Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CompTIA FC0-U61 CompTIA IT Fundamentals+ Certification Exam Exam Practice Test

Demo: 103 questions
Total 344 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question 1

Given the following pseudocode:

Which of the following is the output of the code?

Options:

A.

1

B.

9

C.

10

D.

11

Question 2

Which of the following shows how many results are possible when evaluating Boolean data types?

Options:

A.

Two

B.

Four

C.

Three

D.

Five

Question 3

Which of the following is the exact number of bytes in a gigabyte?

Options:

A.

1,024 bytes

B.

1,048,576 bytes

C.

1,073,741,824 bytes

D.

1,099,511,627,776 bytes

Question 4

Which of the following database types would be best in which to place financial data?

Options:

A.

Unstructured

B.

Semi-structured

C.

Structured

D.

Spreadsheet

Question 5

Which of the following can a company use to protect its logo?

Options:

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Question 6

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

Options:

A.

Encryption

B.

Compression

C.

Permissions

D.

Auditing

Question 7

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Question 8

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

Options:

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Question 9

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.

Integer

B.

String

C.

Float

D.

Boolean

Question 10

The sales department needs to keep a customer list that contains names, contact information, and sales

records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

Options:

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

Question 11

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Question 12

Privacy expectations on a company intranet should be limited to:

Options:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Question 13

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Question 14

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

Options:

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Question 15

Which of the following BEST describes the purpose of a vector in programming?

Options:

A.

Storing a collection of data

B.

Repeating a similar operation

C.

Capturing user input

D.

Performing mathematical calculations

Question 16

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Question 17

A database administrator has created a primary table and must ensure the date column in the table only accepts date values. Which of the following does the administrator need to set?

Options:

A.

Schema

B.

Primary key

C.

Constrain!

D.

Permissions

Question 18

Which of the following should privacy expectations on a company intranet be limited to?

Options:

A.

Precedents

B.

HR policy

C.

Word of mouth

D.

System usage agreements

Question 19

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Question 20

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

Options:

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Question 21

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of

application architectures did the employee use?

Options:

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

Question 22

Which of the following should a technician do to fix stability issues on a workstation?

Options:

A.

Install a malicious software analyzer.

B.

Install a firewall.

C.

Install browsing controls.

D.

Install updates.

Question 23

Which of the following programming languages would most likely include tables and the select command?

Options:

A.

Compiled

B.

Markup

C.

Query

D.

Scripting

Question 24

Which of the following filesystems would a Linux computer MOST likely use?

Options:

A.

HFS

B.

NTFS

C.

FAT32

D.

ext4

Question 25

Which of the following BEST describes the physical location of the data in the database?

Options:

A.

Table

B.

Column

C.

RAM

D.

HDD

Question 26

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

Options:

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Question 27

A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating

system functions would the term BEST apply?

Options:

A.

Disk management

B.

Process management

C.

Application management

D.

Service management

Question 28

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

Options:

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Question 29

Which of the following computer components allows for communication over a computer network?

Options:

A.

RAM

B.

NIC

C.

CPU

D.

NAS

Question 30

Which of the following allows network traffic to pass through it and filters specific packets?

Options:

A.

Switch

B.

Access point

C.

Modem

D.

Firewall

Question 31

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

Options:

A.

Antivirus

B.

Anti-malware

C.

Device Manager

D.

Host firewall

Question 32

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Question 33

Which of the following can transmit graphics but not sound?

Options:

A.

HDMI

B.

FireWire

C.

VGA

D.

DisplayPort

Question 34

NO: 56

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 35

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

Options:

A.

Ensure both devices are connected to the LAN.

B.

Enable task scheduling.

C.

Reset the proxy settings to their default values.

D.

Review the fault tolerance configurations.

Question 36

Given the following pseudocode:

arduino

Copy code

WHILE X < 12

print "Counting"

X += 1

If X=7, which of the following is the number of times the message will be displayed?

Options:

A.

Five

B.

Seven

C.

Eleven

D.

Twelve

Question 37

Which of the following is an example of a compiled language?

Options:

A.

C++

B.

SQL

C.

Python

D.

XML

Question 38

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

Options:

A.

USB

B.

NFC

C.

DSL

D.

DVI

Question 39

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Question 40

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Options:

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Question 41

A user is trying to set up a new wireless access point. Which of the following should the user do first?

