11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

FC0-U61 Exam Dumps - CompTIA IT Fundamentals+ Certification Exam

Question # 4

Which of the following is considered a traditional input and output device?

A.

Printer

B.

Hard drive

C.

Keyboard

D.

Display monitor

Full Access
Question # 5

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

A.

Establish a plan of action.

B.

Gather information

C.

Duplicate the problem.

D.

Find the root cause.

Full Access
Question # 6

Which of the following would be considered the BEST method of securely distributing medical records?

A.

Encrypted flash drive

B.

Social networking sites

C.

Fax

D.

FTP file sharing

Full Access
Question # 7

Within a database, which of the following would be the best access method to use to display a subset of a table?

A.

UPDATE

B.

DROP

C.

SELECT

D.

INSERT

Full Access
Question # 8

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

A.

Loop

B.

Variable

C.

Constant

D.

Function

Full Access
Question # 9

A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?

A.

Flowchart schema

B.

Physical schema

C.

Logical schema

D.

Table schema

Full Access
Question # 10

Which of the following would MOST likely use an ARM processor?

A.

Laptop

B.

Tablet

C.

Workstation

D.

Server

Full Access
Question # 11

A user is trying to set up a new wireless access point. Which of the following should the user do first?

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Full Access
Question # 12

Which of the following is the BEST option for a developer to use when storing the months of a year and when

performance is a key consideration?

A.

Array

B.

Vector

C.

List

D.

String

Full Access
Question # 13

Which of the following network protocols will MOST likely be used when sending and receiving Internet email?

(Select TWO.)

A.

SMTP

B.

POP3

C.

SNMP

D.

DHCP

E.

ICMP

F.

SFTP

Full Access
Question # 14

Which of the following is the best reason to implement a software token instead of a hardware token?

A.

A software token can be set to a permanent number that never changes.

B.

A software token can be encrypted.

C.

A software token is more cost efficient than a hardware token.

D.

A software token cannot be lost.

Full Access
Question # 15

A customer is looking for a device that uses tap to pay when making purchases. Which of the following technologies should the customer use?

A.

Wi-Fi

B.

IR

C.

Bluetooth

D.

NFC

Full Access
Question # 16

A building has two legacy APs. A new AP was recently installed within 30ft (9m) of the legacy APs. Multiple users have been reporting intermittent internet connectivity since the new AP was installed. Which of the following explains what is happening?

A.

WEP is enabled.

B.

There are inference and attenuation factors.

C.

There are speed limitations.

D.

The passwords are not synced.

Full Access
Question # 17

Which of the following is a reason why complex passwords are required?

A.

To encourage password variety

B.

To prevent someone from guessing them

C.

To make them harder to remember

D.

To reduce social engineering attacks

Full Access
Question # 18

Which of the following database types would be best in which to place financial data?

A.

Unstructured

B.

Semi-structured

C.

Structured

D.

Spreadsheet

Full Access
Question # 19

A customer wants to buy a new laptop with a 2.5Gbps processor. Which of the following best describes the device the salesperson should suggest?

A.

2.5MHz

B.

2.5Tbps

C.

2.5GB

D.

2.5GHz

Full Access
Question # 20

Which of the following best describes the process of comparing MD5 values after downloading software?

A.

Verifying encryption

B.

Safe browsing practices

C.

Patching and updating

D.

Validating legitimate sources

Full Access
Question # 21

Which of the following best protects data in transit?

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Full Access
Question # 22

Which of the following contains reusable code?

A.

Constant

B.

Variable

C.

Function

D.

Array

Full Access
Question # 23

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Full Access
Question # 24

A company wants to provide encrypted remote access to its email, file, and application servers to facilitate the ability to work remotely. Which of the following would best fulfill these requirements?

A.

Disk-level encryption

B.

Secure web gateway

C.

VPN

D.

AES

Full Access
Question # 25

Which of the following elements is most important in order for data reports to have value?

