FC0-U61: CompTIA IT Fundamentals Topic 3
QUESTION NO: 101. Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
A. Disk
B. Email
C. VPN
D. HTTPS
Answer: A
QUESTION NO: 102. Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
A. Question users.
B. Verify functionality.
C. Divide and conquer.
D. Implement the solution.
Answer: A
QUESTION NO: 103. A technician overhears a systems administrator mention the term “IOPS”. To which of the following operating system functions would the term BEST apply?
A. Disk management
B. Process management
C. Application management
D. Service management
Answer: A
QUESTION NO: 104. Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
A. Array
B. Vector
C. List
D. String
Answer: A
QUESTION NO: 105. A company wants an application to be accessed by concurrent users and store company information securely. Which of the following would be the BEST option for storing the information?
A. Word processing document
B. Flat file
C. Database
D. Spreadsheet
Answer: C
QUESTION NO: 106. Which of the following would MOST likely use an ARM processor?
A. Laptop
B. Tablet
C. Workstation
D. Server
Answer: B
QUESTION NO: 107. A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?
A. Perform process management.
B. Perform task scheduling.
C. Set the system date and time.
D. Set a reminder to run the script.
Answer: B
QUESTION NO: 108. Which of the following would indicate the FASTEST processor speed?
A. 3.6GHz
B. 3.6MHz
C. 3.6Mbps
D. 3.6Gbps
Answer: A
QUESTION NO: 109. A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
A. Cable modem
B. Wireless router
C. Access point
D. Network switch
Answer: A
QUESTION NO: 110. The computer language that is closest to machine code is:
A. query language
B. scripting language
C. markup language
D. assembly language
Answer: D
QUESTION NO: 111. Employee information is stored in a database. Which of the following BEST describes where all of an employee’s information is stored?
A. Record
B. Report
C. Column
D. Procedure
Answer: A
QUESTION NO: 112. Which of the following is an example of an interpreted language?
A. C++
B. Java
C. Python
D. Go
Answer: C
QUESTION NO: 113. An employee’s laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
A. Script blocker
B. Proxy settings
C. Private browsing
D. Full browser cache
Answer: B
QUESTION NO: 114. Which of the following file systems would a Linux computer MOST likely use?
A. HFS
B. NTFS
C. FAT32
D. ext4
Answer: D
QUESTION NO: 115 Which of the following concerns does installing cross-platform software address?
A. Subscription
B. Licensing
C. Product key
D. Compatibility
Answer: D
QUESTION NO: 116 Which of the following requires the MOST frequent updating to remain effective?
A. Antivirus
B. Host firewall
C. Web browser 60
D. Device drivers
Answer: A
QUESTION NO: 117 Which of the following BEST explains the use of float over integer to store monetary values?
A. It accepts negative values.
B. It stores symbols
C. It accommodates larger values.
D. It supports decimals.
Answer: D
QUESTION NO: 118 An IP address is 32 bits long. If converted to bytes, it would be:
A. 4 bytes
B. 8 bytes
C. 16 bytes
D. 64 bytes 61
Answer: A
QUESTION NO: 119 Which of the following BEST describes the purpose of a vector in programming?
A. Storing a collection of data
B. Repeating a similar operation
C. Capturing user input
D. Performing mathematical calculations
Answer: A
QUESTION NO: 120 Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
A. Open
B. WEP
C. WPA
D. WPA2
Answer: A
QUESTION NO: 121 Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
A. Text file on a shared drive
B. Managed relational database
C. Informational intranet page
D. Locally installed productivity software
Answer: B
QUESTION NO: 122 A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
A. One-tier
B. Two-tier
C. Three-tier
D. n-tier
Answer: A
QUESTION NO: 123 A global variable called “age” will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
A. Integer
B. Float
C. Double
D. String
Answer: A
QUESTION NO: 124 Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
A. Data capture and collections
B. Asset inventory inputs
C. Sales statistics
D. Average loss output
Answer: A
QUESTION NO: 125 A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
A. Local application
B. Intranet application
C. Extranet application
D. Internet application
Answer: B
QUESTION NO: 126 A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
A. Printer
B. Mouse
C. Webcam
D. External hard drive
E. Speakers
F. Display
Answer: B,F
QUESTION NO: 127 A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
A. POP3
B. IMAP
C. ICMP
D. SMTP
Answer: A
QUESTION NO: 128 Consider the following statements:
Given the input (userin) of “analyst”, to which of the following would the clearance variable be set?
