FC0-U61 Premium Bundle

FC0-U61 Premium Bundle

CompTIA IT Fundamentals+ Certification Exam Certification Exam

4.5 
(49170 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA FC0-U61 Free Practice Questions

Proper study guides for Leading CompTIA CompTIA IT Fundamentals+ Certification Exam certified begins with CompTIA FC0-U61 preparation products which designed to deliver the Exact FC0-U61 questions by making you pass the FC0-U61 test at your first time. Try the free FC0-U61 demo right now.

Free FC0-U61 Demo Online For CompTIA Certifitcation:

NEW QUESTION 1
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)

  • A. SMTP
  • B. POP3
  • C. SNMP
  • D. DHCP
  • E. ICMP
  • F. SFTP

Answer: AB

NEW QUESTION 2
Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program’s run. Which of the following would Joe MOST likely use to accomplish this?

  • A. Loop
  • B. Variable
  • C. Constant
  • D. Function

Answer: B

NEW QUESTION 3
For which of the following is a relational database management system MOST commonly used?

  • A. Building flowcharts
  • B. Storing information
  • C. Generating reports
  • D. Creating diagrams

Answer: B

NEW QUESTION 4
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

  • A. Password reuse
  • B. Snooping
  • C. Social engineering
  • D. Phishing

Answer: A

NEW QUESTION 5
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

  • A. a storage area network.
  • B. an embedded OS.
  • C. network attached storage.
  • D. a Type 1 hypervisor.

Answer: D

NEW QUESTION 6
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

  • A. redundancy.
  • B. replication.
  • C. prioritization.
  • D. fault tolerance.

Answer: C

NEW QUESTION 7
A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?

  • A. SELECT
  • B. INSERT
  • C. DELETE
  • D. UPDATE

Answer: A

NEW QUESTION 8
A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

  • A. Permission
  • B. Ink cartridge
  • C. USB cable
  • D. Driver

Answer: D

NEW QUESTION 9
Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

  • A. The power interruption caused the camera to malfunction.
  • B. Ann has a compatibility problem with the camera.
  • C. A firmware update needs to be applied to the camera.
  • D. Ann’s Internet connection and wireless router are still down.

Answer: D

NEW QUESTION 10
Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

  • A. Infrared
  • B. NFC
  • C. Bluetooth
  • D. WiFi

Answer: B

NEW QUESTION 11
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

  • A. Ensure both devices are connected to the LAN.
  • B. Enable task scheduling.
  • C. Reset the proxy settings to their default values.
  • D. Review the fault tolerance configurations.

Answer: A

NEW QUESTION 12
The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

  • A. Update from 802.11b to 802.11g.
  • B. Ensure sources of EMI are removed.
  • C. Enable WPA2-Enterprise.
  • D. Use WiFi Protected Setup.

Answer: B

NEW QUESTION 13
Which of the following relational database constructs is used to ensure valid values are entered for a column?

  • A. Schema
  • B. Permissions
  • C. Constraint
  • D. Column

Answer: C

NEW QUESTION 14
An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

  • A. Data correlation
  • B. Data manipulation
  • C. Data gathering
  • D. Data definition

Answer: D

NEW QUESTION 15
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

  • A. Flat file
  • B. Memory
  • C. Relational database
  • D. Solid state drive

Answer: A

NEW QUESTION 16
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

  • A. Turn on private browsing
  • B. Delete browsing history on program close.
  • C. Notify when downloads are complete.
  • D. Configure prompting before downloading content.

Answer: D

NEW QUESTION 17
A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

  • A. 127.0.0.1
  • B. 172.16.2.189
  • C. 192.168.257.1
  • D. 255.255.255.0

Answer: B

NEW QUESTION 18
Which of the following is primarily a confidentiality concern?

  • A. Eavesdropping
  • B. Impersonating
  • C. Destructing
  • D. Altering

Answer: A

NEW QUESTION 19
Which of the following would be used to send messages using the SMTP protocol?

  • A. Document sharing software
  • B. Instant messaging software
  • C. Conferencing software
  • D. Email software

Answer: D

NEW QUESTION 20
A function is BEST used for enabling programs to:

  • A. hold a list of numbers.
  • B. be divided into reusable components.
  • C. define needed constant values.
  • D. define variables to hold different values.

Answer: D

NEW QUESTION 21
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

  • A. UPDATE
  • B. DELETE
  • C. ALTER
  • D. DROP

Answer: D

NEW QUESTION 22
Which of the following security concerns is a threat to confidentiality?

  • A. Replay attack
  • B. Denial of service
  • C. Service outage
  • D. Dumpster diving

Answer: A

NEW QUESTION 23
A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

  • A. Optical drive
  • B. Hard disk drive
  • C. Solid state drive
  • D. Flash drive

Answer: A

NEW QUESTION 24
Which of the following BEST describes the practice of providing user credentials when logging onto the network?

  • A. Output
  • B. Storage
  • C. Input
  • D. Processing

Answer: C

NEW QUESTION 25
......

Thanks for reading the newest FC0-U61 exam dumps! We recommend you to try the PREMIUM Certleader FC0-U61 dumps in VCE and PDF here: https://www.certleader.com/FC0-U61-dumps.html (75 Q&As Dumps)


START FC0-U61 EXAM