Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA FC0-U61 CompTIA IT Fundamentals+ Certification Exam Exam Practice Test

Page: 1 / 34
Total 344 questions

CompTIA IT Fundamentals+ Certification Exam Questions and Answers

Question 1

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

Options:

A.

Cellular

B.

Satellite

C.

Cable

D.

Fiber

Question 2

Which of the following statements BEST describes binary?

Options:

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Question 3

Employees of a large technology company are provided access to the internet as a work resource. Which of the following most likely represents the level of privacy employees should expect when utilizing this resource?

Options:

A.

Only the attempts to access unapproved URLs are logged.

B.

All internet usage is logged by a corporate server and may be monitored live.

C.

All internet browsing is private and anonymous.

D.

Only the attempts to access sites that Include prohibited keywords are logged.

Question 4

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

Options:

A.

Fiber

B.

DSL

C.

Cable

D.

Satellite

Question 5

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

Options:

A.

Boolean

B.

Integer

C.

Float

D.

Char

Question 6

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

Options:

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Question 7

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

Options:

A.

Open

B.

WEP

C.

WPA

D.

WPA2

Question 8

Which of the following is a compiled language?

Options:

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Question 9

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.

Method

B.

Object

C.

Property

D.

Attribute

Question 10

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

Options:

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Question 11

Which of the following terms best describes the outcome of a text message that is encrypted from its original form?

Options:

A.

Cipher

B.

Vector

C.

Plain

D.

Algorithm

Question 12

A user clicks a link to a web page to view a document, but nothing happens. Which of the following is most likely the issue?

Options:

A.

Scripting is disabled.

B.

The security settings are too high.

C.

Pop-up blockers are enabled.

D.

The web certificate is invalid.

Question 13

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

Options:

A.

127.0.0.1

B.

172.16.2.189

C.

192.168.257.1

D.

255.255.255.0

Question 14

Which of the following is considered a traditional input and output device?

Options:

A.

Printer

B.

Hard drive

C.

Keyboard

D.

Display monitor

Question 15

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Question 16

Which of the following utilities has the ability to remove drivers and scan for hardware changes?

Options:

A.

Performance Monitor

B.

Disk Management

C.

Event Viewer

D.

Device Manager

Question 17

Which of the following connection types provides the fastest internet speed?

Options:

A.

Cellular

B.

Asymmetric DSL

C.

Symmetric DSL

D.

Fiber to the curb

Question 18

Which of the following internet service types is most susceptible to weather disruptions?

Options:

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Question 19

Which of the following filesystems is most commonly found on a computer running macOS?

Options:

A.

ext4

B.

FAT32

C.

HFS

D.

NTFS

Question 20

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Question 21

Which of the following internal computing components is typically tasked with handling complex mathematical calculations required for realistic in-game physics?

Options:

A.

RAM

B.

NIC

C.

GPU

D.

CPU

Question 22

An administrator wants to block application traffic on specific ports from entering into the local area network. Which of the following devices would be the best choice to perform this task?

Options:

A.

Router

B.

Firewall

C.

Switch

D.

Access point

Question 23

Which of the following is required for a cloud network?

Options:

A.

Local applications

B.

Credentials

C.

Internet access

D.

Network infrastructure

Question 24

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

Options:

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Question 25

Which of the following database concepts would MOST likely use a CSV file?

Options:

A.

Data querying

B.

Data reports

C.

Data importing

D.

Data persistence

Question 26

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

Options:

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Question 27

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

Options:

A.

Array

B.

Vector

C.

List

D.

String

Question 28

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

Options:

A.

Duplicate the problem

B.

Gather information

C.

QUESTION NO: users

D.

Divide and conquer

Question 29

Which of the following is an example of a compiled language?

Options:

A.

C++

B.

SQL

C.

Python

D.

XML

Question 30

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Question 31

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Question 32

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Options:

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Question 33

Which of the following is the main purpose for a MAC address to identify?

Options:

A.

A user

B.

A piece of hardware

C.

An IP address

D.

A network

Question 34

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

Options:

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Question 35

Which of the following commands can be used to remove a database permanently?