Options:

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Question 42

In an effort to reduce costs, a company decides not to renew its contract for a secure shredding service. Which of the following risks should the management team most likely be concerned with if employees fail to properly dispose of documents according to security protocols?

Options:

A.

Dumpster diving

B.

Snooping

C.

Unauthorized information alteration

D.

Social engineering

Question 43

A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?

Options:

A.

Flowchart schema

B.

Physical schema

C.

Logical schema

D.

Table schema

Question 44

A company wants to build an application that is available to employees without a client component because some employees do not connect to the corporate network in order to work. Which of the following network types would best deliver this application to all employees?

Options:

A.

LAN-hosted

B.

Local server-hosted

C.

Locally installed

D.

Cloud-hosted

Question 45

To establish a theory of probable cause, one technician investigates network issues in the server room while

another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies

is being performed?

Options:

A.

QUESTION NO: the obvious.

B.

Divide and conquer.

C.

Duplicate the problem

D.

Research the knowledge base.

Question 46

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Options:

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Question 47

A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?

Options:

A.

SSO

B.

Software token

C.

PIN

D.

Multifactor authentication

Question 48

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.

Which of the following is the most likely cause?

Options:

A.

Firewall settings

B.

Improper switch configuration

C.

Incorrect IP address

D.

Misconfigured access point

Question 49

Which of the following BEST describes an application running on a typical operating system?

Options:

A.

Process

B.

Thread

C.

Function

D.

Task

Question 50

Which of the following creates multifactor authentication when used with something you have?

Options:

A.

Single sign-on

B.

Hardware token

C.

Geolocation

D.

Password

Question 51

A technician is having trouble connecting multiple users' laptops to the internet wirelessly. The users are on the west side of the building, which is hardwired. Which of the following should the technician do to resolve this issue quickly?

Options:

A.

Add a switch and hardwire the users' laptops.

B.

Add a network router.

C.

Replace the users' laptops with desktop computers.

D.

Add an access point for the users.

Question 52

The IT department has established a new password policy for employees. Specifically, the policy reads:

    Passwords must not contain common dictionary words

    Passwords must contain at least one special character.

    Passwords must be different from the las six passwords used.

    Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

Options:

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Question 53

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.

Loop

B.

Variable

C.

Constant

D.

Function

Question 54

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Question 55

Which of the following concerns does installing cross-platform software address?

Options:

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Question 56

Which of the following is a logical structure for storing files?

Options:

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Question 57

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

Options:

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Question 58

A software developer has created a program for the accounting department. The finance department requests the same program but requires some changes to the code to meet its needs. Which of the following should be performed?

Options:

A.

Compiling

B.

Looping

C.

Sequencing

D.

Branching

Question 59

Which of the following is the largest storage capacity?

Options:

A.

1PB

B.

100TB

C.

9,000GB

D.

9,900MB

Question 60

Which of the following would MOST likely use an ARM processor?

Options:

A.

Laptop

B.

Tablet

C.

Workstation

D.

Server

Question 61

Which of the following are benefits of a security awareness training program9 (Select two).

Options:

A.

Enhances overall security

B.

Provides information on how to avoid phishing

C.

Lowers the incidence of hardware failures

D.

Increases the availability of computers

E.

Advances end users' technical skills

F.

Creates IT security opportunities for end users

Question 62

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

Options:

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Question 63

Which of the following is an example of PI I? (Select two).

Options:

A.

Full name

B.

Date of birth

C.

Employment status

D.

School attended

E.

Social media username

F.

City of residence

Question 64

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Options:

A.

Concurrency

B.

Speed

C.

Scalability

D.

Variety

Question 65

Which of the following availability concerns is mitigated by having a business continuity site?

Options:

A.

Service outage

B.

Wiretapping

C.

Eavesdropping

D.

Replay attack

Question 66

Which of the following is required for a cloud network?

Options:

A.

Local applications

B.

Credentials

C.

Internet access

D.

Network infrastructure

Question 67

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Options:

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Question 68

A user has an HDD that is almost at full capacity. Which of the following operating system features should be used to free up some space without deleting any files?

Options:

A.

Compression

B.

Encryption

C.

Journaling

D.

Formatting

Question 69

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Question 70

Which of the following explains the concept of database scalability?

Options:

A.

The ability to move from one vendor database to another

B.

