Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

FC0-U61 Sample Questions Answers

Questions 4

Which of the following language types would a web developer MOST likely use to create a website?

Options:

A.

Interpreted

B.

Query

C.

Compiled

D.

Assembly

Buy Now
Questions 5

Multiple users need to access the same data simultaneously. Which of the following is the best place to store the data?

Options:

A.

Database

B.

Spreadsheet

C.

Text file

D.

Word processing document

Buy Now
Questions 6

A systems administrator wants to return results for a time range within a database. Which of the following

commands should the administrator use?

Options:

A.

SELECT

B.

INSERT

C.

DELETE

D.

UPDATE

Buy Now
Questions 7

Which of the following intellectual property concepts BEST represents a legally protected slogan of a

business?

Options:

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

Buy Now
Questions 8

A user is purchasing from an online retailer. The user has entered all the required information and has clicked the "Submit" button, yet the page does not refresh, and the user does not get a confirmation. Which of the following might be the causes of the issue? (Select two).

Options:

A.

Private browsing is enabled.

B.

Extensions are out-of-date.

C.

Proxy settings are incorrect.

D.

An incompatible browser is being used.

E.

A pop-up blocker is enabled.

F.

An invalid certificate has been issued.

Buy Now
Questions 9

Which of the following statements BEST describes binary?

Options:

A.

A notational system used to represent an “on” or “off” state

B.

A notational system used to represent media access control

C.

A notational system used to represent Internet protocol addressing

D.

A notational system used to represent a storage unit of measurement

Buy Now
Questions 10

Which of the following software solutions ensures that programs running simultaneously on a workstation do not utilize the same physical memory?

Options:

A.

Disk optimizer

B.

Operating system

C.

Type 1 hypervisor

D.

Anti-malware

Buy Now
Questions 11

A database administrator would like to create a visual diagram of the layout of a new relational database. Which of the following should the administrator use?

Options:

A.

Flowchart schema

B.

Physical schema

C.

Logical schema

D.

Table schema

Buy Now
Questions 12

A company desires to implement a six-month survey site within a remote location. Which of the following is the

BEST option for Internet service?

Options:

A.

Cellular

B.

Satellite

C.

Cable

D.

Fiber

Buy Now
Questions 13

A music studio needs to store artist data as text, demos as MP3 files, and sheet music as PDF files in an organized and easily searchable format. Which of the following is best suited to meet this need?

Options:

A.

Web page

B.

List

C.

Flat file

D.

Database

Buy Now
Questions 14

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following

programming concepts does jump represent?

Options:

A.

Method

B.

Object

C.

Property

D.

Attribute

Buy Now
Questions 15

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

Options:

A.

Oatmeal

B.

Bacon and eggs

C.

Waffles

D.

Pancakes

Buy Now
Questions 16

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

Options:

A.

Document the solution and cause.

B.

Create a new theory of cause.

C.

Research the problem online.

D.

Implement preventive measures.

Buy Now
Questions 17

Which of the following is an advantage of installing an application to the cloud?

Options:

A.

Data is not stored locally.

B.

Support is not required.

C.

Service is not required.

D.

Internet access is not required.

Buy Now
Questions 18

A small company has authorized an allowance for employees to purchase their own work computers. The administrator has noticed a sizable increase in network traffic following the arrival of the new computers. Which of the following is the most likely reason?

Options:

A.

Unnecessary OEM software

B.

Lack of antivirus present

C.

Online gaming activity

D.

Firewalls are not configured

Buy Now
Questions 19

A user logs into a laptop using a username and complex password. This is an example of:

Options:

A.

biometrics

B.

multifactor authentication

C.

least privilege

D.

single-factor authentication

Buy Now
Questions 20

Which of the following BEST describes a kilobyte?

Options:

A.

A kilobyte is a measurement of storage (e.g., 100KB).

B.

A kilobyte is a measurement of throughput (e.g.,100Kbps).

C.

A kilobyte is a measurement of power (e.g., 100KW).

D.

A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Buy Now
Questions 21

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

Options:

A.

Turn on private browsing

B.

Delete browsing history on program close.

C.

Notify when downloads are complete.

D.

Configure prompting before downloading content.

Buy Now
Questions 22

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click

a link to continue to the site. Which of the following would MOST likely identify the issue?

Options:

A.

Checking the proxy settings

B.

Checking that caching is enabled

C.