Options:

A.

DENY

B.

DROP

C.

ALTER

D.

DUMP

Question 36

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

Options:

A.

Data correlation

B.

Data manipulation

C.

Data gathering

D.

Data definition

Question 37

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

Options:

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Question 38

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Question 39

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Question 40

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

Options:

A.

Password manager

B.

Password reuse

C.

Password history

D.

Password reset

Question 41

Which of the following best describes the process of comparing MD5 values after downloading software?

Options:

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Question 42

Which of the following is the most secure fllesystem?

Options:

A.

FAT32

B.

NFS

C.

NTFS

D.

exFAT

Question 43

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

Options:

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Question 44

On which of the following distinct numbers of digits is the hexadecimal numbering system based?

Options:

A.

2

B.

8

C.

10

D.

16

Question 45

Which of the following is MOST likely used to represent international text data?

Options:

A.

ASCII

B.

Octal

C.

Hexadecimal

D.

Unicode

Question 46

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Question 47

An application developer needs to test multiple operating systems on one host. Which of the following would be the best choice for the test server?

Options:

A.

Type 1 hypervisor OS

B.

Server OS

C.

Embedded OS

D.

Workstation OS

Question 48

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

Options:

A.

Workstation

B.

Laptop

C.

Cellphone

D.

Thin client

Question 49

Which of following PC components operates only as an input device?

Options:

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Question 50

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

Options:

A.

Optical drive

B.

Hard disk drive

C.

Solid state drive

D.

Flash drive

Question 51

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

Options:

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Question 52

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Question 53

A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?

Options:

A.

Variable

B.

Vector

C.

Constant

D.

Array

Question 54

A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

Options:

A.

Replace the user’s display.

B.

Update the PC’s operating system.

C.

Replace the video cable.

D.

Install new video drivers.

Question 55

Which of the following file extensions is used for a consolidated group of files?

Options:

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Question 56

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

Options:

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Question 57

Privacy expectations on a company intranet should be limited to:

Options:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Question 58

For which of the following is a relational database management system MOST commonly used?

Options:

A.

Building flowcharts

B.

Storing information

C.

Generating reports

D.

Creating diagrams

Question 59

A global variable called “age” will be created in a program and incremented through the use of a function.

Which of the following data types should be defined with the age variable?

Options:

A.

Integer

B.

Float

C.

Double

D.

String

Question 60

An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?

Options:

A.

Flat file

B.

Document

C.

Database

D.

Spreadsheet

Question 61

A company is looking at locations for a new datacenter. The Chief Executive Officer (CEO) has stated that the new datacenter should be at least 500mi (805km) from the existing datacenter so one natural disaster will be unlikely to impact both datacenters. Which of the following is this best an example of?

Options:

A.

Confidentiality concerns

B.

Integrity concerns

C.

Replication concerns

D.

Availability concerns

Question 62

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Question 63

Which of the following would be the easiest component to upgrade on a laptop that is experiencing slow performance?

Options:

A.

Motherboard

B.

GPU

C.

RAM

D.

CPU

Question 64

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Options:

A.

Phishing attack

B.

Social engineering

C.

On-path attack

D.

Eavesdropping

Question 65

Which of the following storage types is MOST vulnerable to magnetic damage?

Options:

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Question 66

Which of the following allows network traffic to pass through it and filters specific packets?

Options:

A.

Switch

B.

Access point

C.

Modem

D.

Firewall

Question 67

A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails,

the data is stored on another drive, preventing data loss. Which of the following business continuity concepts

does this explain?

Options:

A.

File backup

B.

Data restoration

C.

Fault tolerance

D.

Restoring access

Question 68

Which of the following would indicate the FASTEST processor speed?

Options:

A.

3.6GHz

B.

3.6MHz

C.

3.6Mbps

D.

3.6Gbps

Question 69

Which of the following BEST describes an application running on a typical operating system?

Options:

A.

Process

B.

Thread

C.

Function

D.

Task

Question 70

Which of the following filesystems would a Linux computer MOST likely use?

Options:

A.

