FC0-U61: CompTIA IT Fundamentals Topic 2
QUESTION NO: 51. A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
A. USB
B. NFC
C. DSL
D. DVI
Answer: D
QUESTION NO: 52. Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
A. Fiber
B. DSL
C. Cable
D. Satellite
Answer: D
QUESTION NO: 53. Which of the following is MOST likely used to represent international text data?
A. ASCII
B. Octal
C. Hexadecimal
D. Unicode
Answer: D
QUESTION NO: 54. For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
A. redundancy.
B. replication.
C. prioritization.
D. fault tolerance.
Answer: C
QUESTION NO: 55. Which of the following operating systems do not require extensions on files to execute a program? (Choose two.)
A. Windows 7
B. Windows 8
C. UNIX
D. Windows Server 2012
E. Android
F. Linux
Answer: C,F
QUESTION NO: 56. A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: B
QUESTION NO: 57. Which of the following is an example of multifactor authentication?
A. Password and passphrase
B. Fingerprint and retina scan
C. Hardware token and smartphone
D. Smart card and PIN
Answer: D
QUESTION NO: 58. Which of the following language types would a web developer MOST likely use to create a website?
A. Interpreted
B. Query
C. Compiled
D. Assembly
Answer: A
QUESTION NO: 59. A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
A. Algorithm
B. Software
C. Pseudocode
D. Flowchart
Answer: A
QUESTION NO: 60. A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Choose two.)
A. Patent
B. Copyright
C. NDA
D. Trademark
E. EULA
Answer: B,D
QUESTION NO: 61. Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
A. Host-based firewall
B. Strong administrator password
C. Anti-malware software
D. Full disk encryption
Answer: D
QUESTION NO: 62. In which of the following situations should there be come expectation of privacy?
A. Posting a comment on a friend’s social media page
B. Submitting personal information on a school enrollment site
C. Posting a comment on a video sharing site
D. Sending email and pictures to a close relative
Answer: B
QUESTION NO: 63. Which of the following data types should a developer use when creating a variable to hold a postal code?
A. Integer
B. String
C. Float
D. Boolean
Answer: B
QUESTION NO: 64. Which of the following is the closest to machine language?
A. Scripted languages
B. Compiled languages
C. Query languages
D. Assembly languages
Answer: D
QUESTION NO: 65. A function is BEST used for enabling programs to:
A. hold a list of numbers.
B. be divided into reusable components.
C. define needed constant values.
D. define variables to hold different values.
Answer: D
QUESTION NO: 66. When transferring a file across the network, which of the following would be the FASTEST transfer rate?
A. 1001Kbps
B. 110Mbps
C. 1.22Gbps
D. 123Mbps
Answer: C
QUESTION NO: 67. A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?
A. 127.0.0.1
B. 172.16.2.189
C. 192.168.257.1
D. 255.255.255.0
Answer: B
QUESTION NO: 68. A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?
A. Laptop
B. Server
C. Game console
D. Workstation
Answer: B
QUESTION NO: 69. A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?
A. Flat file
B. Word processor
C. Database
D. Network share
Answer: C
QUESTION NO: 70. A computer user is downloading software from the Internet and notices the following at the end of the install file: “…x86.exe”. Which of the following statements BEST represents what the “…x86.exe” means in the installation file?
A. x86 only supports an installation on a 32-bit CPU architecture.
B. x86 supports an installation on a 32-bit and a 64-bit CPU architecture.
C. x86 only supports an installation on a 64-bit CPU architecture.
D. x86 supports an installation on a 16-bit CPU architecture.
Answer: A
QUESTION NO: 71. Which of the following would be used to send messages using the SMTP protocol?
A.Document sharing software
B. Instant messaging software
C. Conferencing software
D. Email software
Answer: D
QUESTION NO: 72. Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
A. Turn on private browsing
B. Delete browsing history on program close.
C. Notify when downloads are complete.
D. Configure prompting before downloading content.
Answer: D
QUESTION NO: 73. Which of the following is an example of information a company would ask employees to handle in a sensitive manner?
A. Customer date of birth
B. The first and last name of the Chief Executive Officer (CEO)
C. Customer service number
D. Company social media screen name
Answer: A
QUESTION NO: 74. The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?
A. Database software
B. Word processing software
C. Conferencing software
D. Presentation software
Answer: A
QUESTION NO: 75. Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?
A. Renew the IP address.
B. Configure the browser proxy settings.
C. Clear the browser cache.
D. Disable the pop-up blocker
Answer: B
QUESTION NO: 76. Which of the following would be considered the BEST method of securely distributing medical records?
A. Encrypted flash drive
B. Social networking sites
C. Fax
D. FTP file sharing
Answer: A
QUESTION NO: 77. Which of the following should have the HIGHEST expectation of privacy?