A.

Large sample sizes

B.

Daily data

C.

Frequent measurements

D.

Useful metrics

Full Access
Question # 26

A company allows employees to use their own devices for work. Which of the following is the best security method for such devices?

A.

Update the device software.

B.

Enable passwords.

C.

Enable host IDS.

D.

Remove browser cookies.

Full Access
Question # 27

A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?

A.

Motherboard

B.

BIOS

C.

SSD

D.

CPU

Full Access
Question # 28

Which of the following best explains the reason for password expiration?

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Full Access
Question # 29

Which of the following is secure?

A.

.edu

B.

FTP

C.

HTTPS

D.

.org

E.

FAT32

Full Access
Question # 30

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

A.

Data capture and collections

B.

Asset inventory inputs

C.

Sales statistics

D.

Average loss output

Full Access
Question # 31

Which of the following is an advantage of a fiat file?

A.

Variety of data

B.

Scalability

C.

Portability

D.

Multiple concurrent users

Full Access
Question # 32

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Full Access
Question # 33

An executive is sharing a series of slides with coworkers in a conference room. Which of the following applications is the executive most likely to use?

A.

Presentation software

B.

Conferencing software

C.

Project management software

D.

Visual diagramming software

Full Access
Question # 34

Which of the following file extensions is used for a consolidated group of files?

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Full Access
Question # 35

Which of the following would work BEST stored as a flat file rather than stored in a database?

A.

Contact list

B.

Movie theater locations

C.

Directions to doctor’s office

D.

Store inventory

Full Access
Question # 36

Which of the following storage devices have a spinning disk? (Choose two.)

A.

Optical drive

B.

SSD

C.

HDD

D.

Flash drive

E.

RAM

F.

ROM

Full Access
Question # 37

A technician has been asked to install a video interface that can support both high bandwidth digital video and audio on a single cable. Which of the following should the technician use?

A.

DVI

B.

VGA

C.

DisplayPort

D.

S-video

E.

HDMI

Full Access
Question # 38

A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once. Which of the following is best for this requirement?

A.

SSO

B.

Software token

C.

PIN

D.

Multifactor authentication

Full Access
Question # 39

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

A.

10

B.

14

C.

15

D.

17

Full Access
Question # 40

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Full Access
Question # 41

Which of the following is a quality of solutions created by web browsers?

A Proprietary

B. Cross-platform

C. Single platform

D. Site licensed

Full Access
Question # 42

Which of the following would indicate the FASTEST processor speed?

A.

3.6GHz

B.

3.6MHz

C.

3.6Mbps

D.

3.6Gbps

Full Access
Question # 43

A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?

A.

Delete the tracking cookies.

B.

Avoid password reuse.

C.

Use a complex password.

D.

Clear the browser cache.

Full Access
Question # 44

The IT department has established a new password policy for employees. Specifically, the policy reads:

    Passwords must not contain common dictionary words

    Passwords must contain at least one special character.

    Passwords must be different from the las six passwords used.

    Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Full Access
Question # 45

Which of the following defines a reusable value that can be reassigned?

A.

Method

B.

Variable

C.

Constant

D.

Function

Full Access
Question # 46

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Full Access
Question # 47

Which of the following business continuity concepts is the best example of fault tolerance?

A.

Data restoration

B.

Redundant power

C.

Disaster recovery

D.

Restoring access

Full Access
Question # 48

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

A.

Boolean

B.

Integer

C.

Float

D.

Char

Full Access
Question # 49

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which

of the following devices is a user MOST likely to configure to allow this?

A.

Cable modem

B.

Wireless router

C.

Access point

D.

Network switch

Full Access
Question # 50

Which of the following is a logical structure for storing files?

A.

Folder

B.

Extension

C.

Permissions

D.

Shortcut

Full Access
Question # 51

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Full Access
Question # 52

A network technician needs to ensure data on a network drive is fully backed up. Which of the following backups should the technician implement?

