Valentine Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

FC0-U61 Sample Questions Answers

Questions 4

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

Options:

A.

Workstation

B.

Laptop

C.

Cellphone

D.

Thin client

Buy Now
Questions 5

A programmer uses DML to modify:

Options:

A.

files

B.

permissions

C.

data

D.

backups

Buy Now
Questions 6

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Buy Now
Questions 7

Which of the following is primarily a confidentiality concern?

Options:

A.

Eavesdropping

B.

Impersonating

C.

Destructing

D.

Altering

Buy Now
Questions 8

Which of the following storage types uses platters to store data?

Options:

A.

Hard drive

B.

Solid-state drive

C.

Optical drive

D.

Flash drive

Buy Now
Questions 9

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the

same time?

Options:

A.

Text file on a shared drive

B.

Managed relational database

C.

Informational intranet page

D.

Locally installed productivity software

Buy Now
Questions 10

Which of the following best practices can be used to mitigate password reuse?

Options:

A.

Password length

B.

Password complexity

C.

Password reset

D.

Password history

Buy Now
Questions 11

A user installs a wireless router and opens a browser to modify the settings. Which of the following installation types does this describe?

Options:

A.

Web-based

B.

Plug-and-play

C.

Driver-based

D.

Server-based

Buy Now
Questions 12

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

Options:

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Buy Now
Questions 13

Which of the following is most appropriate to list on a social media site about an employer?

Options:

A.

Work email

B.

Job title

C.

Hire date

D.

Customers served

E.

Contract

Buy Now
Questions 14

Which of the following BEST describes the physical location of the data in the database?

Options:

A.

Table

B.

Column

C.

RAM

D.

HDD

Buy Now
Questions 15

Which of the following best explains the reason for password expiration?

Options:

A.

To disable unused user IDs

B.

To invalidate any compromised passwords

C.

To discourage writing down passwords

D.

To enforce new password complexity rules

Buy Now
Questions 16

When editing a document, which of the following describes where the changes are located before they are saved to permanent storage?

Options:

A.

SSD

B.

CPU

C.

RAM

D.

GPU

Buy Now
Questions 17

Which of the following programming concepts uses properties and attributes?

Options:

A.

Objects

B.

Functions

C.

Containers

D.

Identifiers

Buy Now
Questions 18

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Buy Now
Questions 19

A small company wants to set up a server that is accessible from the company network as well as the Internet.

Which of the following is MOST important to determine before allowing employees to access the server

remotely?

Options:

A.

The quality of the computer used to connect

B.

A security method of allowing connections

C.

The employees’ home ISP speeds

D.

The geographical location of the employees

Buy Now
Questions 20

Which of the following is a compiled language?

Options:

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

Buy Now
Questions 21

Which of the following WiFi security options would create the MOST need for a VPN connection on the client

device?

Options:

A.

Open

B.

WEP

C.

WPA

D.

WPA2

Buy Now
Questions 22

A technician needs to install and configure a wireless SOHO network. Which of the following should the technician configure to reduce Wi-Fi interference from other household appliances?

Options:

A.

2.4GHz

B.

5GHz

C.

802.11b

D.

802.11g

Buy Now
Questions 23

A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?

Options:

A.

Proxy server

B.

Browser add-on

C.

Corrupted cache

D.

Script blocker

Buy Now
Questions 24

Which of the following is an advantage of installing an application to the cloud?

Options:

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Buy Now
Questions 25

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

Options:

A.

Algorithm

B.

Software

C.

Pseudocode

D.

Flowchart

Buy Now
Questions 26

Which of the following operating systems do not require extensions on files to execute a program? (Select

TWO).

Options:

A.

Windows 7

B.

Windows 8

C.

UNIX

D.

Windows Server 2012

E.

Android

F.

Linux

Buy Now
Questions 27

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

Options:

A.

Patent

B.

Copyright

C.

NDA

D.

Trademark

E.

EULA

Buy Now
Questions 28

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Buy Now
Questions 29

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

Options:

A.

Loop

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 30

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

Options:

A.

Data capture and collections

B.

Asset inventory inputs

C.

Sales statistics

D.

Average loss output

Buy Now
Questions 31

A technician is installing a new wireless network and wants to secure the wireless network to prevent

unauthorized access. Which of the following protocols would be the MOST secure?

Options:

A.

WPA

B.

SSID

C.

WEP

D.

WPA2

Buy Now
Questions 32

Which of the following is an example of a compiled language?

Options:

A.

C++

B.

SQL

C.

Python

D.

XML

Buy Now
Questions 33

Which of the following data types should a database administrator use to store customer postal codes?

Options:

A.

Float

B.

String

C.

Boolean

D.

Integer

Buy Now
Questions 34

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.

Web page

B.

List

C.

Flat file

D.

Database

Buy Now
Questions 35

The computer language that is closest to machine code is:

Options:

A.

query language

B.

scripting language

C.

markup language

D.

assembly language

Buy Now
Questions 36

Which of the following storage types is MOST vulnerable to magnetic damage?

Options:

A.

Flash

B.

SSD

C.

Optical

D.

HDD

Buy Now
Questions 37

In which of the following situations should there be come expectation of privacy?

Options:

A.

Posting a comment on a friend’s social media page

B.

Submitting personal information on a school enrollment site

C.

Posting a comment on a video sharing site

D.

Sending email and pictures to a close relative

Buy Now
Questions 38

Which of the following file extensions is used for a consolidated group of files?

