a query language?

A.

C++

B.

Python

C.

XML

D.

SQL

Full Access
Question # 99

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Full Access
Question # 100

Which of the following best practices can be used to mitigate password reuse?

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Full Access
Question # 101

Which of the following storage types presents the most likely security risk?

A.

Flash

B.

NAS

C.

SSD

D.

Cloud

Full Access
Question # 102

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Full Access
Question # 103

Which of the following best describes the process of comparing MD5 values after downloading software?

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Full Access