Checking browser add-ons

D.

Checking certificate validity

Buy Now
Questions 23

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

Options:

A.

The power interruption caused the camera to malfunction.

B.

Ann has a compatibility problem with the camera.

C.

A firmware update needs to be applied to the camera.

D.

Ann’s Internet connection and wireless router are still down.

Buy Now
Questions 24

A technician wants to reset the boot order on a computer. Which of the following would the technician most likely use?

Options:

A.

Motherboard

B.

BIOS

C.

SSD

D.

CPU

Buy Now
Questions 25

Given the following pseudocode:

arduino

Copy code

WHILE X < 12

print "Counting"

X += 1

If X=7, which of the following is the number of times the message will be displayed?

Options:

A.

Five

B.

Seven

C.

Eleven

D.

Twelve

Buy Now
Questions 26

Which of the following describes the ability to recover access to a specific account if a credential is forgotten?

Options:

A.

Password manager

B.

Password reuse

C.

Password history

D.

Password reset

Buy Now
Questions 27

A network technician is working on the configuration of a SOHO router. After entering the IP address of the router, the technician uses a GUI to complete the final configuration steps. Which of the following configuration types is this an example of?

Options:

A.

Web-based

B.

IP-based

C.

Driver

D.

Plug-and-play

Buy Now
Questions 28

Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?

Options:

A.

Rule-based access control

B.

Mandatory access control

C.

Role-based access control

D.

Discretionary access control

Buy Now
Questions 29

Which of the following methods of cooling is most commonly used for desktops?

Options:

A.

Active

B.

External

C.

Cryogenics

D.

Water

Buy Now
Questions 30

Employee information is stored in a database. Which of the following BEST describes where all of an

employee’s information is stored?

Options:

A.

Record

B.

Report

C.

Column

D.

Procedure

Buy Now
Questions 31

A large payment website was breached recently. A user is concerned that the breach will affect account

security on other sites. Which of the following password best practices would mitigate this risk?

Options:

A.

Password history

B.

Password reuse

C.

Password expiration

D.

Password age

Buy Now
Questions 32

Which of the following is primarily a confidentiality concern?

Options:

A.

Eavesdropping

B.

Impersonating

C.

Destructing

D.

Altering

Buy Now
Questions 33

After a patch of an enterprise server, applications were unable to load. The server administrator was able to resolve the issue. Which of the following is the next step the administrator should take?

Options:

A.

Test the theory to determine the cause.

B.

Document findings, actions, and outcomes.

C.

Establish a plan of action.

D.

Verify full system functionality.

Buy Now
Questions 34

Which of the following would be the most secure password reset process?

Options:

A.

Ask users for their date of birth over the phone and reset their password.

B.

Ask users to answer custom questions and send reset codes via text.

C.

Ask users for their mother’s maiden name and email them a reset link.

D.

Ask users for their phone number and call them back with a PIN.

Buy Now
Questions 35

A database administrator wants to populate a database with large amounts of data from an external source.

Which of the following actions should be used to get the database populated?

Options:

A.

EXPORT

B.

IMPORT

C.

SELECT

D.

ALTER

Buy Now
Questions 36

After creating a database, which of the following would a developer most likely use to put data in the database?

Options:

A.

UPDATE

B.

ALTER

C.

INSERT

D.

SELECT

Buy Now
Questions 37

An accounting firm needs to allow users to update records simultaneously without errors. Which of the following best meets the firm's needs?

Options:

A.

Flat file

B.

Document

C.

Database

D.

Spreadsheet

Buy Now
Questions 38

A company wants its employee to use an email client that downloads and removes messages from the email

server. Which of the following protocols must be configured in the email client to facilitate this?

Options:

A.

POP3

B.

IMAP

C.

ICMP

D.

SMTP

Buy Now
Questions 39

Given the following pseudocode:

If there are seven apples in the basket, which of the following would be the number of oranges a person eats?

Options:

A.

10

B.

14

C.

15

D.

17

Buy Now
Questions 40

Which of the following allows network traffic to pass through it and filters specific packets?

Options:

A.

Switch

B.

Access point

C.

Modem

D.

Firewall

Buy Now
Questions 41

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this

document for public use. Which of the following should the developer use to BEST protect the document?

Options:

A.

Patent

B.

Trademark

C.

Watermark

D.

Copyright

Buy Now
Questions 42

Which of the following is a characteristic of both a database and a flat file?