A.

Database

B.

Webserver

C.

File

D.

Operating system

Full Access
Question # 53

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A.

Update from 802.11b to 802.11g.

B.

Ensure sources of EMI are removed.

C.

Enable WPA2-Enterprise.

D.

Use WiFi Protected Setup.

Full Access
Question # 54

Which of the following filesystems is compatible with the greatest number of operating systems?

A.

ext4

B.

FAT32

C.

NTFS

D.

HFS

Full Access
Question # 55

Which of the following notational systems uses the most characters to represent the decimal number 10?

A.

Octal

B.

Hexadecimal

C.

Decimal

D.

Binary

Full Access
Question # 56

Which of the following allows wireless devices to communicate to a wired network?

A.

Modem

B.

Switch

C.

Firewall

D.

Access point

Full Access
Question # 57

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Full Access
Question # 58

Which of the following is best used to store many integers in one container?

A.

Array

B.

Function

C.

Variable

D.

Constant

Full Access
Question # 59

A developer is writing a program to process a long list of employees and apply a cost-of-living increase of 3.2% to all employees making less than $15 per hour. Which of the following pseudocode snippets provides the best solution?

A.

If employeesalary is greater than $15 per hour employeesalary = employeesalary * 1.032

B.

For all employees in the list making less than $15 per hour employeesalary = employeesalary * 1.032

C.

If employeesalary is less than $15 per hour employeesalary = employeesalary * 3.2

D.

For all employees in the list making greater than $15 per hour employeesalary = employeesalary * 3.2

Full Access
Question # 60

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Full Access
Question # 61

Which of the following security concerns is a threat to confidentiality?

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Full Access
Question # 62

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Full Access
Question # 63

Which of the following should privacy expectations on a company intranet be limited to?

A.

Precedents

B.

HR policy

C.

Word of mouth

D.

System usage agreements

Full Access
Question # 64

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

A.

127.0.0.1

B.

172.16.2.189

C.

192.168.257.1

D.

255.255.255.0

Full Access
Question # 65

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is

confirmed. Which of the following should be the technician’s NEXT step?

A.

Implement the solution.

B.

Document lessons learned.

C.

Establish a plan of action.

D.

Verify full system functionality.

Full Access
Question # 66

A user logs into a laptop using a username and complex password. This is an example of:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Full Access
Question # 67

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

Full Access
Question # 68

A user wants to prevent web history logging. Which of the following features will allow the user to achieve this goal?

A.

Private browsing

B.

Pop-up blockers

C.

Bookmarks

D.

Accessibility

Full Access
Question # 69

A programmer creates an object to retrieve customer names from a database. Which of the following best describes the object that is retrieving the names?

A.

Variable

B.

Attribute

C.

Method

D.

Looping

Full Access
Question # 70

During a meeting, managers spoke of several instances in which confidential information appeared on inappropriate websites. The company also discovered its firewall did not filter out certain traffic to prevent such issues. Which of the following most likely exposed the confidential information?

A.

Instant messaging

B.

Mobile applications

C.

Social media

D.

Video-sharing website

Full Access
Question # 71

Which of the following methods of cooling is most commonly used for desktops?

A.

Active

B.

External

C.

Cryogenics

D.

Water

Full Access
Question # 72

An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?

A.

Flat file

B.

Document

C.

Database

D.

Spreadsheet

Full Access
Question # 73

Which of the following filesystems would a Linux computer MOST likely use?

A.

HFS

B.

NTFS

C.

FAT32

D.

ext4

Full Access
Question # 74

Which of the following is the equivalent of 1 KB?

A.

0.01 googol

B.

1,000 bits

C.

8,000 bits

D.

8,000 bytes

Full Access
Question # 75

A company requires several reports that analyze related information from sales, inventory, marketing, and

compensation data. Which of the following is the BEST place to store this data?

A.

Flat file

B.