A. A picture posted to a social media website
B. A presentation saved to a corporate file server
C. A locally stored word processing document
D. A spreadsheet emailed to a business client
Answer: C
QUESTION NO: 78. Which of the following storage devices have a spinning disk? (Choose two.)
A. Optical drive
B. SSD
C. HDD
D. Flash drive
E. RAM
F. ROM
Answer: A,C
QUESTION NO: 79. Which of the following computer components allows for communication over a computer network?
A. RAM
B. NIC
C. CPU
D. NAS
Answer: B
QUESTION NO: 80. A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?
A. Cellular
B. Satellite
C. Cable
D. Fiber
Answer: B
QUESTION NO: 81. Which of the following authorization techniques is used to assign permissions and authorize a user based on job title or function?
A. Rule-based access control
B. Mandatory access control
C. Role-based access control
D. Discretionary access control
Answer: C
QUESTION NO: 82. A user has purchased a high-end graphics card that contains a GPU. Which of the following processes is being performed by the GPU on the graphics card?
A. Input
B. Output
C. Storage
D. Processing
Answer: D
QUESTION NO: 83. A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time. Which of the following types of license is this an example of?
A. Group license
B. Concurrent license
C. Subscription license
D. Open-source license
Answer: B
QUESTION NO: 84. A user at a company visits a weather website often during the day. The user browses to the site in the afternoon and notices that the temperature listed is from the morning and is not the current temperature. The user closes the page and tries again with the same result. Which of the following is the MOST likely cause?
A. Proxy server
B. Browser add-on
C. Corrupted cache
D. Script blocker
Answer: A
QUESTION NO: 85. Which of the following application delivery mechanisms BEST describes infrastructure located in an individual organization’s datacenter?
A. Private
B. Traditional
C. Public
D. Cloud
Answer: A
QUESTION NO: 86. A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?
A. EXPORT
B. IMPORT
C. SELECT
D. ALTER
Answer: B
QUESTION NO: 87. Which of the following would a company consider an asset?
A. An external company used to destroy defective hard drives
B. Information residing on backup tapes
C. A company-sponsored technology conference
D. A certified third-party vendor that provides critical components
Answer: B
QUESTION NO: 88. A company will begin to allow staff to work from home by means of formal request. Which of the following is the BEST way for the company to document this change?
A. Written procedure
B. Written policy
C. Written email
D. Written memo
Answer: B
QUESTION NO: 89. A company’s team members have both old and new laptops. Which of the following connectors should be available in the conference room to ensure everyone can use the conference room projectors? (Choose two.)
A. USB
B. HDMI
C. FireWire
D. VGA
E. Bluetooth
F. RJ45
Answer: B,D
QUESTION NO: 90. A programmer uses DML to modify:
A. files
B. permissions
C. data
D. backups
Answer: C
QUESTION NO: 91. A technician is concerned that sensitive data transmitted over the Internet can be intercepted and viewed during a MITM attack. Which of the following should the technician enable to reduce the risk?
A. DLP
B. ACL
C. TLS
D. IPS
Answer: C
QUESTION NO: 92. Given the following pseudocode:
Which of the following is the output of the code?
A. 1
B. 9
C. 10
D. 11
Answer: D
QUESTION NO: 93. A developer needs to add a table to a database. Which of the following database activities should the user perform?
A. UPDATE
B. ALTER
C. CREATE
D. REPORT
Answer: C
QUESTION NO: 94. Which of the following does a NoSQL database use to organize data?
A. Primary keys
B. Schemas
C. Keys/values
D. Tables
Answer: C
QUESTION NO: 95. A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss. Which of the following business continuity concepts does this explain?
A. File backup
B. Data restoration
C. Fault tolerance
D. Restoring access
Answer: C
QUESTION NO: 96. A user needs to enter text and numbers to produce charts that demonstrate sales figures. Which of the following types of software would BEST complete this task?
A. Text editing software
B. Visual diagramming software
C. Spreadsheet software
D. Web browsing software
Answer: C
QUESTION NO: 97. Which of the following BEST describes the physical location of the data in the database?
A. Table
B. Column
C. RAM
D. HDD
Answer: A
QUESTION NO: 98. A user logs into a laptop using a username and complex password. This is an example of:
A. biometrics
B. multifactor authentication
C. least privilege
D. single-factor authentication
Answer: D
QUESTION NO: 99. To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user’s workstation. Which of the following troubleshooting methodologies is being performed?
A. Question the obvious.
B. Divide and conquer.
C. Duplicate the problem
D. Research the knowledge base.
Answer: B
QUESTION NO: 100. A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user’s needs?
A. T1 line
B. Satellite
C. Fiber optic
D. DSL
Answer: C