Options:

A.

Concurrent users

B.

Persistence

C.

Queries

D.

Data definition

Buy Now
Questions 43

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

Options:

A.

Workstation

B.

Laptop

C.

Cellphone

D.

Thin client

Buy Now
Questions 44

A flatbed scanner that is connected to a laptop is used to convert photographic prints to digital images for reproduction on a color printer. Which of the following is considered the input device for this process?

Options:

A.

Laptop hard drive

B.

Laptop keyboard

C.

Photographic prints

D.

Flatbed scanner

E.

Color printer

Buy Now
Questions 45

Consider the following statements:

Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?

Options:

A.

topsecret

B.

normal

C.

analyst

D.

restricted

Buy Now
Questions 46

A developer is writing a script to calculate a bank account balance within two decimal places. Which of the following data types should the developer select to store the balance?

Options:

A.

Boolean

B.

Integer

C.

Float

D.

Char

Buy Now
Questions 47

Which of the following data types should a database administrator use to store customer postal codes?

Options:

A.

Float

B.

String

C.

Boolean

D.

Integer

Buy Now
Questions 48

Which of the following would be the best reason to implement a host firewall?

Options:

A.

To prevent external access

B.

To prevent hardware failures

C.

To prevent the removal of software

D.

To prevent wiretapping

Buy Now
Questions 49

A technician has verified full system functionality. Which of the following actions should the technician take next?

Options:

A.

Question the users.

B.

Determine if anything has changed.

C.

Document the findings.

D.

Gather Information.

Buy Now
Questions 50

Which of the following units of storage would be used to measure the amount of RAM on a desktop computer?

Options:

A.

TB

B.

GB

C.

MB

D.

KB

Buy Now
Questions 51

Which of the following defines a reusable value that can be reassigned?

Options:

A.

Method

B.

Variable

C.

Constant

D.

Function

Buy Now
Questions 52

Which of the following interfaces is best for viewing database performance information?

Options:

A.

Direct

B.

Programmatic

C.

Query

D.

Utility

Buy Now
Questions 53

Which of the following BEST describes the physical location of the data in the database?

Options:

A.

Table

B.

Column

C.

RAM

D.

HDD

Buy Now
Questions 54

Which of the following data types should a developer use when creating a variable to hold a postal code?

Options:

A.

Integer

B.

String

C.

Float

D.

Boolean

Buy Now
Questions 55

A hacker was able to obtain a user's password for email, social media, and bank accounts. Which of the following should the user do to prevent this type of attack in the future?

Options:

A.

Delete the tracking cookies.

B.

Avoid password reuse.

C.

Use a complex password.

D.

Clear the browser cache.

Buy Now
Questions 56

Which of the following is used to protect intellectual property while requiring the owner to provide the public with working details?

Options:

A.

Patent

B.

Trademark

C.

License

D.

Copyright

Buy Now
Questions 57

Which of the following BEST describes the practice of providing user credentials when logging onto the

network?

Options:

A.

Output

B.

Storage

C.

Input

D.

Processing

Buy Now
Questions 58

Users are required to install a certificate in order to access commercial web pages through a corporate proxy server. Which of the following Windows Control Panel applets would enable users to verify the needed certificate is installed?

Options:

A.

Network and Sharing Center

B.

System

C.

Programs and Features

D.

Internet Options

Buy Now
Questions 59

Which of the following troubleshooting steps happens before establishing a theory of probable cause?

Options:

A.

Document the lessons learned.

B.

Verify full system functionality.

C.

Identify the problem.

D.

Implement the solution.

Buy Now
Questions 60

A user needs an interface that supports both video and data. Which of the following will meet this requirement?

Options:

A.

Thunderbolt

B.

VGA

C.

DVI

D.

FireWire

Buy Now
Questions 61

A programmer is modifying the code of an existing application to include an additional subroutine that is needed for a new product line. Which of the following will most likely be added to the existing code?

Options:

A.

Branching

B.

Looping

C.

Pseudocode

D.

Syntax errors

Buy Now
Questions 62

A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?

Options:

A.

x86 only supports an installation on a 32-bit CPU architecture.

B.

x86 supports an installation on a 32-bit and a 64-bit CPU architecture.

C.

x86 only supports an installation on a 64-bit CPU architecture.

D.

x86 supports an installation on a 16-bit CPU architecture.

Buy Now
Questions 63

Which of the following is something that would likely need a copyright?