Word processor

C.

Database

D.

Network share

Full Access
Question # 76

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Full Access
Question # 77

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

A.

USB

B.

NFC

C.

DSL

D.

DVI

Full Access
Question # 78

Which of following PC components operates only as an input device?

A.

External hard drive

B.

All-in-one printer/scanner

C.

Webcam

D.

Central processing unit

Full Access
Question # 79

Which of the following can a company use to protect its logo?

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Full Access
Question # 80

Which of the following requires the MOST frequent updating to remain effective?

A.

Antivirus

B.

Host firewall

C.

Web browser

D.

Device drivers

Full Access
Question # 81

Which of the following is an example of a compiled language?

A.

C++

B.

SQL

C.

Python

D.

XML

Full Access
Question # 82

Which of the following is an example of utilizing a personalized code for continuous personal access to a software product?

A.

Site licensing

B.

Open-source licensing

C.

Product key licensing

D.

Single-use licensing

Full Access
Question # 83

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Full Access
Question # 84

After purchasing a flash drive, the buyer notices that the packaging had already been opened. Which of the following is this is an example of?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Non-repudiation

Full Access
Question # 85

Which of the following license types would be most cost effective for an organization if all users need to access software but not on a consistent basis?

A.

Site

B.

Single-use

C.

Concurrent

D.

Device

Full Access
Question # 86

Which of the following is an example of multifactor authentication?

A.

Password and passphrase

B.

Fingerprint and retina scan

C.

Hardware token and smartphone

D.

Smart card and PIN

Full Access
Question # 87

A technician is troubleshooting an error message and tests the same program on a separate, identical

machine. Which of the following troubleshooting methodology steps is this an example of?

A.

Duplicate the problem

B.

Gather information

C.

QUESTION NO: users

D.

Divide and conquer

Full Access
Question # 88

Which of the following is the best way to prevent malicious code from executing on a laptop based on attack signatures?

A.

Host-based firewall

B.

Antivirus

C.

Patching

D.

Network-based firewall

Full Access
Question # 89

Which of the following describes a unique entry to a data set?

A.

Schema

B.

Record

C.

Column

D.

Index

Full Access
Question # 90

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Full Access
Question # 91

Which of the following interfaces is best for viewing database performance information?

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Full Access
Question # 92

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Full Access
Question # 93

Which of the following best describes when lo use an array?

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Full Access
Question # 94

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely.

Which of the following is the most likely cause?

A.

Firewall settings

B.

Improper switch configuration

C.

Incorrect IP address

D.

Misconfigured access point

Full Access
Question # 95

Which of the following protocols is used to relay email from a user's mail server?

A.

IMAP

B.

FTP

C.

SMTP

D.

POP3

Full Access
Question # 96

A company wants an application to be accessed by concurrent users and store company information securely.

Which of the following would be the BEST option for storing the information?

A.

Word processing document

B.

Flat file

C.

Database

D.

Spreadsheet

Full Access
Question # 97

Which of the following violates password best practices?

A.

Password reuse across sites

B.

Password history

C.

Password expiration

D.

Password complexity

Full Access
Question # 98

Which of the following wireless communication technologies requires devices to be within 6in (15.24cm) from each other?

A.

NFC

B.

Infrared

C.

Wi-Fi

D.

Bluetooth

Full Access
Question # 99

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Full Access
Question # 100

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Full Access
Question # 101

Which of the following is something that would likely need a copyright?

A.

A new commercial software program

B.

A company's brand name

C.

A copy of a business contract

D.

An idea for computer communication

Full Access
Question # 102

Which of the following would be the most secure password reset process?

A.

Ask users for their date of birth over the phone and reset their password.

B.

Ask users to answer custom questions and send reset codes via text.

C.

Ask users for their mother’s maiden name and email them a reset link.

D.

Ask users for their phone number and call them back with a PIN.

Full Access
Question # 103

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Full Access