The ability to increase resources easily as demand grows

C.

The ability to move from a flat file database to a relational database

D.

The ability to document the database schema automatically

Question 71

An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the best choice to perform this task?

Options:

A.

Router

B.

Firewall

C.

Switch

D.

Access point

Question 72

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Question 73

Which of the following is the equivalent of 1 KB?

Options:

A.

0.01 googol

B.

1,000 bits

C.

8,000 bits

D.

8,000 bytes

Question 74

A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?

Options:

A.

Update the device software.

B.

Enable passwords.

C.

Enable host IDS.

D.

Remove browser cookies.

Question 75

A UPS provides protection against:

Options:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Question 76

Which of the following would most likely be used to verify a user is following an AUP?

Options:

A.

Application logs

B.

Security questions

C.

Access controls

D.

Biometric scans

Question 77

A technician is installing an MFD. After installation, all functions work except faxing. Which of the following interfaces is required to enable faxing functionality?

Options:

A.

RJ11

B.

RJ45

C.

USB

D.

Bluetooth

Question 78

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Question 79

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.

Which of the following types of Internet service connections would BEST meet the user’s needs?

Options:

A.

T1 line

B.

Satellite

C.

Fiber optic

D.

DSL

Question 80

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

Options:

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Question 81

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Options:

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Question 82

An administrator is preparing a workstation for deployment. Which of the following is the first step the administrator should take in this process?

Options:

A.

Enable the host firewall.

B.

Install OS updates.

C.

Change the default administrator password.

D.

Remove unnecessary software.

Question 83

A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)

Options:

A.

USB

B.

HDMI

C.

FireWire

D.

VGA

E.

Bluetooth

F.

RJ45

Question 84

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

Options:

A.

Renew the IP address.

B.

Configure the browser proxy settings.

C.

Clear the browser cache.

D.

Disable the pop-up blocker

Question 85

Which of the following is required to view videos stored on a DVD?

Options:

A.

Solid-state drive

B.

Flash drive

C.

Hard drive

D.

Optical drive

Question 86

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Options:

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Question 87

Which of the following statements BEST describes binary?

Options:

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Question 88

Which of the following is an advantage of using locally saved files?

Options:

A.

Readily shareable with others

B.

No reliance on local backups

C.

Immediately accessible by others on the cloud

D.

No dependence on network connection

Question 89

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Question 90

Which of the following is a compiled language?

Options:

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Question 91

For which of the following is a relational database management system MOST commonly used?

Options:

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Question 92

A user opens an application that is installed locally on a PC. The application connects directly to a database that is located on a server in a data closet in the same building. Which of the following application architecture models does this describe?

Options:

A.

One tier

B.

Two tier

C.

Three tier

D.

Four tier

Question 93

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

Options:

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Question 94

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

Options:

A.

Non-repudiation

B.

Authentication

C.

Integrity

D.

Accounting

Question 95

A database administrator needs to add a column to an existing table. Which of the following statements should the administrator use?

Options:

A.

CREATE

B.

UPDATE

C.

ALTER

D.

DROP

Question 96

A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years. Which of the following would the administrator most likely choose for the project?

Options:

A.

USB flash drive

B.

Solid-state drive

C.

Tape drive

D.

Hard disk

Question 97

An IP address is 32 bits long. If converted to bytes, it would be:

Options:

A.

4 bytes

B.

8 bytes

C.

16 bytes

D.

64 bytes

Question 98

Which of the following security concerns is a threat to confidentiality?

Options:

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Question 99

A technician is troubleshooting an important application that is crashing every hour. The technician suspects that the installation is corrupt and needs to be reinstalled. Which of the following steps should be performed next?

Options:

A.

Verify full system functionality.

B.

Research the knowledge base.

C.

Identify the problem.

D.

Test the theory.

Question 100

Which of the following would be the most cost-effective method to increase availability?

Options:

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Question 101

The finance department needs software that includes depreciation functionality for asset management. Which of the following types of software would best accomplish this goal?

Options:

A.

Database

B.

Accounting

C.

Project management

D.

Spreadsheet

Question 102

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Question 103

Which of the following should be done first when working on a potential issue?

Options:

A.

Implement a solution.

B.

Escalate the issue.

C.

Research the issue.

D.

Gather information.

Demo: 103 questions
Total 344 questions