Options:

A.

A new commercial software program

B.

A company's brand name

C.

A copy of a business contract

D.

An idea for computer communication

Buy Now
Questions 64

Which of the following best protects data in transit?

Options:

A.

Backup tapes

B.

Encrypted flash drive

C.

VPN connection

D.

FTP

Buy Now
Questions 65

Which of the following is a value that uniquely identifies a database record?

Options:

A.

Foreign key

B.

Public key

C.

Primary key

D.

Private key

Buy Now
Questions 66

Which of the following tasks is typically performed during the identification phase of the troubleshooting

methodology?

Options:

A.

QUESTION NO: users.

B.

Verify functionality.

C.

Divide and conquer.

D.

Implement the solution.

Buy Now
Questions 67

A network technician is installing an RJ11 connector inside a home tor new internet service. Which ot the following network connection types is the technician most likely using?

Options:

A.

Fiber

B.

DSL

C.

Satellite

D.

Cable

Buy Now
Questions 68

Which of the following can a company use to protect its logo?

Options:

A.

Trademark

B.

Copyright

C.

Domain name

D.

patent

Buy Now
Questions 69

Which of the following is the closest to machine language?

Options:

A.

Scripted languages

B.

Compiled languages

C.

Query languages

D.

Assembly languages

Buy Now
Questions 70

A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during

a MITM attack. Which of the following should the technician enable to reduce the risk?

Options:

A.

DLP

B.

ACL

C.

TLS

D.

IPS

Buy Now
Questions 71

Which of the following backup types is most likely to allow restoration of a fully bootable computer on new hardware?

Options:

A.

File-level backups

B.

Critical data backups

C.

System backups

D.

Database backups

Buy Now
Questions 72

The IT department has established a new password policy for employees. Specifically, the policy reads:

    Passwords must not contain common dictionary words

    Passwords must contain at least one special character.

    Passwords must be different from the las six passwords used.

    Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

Options:

A.

Password lockout

B.

Password complexity

C.

Password expiration

D.

Passwords history

E.

Password length

F.

Password age

Buy Now
Questions 73

Which of the following should privacy expectations on a company intranet be limited to?

Options:

A.

Precedents

B.

HR policy

C.

Word of mouth

D.

System usage agreements

Buy Now
Questions 74

Which of the following security concerns is a threat to confidentiality?

Options:

A.

Replay attack

B.

Denial of service

C.

Service outage

D.

Dumpster diving

Buy Now
Questions 75

Which of the following should have the HIGHEST expectation of privacy?

Options:

A.

A picture posted to a social media website

B.

A presentation saved to a corporate file server

C.

A locally stored word processing document

D.

A spreadsheet emailed to a business client

Buy Now
Questions 76

Which of the following best describes when lo use an array?

Options:

A.

The user needs to store multiple values in one object.

B.

The user needs the object to store one value and to be changeable.

C.

The user needs one object to store numbers only.

D.

The user needs the object to store one value permanently.

Buy Now
Questions 77

Which of the following are most likely to have a GUI? (Select two).

Options:

A.

PowerShell

B.

Windows

C.

Command Prompt

D.

macOS

E.

Z shell

F.

Bash

Buy Now
Questions 78

Which of the following is the best reason to implement a software token instead of a hardware token?

Options:

A.

A software token can be set to a permanent number that never changes.

B.

A software token can be encrypted.

C.

A software token is more cost efficient than a hardware token.

D.

A software token cannot be lost.

Buy Now
Questions 79

A database administrator finds that a table is not needed in a relational database. Which of the following

commands is used to completely remove the table and its data?

Options:

A.

UPDATE

B.

DELETE

C.

ALTER

D.

DROP

Buy Now
Questions 80

An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information. Which of the following best describes this scenario?

Options:

A.

Phishing attack

B.

Social engineering

C.

On-path attack

D.

Eavesdropping

Buy Now
Questions 81

Meaningful and accurate reporting is essential to retailers in making business decisions while managing

inventory. Which of the following offers the BEST assistance in generating reports?

Options:

A.

Data capture and collections

B.

Asset inventory inputs

C.

Sales statistics

D.

Average loss output

Buy Now
Questions 82

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

Options:

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

Buy Now
Questions 83

Which of the following is a reason for using a UPS?

Options:

A.

To help with posture

B.

To clean power

C.

To prevent viruses

D.