HFS

B.

NTFS

C.

FAT32

D.

ext4

Question 71

A programmer chooses a database for a new application that needs to store information, including dates, times, names, and amounts. Which of the following database features is this an example of?

Options:

A.

Concurrency

B.

Speed

C.

Scalability

D.

Variety

Question 72

Which of the following violates password best practices?

Options:

A.

Password reuse across sites

B.

Password history

C.

Password expiration

D.

Password complexity

Question 73

Which of the following are the primary functions of an operating system? (Choose two.)

Options:

A.

Provide structure for file and data management.

B.

Provide protection against malware and viruses.

C.

Provide peer-to-peer networking capability.

D.

Provide user data encryption.

E.

Provide virtual desktop capability.

F.

Provide system resources.

Question 74

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.

Loop

B.

Variable

C.

Constant

D.

Function

Question 75

A user works at a health insurance company. Which of the following is the best method for ensuring a customer's personal information is kept confidential when it needs to be shared with another authorized employee?

Options:

A.

Sending it as an encrypted email to the other employee

B.

Putting it in a shared drive on the company's network

C.

Printing it out and giving it to the employee

D.

Putting it on the company's cloud document site

Question 76

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

Options:

A.

Proprietary software

B.

Commercial software

C.

Open-source software

D.

Cross-platform software

Question 77

Which of the following is the least expensive way for users at a large company to load a 2GB spreadsheet quickly?

Options:

A.

Buy faster networking switches.

B.

Upgrade the operating system and applications.

C.

Move the file to a shared database.

D.

Add more RAM to each workstation.

Question 78

A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Question 79

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

Options:

A.

Flat file

B.

Memory

C.

Relational database

D.

Solid state drive

Question 80

Which of the following can a company use to protect its logo?

Options:

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Question 81

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

Options:

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Question 82

Which of the following is an example of structured data?

Options:

A.

Video recordings

B.

Social media posts

C.

Photographs

D.

Phone numbers

Question 83

Which of the following is the closest to machine language?

Options:

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Question 84

Which of the following types of memory can retain its content after a system reboot?

Options:

A.

DDR

B.

DIMM

C.

RAM

D.

ROM

Question 85

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Question 86

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Options:

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Question 87

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

Options:

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Question 88

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

Options:

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Question 89

A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

Options:

A.

Database

B.

Webserver

C.

File

D.

Operating system

Question 90

A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?

Options:

A.

Written procedure

B.

Written policy

C.

Written email

D.

Written memo

Question 91

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Question 92

Which of the following data types is used to implement a simple counter application?

Options:

A.

Boolean

B.

Integer

C.

String

D.

Floating point

Question 93

A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?

Options:

A.

Flowchart schema

B.

Physical schema

C.

Logical schema

D.

Table schema

Question 94

Which of the following would be the most cost-effective method to increase availability?

Options:

A.

Redundant equipment

B.

Disaster recovery site

C.

Continuity plan

D.

Scheduled maintenance

Question 95

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Question 96

Which of the following is required to view videos stored on a DVD?

Options:

A.

Solid-state drive

B.

Flash drive

C.

Hard drive

D.

Optical drive

Question 97

After a user connects a laptop to a newly purchased printer, the user is unable to print. Which of the following is most likely causing the issue?

Options:

A.

The OS updates have not been applied on the laptop.

B.

The security software is out of date.

C.

The printer drivers are not installed.

D.

The firewall has not been configured.

Question 98

Which of the following describes the concept of a database record?

Options:

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Question 99

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Question 100

Which of the following language types most likely controls the way a web page looks?

Options:

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Question 101

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which

of the following devices is a user MOST likely to configure to allow this?

Options:

A.

Cable modem

B.

Wireless router

C.

Access point

D.

Network switch

Question 102

After creating a database, which of the following would a developer most likely use to put data in the database?

Options:

A.

UPDATE

B.

ALTER

C.

INSERT

D.

SELECT

Question 103

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

Options:

A.

Permission

B.

Ink cartridge

C.

USB cable

D.

Driver

Page: 1 / 34
Total 344 questions