Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CompTIA FC0-U61 CompTIA IT Fundamentals+ Certification Exam Exam Practice Test

Page: 1 / 23
Total 231 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Question 2

Which of the following is an advantage of a fiat file?

Options:

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Question 3

Which of the following is a value that uniquely identifies a database record?

Options:

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Question 4

Which of the following is an example of multifactor authentication?

Options:

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Question 5

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

Options:

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Question 6

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

Options:

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Question 7

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

Options:

A.

Password reuse

B.

Snooping

C.

Social engineering

D.

Phishing

Question 8

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

Options:

A.

Server

B.

Tape library

C.

External HDD

D.

Workstation

Question 9

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.

Web page

B.

List

C.

Flat file

D.

Database

Question 10

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

Options:

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Question 11

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Options:

A.

Concurrency

B.

Speed

C.

Scalability

D.

Variety

Question 12

An IT manager wants to prevent end users from booting alternative operating systems on workstations. Which of the following security-related best practices would be used to accomplish this?

Options:

A.

Installing a host-based firewall

B.

Setting a BIOS password

C.

Patching the operating system

D.

Removing unnecessary software

Question 13

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Question 14

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.

Method

B.

Object

C.

Property

D.

Attribute

Question 15

An IP address is 32 bits long. If converted to bytes, it would be:

Options:

A.

4 bytes

B.

8 bytes

C.

16 bytes

D.

64 bytes

Question 16

Which of the following storage devices have a spinning disk? (Choose two.)

Options:

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Question 17

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Question 18

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently

released new device. After configuring the new device utilizing the old SSID and key, some light switches are

no longer communicating. Which of the following is the MOST likely cause?

Options:

A.

The light switches do not support WPA2.

B.

The router is operating on a different channel.

C.

The key does not meet password complexity requirements.

D.

The SSID is not being broadcast.

Question 19

Which of the following programming concepts uses properties and attributes?

Options:

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Question 20

Which of the following is the most secure fllesystem?

Options:

A.

FAT32

B.

NFS

C.

NTFS

D.

exFAT

Question 21

Given the following pseudocode:

Which of the following is the output of the code?

Options:

A.

1

B.

9

C.

10

D.

11

Question 22

A user logs into a laptop using a username and complex password. This is an example of:

Options:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Question 23

A developer needs to add a table to a database. Which of the following database activities should the user

perform?

Options:

A.

UPDATE

B.

ALTER

C.

CREATE

D.

REPORT

Question 24

Which of the following would be the best reason to implement a host firewall?

Options:

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Question 25

Which of the following is a reason why complex passwords are required?

Options:

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Question 26

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

Options:

A.

USB

B.

NFC

C.

DSL

D.

DVI

Question 27

Which of the following are the basic computing operations?

Options:

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Question 28

Which of the following creates multifactor authentication when used with something you have?

Options:

A.

Single sign-on

B.

Hardware token

C.

Geolocation

D.

Password

Question 29

Which of the following concerns does installing cross-platform software address?

Options:

A.

Subscription

B.

Licensing

C.

Product key

D.

Compatibility

Question 30

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Options:

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Question 31

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

Options:

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Question 32

Which of the following interfaces is best for viewing database performance information?

Options:

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Question 33

Which of the following requires the MOST frequent updating to remain effective?

Options:

A.

Antivirus

B.

Host firewall

C.

Web browser

D.

Device drivers

Question 34

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Question 35

A game developer is purchasing a computing device to develop a game and recognizes the game engine

software will require a device with high-end specifications that can be upgraded. Which of the following

devices would be BEST for the developer to buy?

Options:

A.

Laptop

B.

Server

C.

Game console

D.

Workstation

Question 36

Which of the following database concepts would MOST likely use a CSV file?

Options:

A.

Data querying

B.

Data reports

C.

Data importing

D.

Data persistence

Question 37

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Question 38

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.

Integer

B.

String

C.

Float

D.

Boolean

Question 39

Which of the following storage types is MOST vulnerable to magnetic damage?

Options:

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Question 40

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Question 41

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Question 42

When following the troubleshooting methodology, which of the following should be performed last?

Options:

A.

Document findings.

B.

Establish a plan.

C.

Determine the cause.

D.

Verify functionality.

Question 43

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

Options:

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Question 44

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

Options:

A.

127.0.0.1

B.

172.16.2.189

C.

192.168.257.1

D.

255.255.255.0

Question 45

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Question 46

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Question 47

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Options:

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Question 48

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

Options:

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Question 49

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

Options:

A.

Permission

B.

Ink cartridge

C.

USB cable

D.

Driver

Question 50

The computer language that is closest to machine code is:

Options:

A.

query language

B.

scripting language

C.

markup language

D.

assembly language

Question 51

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Options:

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Question 52

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Question 53

A UPS provides protection against:

Options:

A.

denial of service

B.

replay attack.

C.

power outages.

D.

wiretapping.

Question 54

Which of the following is both an input and output device?

Options:

A.

Microphone

B.

Speaker

C.

Touch-screen monitor

D.

Keyboard

Question 55

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

Options:

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Question 56

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.

Array

B.

Vector

C.

List

D.

String

Question 57

Privacy expectations on a company intranet should be limited to:

Options:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Question 58

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

Options:

A.

Turn on private browsing

B.

Delete browsing history on program close.

C.

Notify when downloads are complete.

D.

Configure prompting before downloading content.

Question 59

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

Options:

A.

Email previewing

B.

Patching

C.

Clear browsing cache

D.

Kill process

Question 60

Which of the following would be the most cost-effective method to increase availability?

Options:

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Question 61

Which of the following computer components allows for communication over a computer network?

Options:

A.

RAM

B.

NIC

C.

CPU

D.

NAS

Question 62

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Question 63

Which of the following is most likely to disclose the data collection practices of an application?

Options:

A.

README.txt file

B.

User's guide

C.

EULA

D.

Vendor website

Question 64

A program needs to choose apples, oranges, or bananas based on an input. Which of the following

programming constructs is BEST to use?

Options:

A.

Variable

B.

If

C.

Datatype

D.

Comment

Question 65

Which of the following is the closest to machine language?

Options:

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Question 66

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

Options:

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Question 67

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Question 68

Which of the following contains exactly four copper wires?

Options:

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Question 69

Within a database, which of the following would be the best access method to use to display a subset of a table?

Options:

A.

UPDATE

B.

DROP

C.

SELECT

D.

INSERT

Page: 1 / 23
Total 231 questions