To lessen eye strain

Buy Now
Questions 84

An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following

is the MOST likely cause?

Options:

A.

Script blocker

B.

Proxy settings

C.

Private browsing

D.

Full browser cache

Buy Now
Questions 85

Which of the following is required for a cloud network?

Options:

A.

Local applications

B.

Credentials

C.

Internet access

D.

Network infrastructure

Buy Now
Questions 86

Which of the following would be used to send messages using the SMTP protocol?

Options:

A.

Document sharing software

B.

Instant messaging software

C.

Conferencing software

D.

Email software

Buy Now
Questions 87

A programmer needs to specify how to store a test score entered using a web form. Which of the following would be best to use?

Options:

A.

Variable

B.

Vector

C.

Constant

D.

Array

Buy Now
Questions 88

Which of the following describes something in a database that refers to the unique identifier in the parent

table?

Options:

A.

Attribute

B.

Constraint

C.

Foreign key

D.

Schema

Buy Now
Questions 89

A user is selecting software to visually display information in a marketing meeting. Which of the following software types should the user select?

Options:

A.

Spreadsheet

B.

Word processing

C.

Web browsing

D.

Presentation

Buy Now
Questions 90

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of

application architectures did the employee use?

Options:

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

Buy Now
Questions 91

Which of the following are data manipulation SQL commands? (Select two).

Options:

A.

ALTER

B.

UPDATE

C.

MODIFY

D.

INSERT

E.

DROP

Buy Now
Questions 92

A technician is configuring a new Windows PC and needs to choose a filesystem that supports encryption. Which of the following is the technician most likely to choose?

Options:

A.

NTFS

B.

FAT32

C.

HFS

D.

ext4

Buy Now
Questions 93

Which of the following internet service types is most susceptible to weather disruptions?

Options:

A.

Cable

B.

Satellite

C.

DSL

D.

Fiber

Buy Now
Questions 94

Which of the following best describes the technology utilized in digital wallets?

Options:

A.

Infrared

B.

NFC

C.

Bluetooth

D.

RFID

Buy Now
Questions 95

A user browses to a website. Before the page opens, the user receives a message that the site is not secure. Which of the following caused this message?

Options:

A.

Certificate

B.

Proxy

C.

Script

D.

Malware

Buy Now
Questions 96

Which of the following are the basic computing operations?

Options:

A.

Input, process, output, and feedback

B.

Input, output, storage, and feedback

C.

Input, process, and output

D.

Input, process, output, and storage

Buy Now
Questions 97

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

Options:

A.

Server

B.

Tape library

C.

External HDD

D.

Workstation

Buy Now
Questions 98

A product advertising kiosk at a mall is set up using a thin client without a hard drive and is running a web application managed and updated through an internet connection. Which of the following application delivery methods is most likely being used for the kiosk?

Options:

A.

Local network-hosted

B.

Cloud-hosted

C.

Hybrid-installed

D.

Locally installed

Buy Now
Questions 99

Which of the following best describes the differences between data and information?

Options:

A.

Data is a result of the analytical processing of information.

B.

Information is raw unstructured or uncorrected data.

C.

Information can exist without data.

D.

Data can be facts, figures, or events that can be processed to create information.

Buy Now
Questions 100

Which of the following should a technician do to fix stability issues on a workstation?

Options:

A.

Install a malicious software analyzer.

B.

Install a firewall.

C.

Install browsing controls.

D.

Install updates.

Buy Now
Questions 101

An online retailer experienced an outage. An investigation revealed that the server received more requests than it could handle, and customers could not log in as a result. Which of the following best describes this scenario?

Options:

A.

Hardware failure

B.

Denial of service

C.

On-path attack

D.

Social engineering

Buy Now
Questions 102

Which of the following describes the concept of a database record?

Options:

A.

A collection of rows, columns, and constraints

B.

A collection of fields about the same object

C.

A collection of schemas within the same database

D.

A collection of tables within different schemas

Buy Now
Questions 103

Which of the following filesystems is compatible with the greatest number of operating systems?

Options:

A.

ext4

B.

FAT32

C.

NTFS

D.

HFS

Buy Now
Exam Code: FC0-U61
Exam Name: CompTIA IT Fundamentals+ Certification Exam
Last Update: Nov 21, 2024
Questions: 344
$64  $159.99
$48  $119.99
$40  $99.99
buy now FC0-U61