A. top secret
B. normal
C. analyst
D. restricted
Answer: D
QUESTION NO: 129 Which of the following is a reason why complex passwords are required?
A. To encourage password variety
B. To prevent someone from guessing them
C. To make them harder to remember
D. To reduce social engineering attacks
Answer: B
QUESTION NO: 130 A technician is troubleshooting an error message and tests the same program on a separate, identical machine. Which of the following troubleshooting methodology steps is this an example of?
A. Duplicate the problem
B. Gather information
C. Question users
D. Divide and conquer
Answer: A
QUESTION NO: 131 Which of the following storage types is MOST vulnerable to magnetic damage?
A. Flash
B. SSD
C. Optical
D. HDD
Answer: D
QUESTION NO: 132 When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
A. Method
B. Object
C. Property
D. Attribute
Answer: D
QUESTION NO: 133 Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
A. The light switches do not support WPA2.
B. The router is operating on a different channel.
C. The key does not meet password complexity requirements.
D. 69 The SSID is not being broadcast.
Answer: B
QUESTION NO: 134 Given the following pseudocode: If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
For each apple in the basket, eat two oranges unless
it is the last apple, then eat three oranges
A. 10
B. 14
C. 15
D. 17
Answer: C
QUESTION NO: 135 Which of the following are the primary functions of an operating system? (Choose two.)
A. Provide structure for file and data management.
B. Provide protection against malware and viruses.
C. Provide peer-to-peer networking capability.
D. Provide user data encryption.
E. Provide virtual desktop capability.
F. Provide system resources.
Answer: A,F
QUESTION NO: 136 SQL databases use primary and foreign keys to enable which of the following?
A. Rows
B. Fields
C. Schemas
D. Relationships
Answer: D
QUESTION NO: 137 Which of the following is a logical structure for storing files?
A. Folder
B. Extension
C. Permissions
D. Shortcut
Answer: A
QUESTION NO: 138 Which of the following is both an input and output device?
A. Microphone
B. Speaker
C. Touch-screen monitor
D. Keyboard
Answer: A
QUESTION NO: 139 A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?
A. 72 Determine if anything has changed.
B. Document lessons learned.
C. Establish a theory of probable cause.
D. Duplicate the problem, if possible.
Answer: B
QUESTION NO: 140 A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
A. Password history
B. Password reuse
C. Password expiration
D. Password age
Answer: C
QUESTION NO: 141 A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
A. Backups
B. Prioritization
C. Indexes
D. Failover
Answer: D
QUESTION NO: 142 A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
A. Checking the proxy settings
B. Checking that caching is enabled
C. Checking browser add-ons
D. Checking certificate validity
Answer: D
QUESTION NO: 143 A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
A. Antivirus
B. Anti-malware
C. Device Manager
D. Host firewall
Answer: D
QUESTION NO: 144 Which of the following contains exactly four copper wires?
A. RJ45
B. VGA
C. RJ11
D. USB
Answer: C
QUESTION NO: 145 A technician replaces the video card in a user’s PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
A. Replace the user’s display.
B. Update the PC’s operating system.
C. Replace the video cable.
D. Install new video drivers.
Answer: D
QUESTION NO: 146 All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
A. Server
B. Tape library
C. External HDD
D. Workstation
Answer: A
QUESTION NO: 147 Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?
A. Behavior security
B. Information Identity Management
C. Unauthorized hacking
D. Authorized hacking
Answer: A
QUESTION NO: 148 A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?
A. Input validation
B. System updates
C. Password lockout
D. Login auditing
Answer: C
QUESTION NO: 149 Which of the following is the number of bytes that is in 2KB?
A. 77 1024
B. 2048
C. 20000
D. 1048576
Answer: B
QUESTION NO: 150 A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?
A. Change the SSID.
B. Change the default password.
C. Change to WEP security.
D. Create a guest network.
Answer: D