Options:

A.

.bat

B.

.avi

C.

.rar

D.

.rtf

Buy Now
Questions 39

Which of the following is the closest to machine language?

Options:

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Buy Now
Questions 40

Which of the following relational database constructs is used to ensure valid values are entered for a column?

Options:

A.

Schema

B.

Permissions

C.

Constraint

D.

Column

Buy Now
Questions 41

A user is trying to set up a new wireless access point. Which of the following should the user do first?

Options:

A.

Change the SSID to a unique name.

B.

Change the default password.

C.

Enable WPA2 encryption.

D.

Enable the highest available wireless standard.

Buy Now
Questions 42

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 43

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the

following would be the BEST choice to accomplish this task?

Options:

A.

Thunderbolt cable

B.

Bluetooth module

C.

Infrared port

D.

WLAN card

Buy Now
Questions 44

A programmer is generating results by iterating rows that provide values needed for one calculation. Which of the following functions best accomplishes this task?

Options:

A.

Branching

B.

Pausing for input

C.

Sorting

D.

Looping

Buy Now
Questions 45

Which of the following creates multifactor authentication when used with something you have?

Options:

A.

Single sign-on

B.

Hardware token

C.

Geolocation

D.

Password

Buy Now
Questions 46

An application is hosted on a local network. Which of the following descriptions is correct?

Options:

A.

LAN access Is required.

B.

The application exists locally.

C.

Files are saved in the cloud.

D.

Internet access Is required.

Buy Now
Questions 47

Which of the following contains exactly four copper wires?

Options:

A.

RJ45

B.

VGA

C.

RJ11

D.

USB

Buy Now
Questions 48

Privacy expectations on a company intranet should be limited to:

Options:

A.

precedents.

B.

HR policy.

C.

word of mouth.

D.

system usage agreements.

Buy Now
Questions 49

A user inserts a USB flash drive into a computer tor the first time and sees a message on the screen indicating the device is being set up. The message quickly changes to indicate the device is ready for use. Which of the following device configuration types most likely occurred?

Options:

A.

Driver installation

B.

Plug-and-play

C.

IP-based

D.

Web-based

Buy Now
Questions 50

Which of the following would a company consider an asset?

Options:

A.

An external company used to destroy defective hard drives

B.

Information residing on backup tapes

C.

A company-sponsored technology conference

D.

A certified third-party vendor that provides critical components

Buy Now
Questions 51

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

Options:

A.

Boolean

B.

Integer

C.

Float

D.

Char

Buy Now
Questions 52

Which of the following is the slowest processing speed?

Options:

A.

2.6GHz

B.

5000Kbps

C.

3.4MHz

D.

4MbpS

Buy Now
Questions 53

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

Options:

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

Buy Now
Questions 54

Which of the following language types most likely controls the way a web page looks?

Options:

A.

Assembly language

B.

Markup language

C.

Compiled language

D.

Scripted language

Buy Now
Questions 55

Which of the following best describes when lo use an array?

Options:

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Buy Now
Questions 56

Which of the following is the most secure fllesystem?

Options:

A.

FAT32

B.

NFS

C.

NTFS

D.

exFAT

Buy Now
Questions 57

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Options:

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Buy Now
Questions 58

Which of the following scripting languages is most likely to be used in a Linux command-line environment?

Options:

A.

JavaScript

B.

PowerShell

C.

C++

D.

Bash

Buy Now
Questions 59

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

Options:

A.

Encryption

B.

Compression

C.

Permissions

D.

Auditing

Buy Now
Questions 60

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Options:

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Buy Now
Questions 61

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

Options:

A.

a storage area network.

B.

an embedded OS.

C.

network attached storage.

D.

a Type 1 hypervisor.

Buy Now
Questions 62

A programmer needs an element that will automatically store customer orders consecutively by order number every time a new order is placed. Which of the following elements should be used?

Options:

A.

Vector

B.

Sequence

C.

Array

D.

Constant

Buy Now
Questions 63

Which of the following commands would most likely be used to add data to an existing database table?

Options:

A.

SELECT

B.

INSERT

C.

ALTER

D.

CREATE

Buy Now
Questions 64

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

Options:

A.

1001Kbps

B.

110Mbps

C.

1.22Gbps

D.

123Mbps

Buy Now
Questions 65

A user is selecting software to use to prepare handouts for a presentation. The user would like the information to be easy to format and printer friendly. Which of the following software types should the user select?

Options:

A.

Word processing

B.

Spreadsheet

C.

Text editor

D.

Visual diagramming

Buy Now
Questions 66

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

Options:

A.

Customer date of birth

B.

The first and last name of the Chief Executive Officer (CEO)

C.

Customer service number

D.

Company social media screen name

Buy Now
Questions 67

Which of the following interfaces is best for viewing database performance information?

Options:

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Buy Now
Questions 68

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST

way to achieve this?

Options:

A.

Perform process management.

B.

Perform task scheduling.

C.

Set the system date and time.

D.

Set a reminder to run the script.

Buy Now
Questions 69

Which of the following best describes the differences between data and information?

Options:

A.

Data is a result of the analytical processing of information.

B.

Information is raw unstructured or uncorrected data.

C.

Information can exist without data.

D.

Data can be facts, figures, or events that can be processed to create information.

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Feb 20, 2024
Questions: 231
$64  $159.99
$48  $119.99
$40  $99.99
buy now FC0-U61