Practice Free FC0-U61 Exam Online Questions
A company will begin to allow staff to work from home by means of formal request.
Which of the following is the BEST way for the company to document this change?
- A . Written procedure
- B . Written policy
- C . Written email
- D . Written memo
B
Explanation:
A written policy is the best way for a company to document a change that allows staff to work from home by means of formal request. A policy is a statement or guideline that defines the rules, standards, or procedures for an organization’s actions, decisions, or behaviors. A policy can help an organization to achieve its objectives, comply with regulations, ensure consistency and quality, and communicate expectations and responsibilities. A written policy is a policy that is documented in a formal document that can be distributed, reviewed, updated, and enforced by the organization. A written policy can help a company to document a change that affects its staff, such as working from home, by specifying the criteria, process, benefits, limitations, and consequences of the change.
Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 210.
Which of the following notational systems uses the most characters to represent the decimal number 10?
- A . Octal
- B . Hexadecimal
- C . Decimal
- D . Binary
D
Explanation:
A notational system is a way of writing numbers using symbols or digits. The base or radix of a notational system is the number of symbols or digits it uses to represent numbers. For example, the decimal system uses 10 symbols (0 to 9) and has a base of 10. The octal system uses 8 symbols (0 to
7) and has a base of 8. The hexadecimal system uses 16 symbols (0 to 9 and A to F) and has a base of 16. The binary system uses 2 symbols (0 and 1) and has a base of 2.
To represent the decimal number 10 in different notational systems, we need to convert it to the corresponding base. This can be done by dividing the number by the base repeatedly and writing the remainders in reverse order. For example:
To convert 10 to octal, we divide 10 by 8 and get a quotient of 1 and a remainder of 2. Then we divide 1 by 8 and get a quotient of 0 and a remainder of 1. The remainders in reverse order are 12, so 10 in octal is 12.
To convert 10 to hexadecimal, we divide 10 by 16 and get a quotient of 0 and a remainder of 10. The remainder is 10, which is represented by the symbol A in hexadecimal, so 10 in hexadecimal is A.
To convert 10 to binary, we divide 10 by 2 and get a quotient of 5 and a remainder of 0. Then we divide 5 by 2 and get a quotient of 2 and a remainder of 1. Then we divide 2 by 2 and get a quotient of 1 and a remainder of 0. Then we divide 1 by 2 and get a quotient of 0 and a remainder of 1. The remainders in reverse order are 1010, so 10 in binary is 1010.
The notational system that uses the most characters to represent the decimal number 10 is the binary system, which uses 4 characters (1010). The octal system uses 2 characters (12), the hexadecimal system uses 1 character (A), and the decimal system uses 2 characters (10).
Reference: CompTIA IT Fundamentals (ITF+) Certification Guide, pages 216-217. Numeral Systems:
Binary, Decimal, Conversion | StudySmarter.
A user works at a health insurance company.
Which of the following is the best method for ensuring a customer’s personal information is kept confidential when it needs to be shared with another authorized employee?
- A . Sending it as an encrypted email to the other employee
- B . Putting it in a shared drive on the company’s network
- C . Printing it out and giving it to the employee
- D . Putting it on the company’s cloud document site
A
Explanation:
The best method for ensuring a customer’s personal information is kept confidential is to send it as an encrypted email. Encryption ensures that the data is securely transmitted and only accessible by the intended recipient. This is crucial in industries such as health insurance, where protecting sensitive personal information is a legal requirement under regulations like HIPAA (Health Insurance Portability and Accountability Act).
B. Putting it in a shared drive may expose the information to unauthorized access if permissions are not properly managed.
C. Printing it out introduces the risk of physical security breaches or loss of paper documents. D. Putting it on a cloud document site could be secure but only if encryption and access control mechanisms are strictly enforced, which is not guaranteed in all cases.
Reference: CompTIA Security+ Certification Guide
HIPAA Compliance Guidelines for IT Professionals
On which of the following distinct numbers of digits is the hexadecimal numbering system based?
- A . 2
- B . 8
- C . 10
- D . 16
Which of the following file extensions is used for a consolidated group of files?
- A . .bat
- B . .avi
- C . .rar
- D . .rtf
C
Explanation:
A file extension is a suffix that indicates the type, format, or content of a file. Different file extensions are associated with different applications, programs, or functions. For example, .bat is a file extension for a batch file, which is a script that contains a series of commands to be executed by the command-line interpreter. .avi is a file extension for an audio video interleave file, which is a multimedia container format that stores video and audio data. .rtf is a file extension for a rich text format file, which is a document format that supports text formatting, such as fonts, colors, and styles.
A consolidated group of files is a collection of files that are compressed or archived into a single file, usually to reduce the file size, save disk space, or facilitate file transfer. A consolidated group of files can be created or extracted by using a compression or archiving software, such as WinRAR, 7-Zip, or WinZip. One of the most common file extensions for a consolidated group of files is .rar, which stands for Roshal Archive. .rar is a proprietary file format that supports data compression, error recovery, encryption, and splitting. For example, in the following image1, a folder named Documents contains four files: resume.docx, report.pdf, budget.xlsx, and presentation.pptx. The folder is compressed into a single file named Documents.rar, which has a smaller file size and can be easily attached to an email or uploaded to a cloud storage.
Therefore, the correct answer is C. .rar, as it is the file extension that is used for a consolidated group of files.
Reference: CompTIA IT Fundamentals+ (ITF+) Certification Exam Objectives, page 15, section 3.5
CompTIA IT Fundamentals+ (ITF+) Study Guide, page 191, section 7.4
CompTIA IT Fundamentals+ (ITF+) All-in-One Exam Guide, Second Edition, page 287, chapter 8
Using File Systems | CompTIA IT Fundamentals+ (FC0-U61) | Part 25 of 38
A developer is writing a script to calculate a bank account balance within two decimal places.
Which of the following data types should the developer select to store the balance?
- A . Boolean
- B . Integer
- C . Float
- D . Char
C
Explanation:
A float is a data type that can store decimal numbers, such as 3.14 or 0.01. This is suitable for calculating a bank account balance within two decimal places, as it can represent fractions of a dollar. A boolean is a data type that can only store true or false values, which is not useful for numerical calculations. An integer is a data type that can store whole numbers, such as 1 or 100, but not decimals. A char is a data type that can store a single character, such as ‘a’ or ‘9’, but not multiple characters or decimals.
Reference: CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61,
Second Edition, Chapter 4: Software Development Concepts, page 1371
Which of the following are the primary functions of an operating system? (Choose two.)
- A . Provide structure for file and data management.
- B . Provide protection against malware and viruses.
- C . Provide peer-to-peer networking capability.
- D . Provide user data encryption.
- E . Provide virtual desktop capability.
- F . Provide system resources.
AF
Explanation:
Providing structure for file and data management and providing system resources are the primary functions of an operating system. An operating system is a type of software that manages the hardware and software resources of a computer or device. Providing structure for file and data management is a function of an operating system that allows users to organize, store, access, and modify files and data on a storage device. Providing system resources is a function of an operating system that allows users to run multiple applications or processes at the same time by allocating memory, CPU, disk space, network bandwidth, etc. Providing protection against malware and viruses, providing peer-to-peer networking capability, providing user data encryption, and providing virtual desktop capability are not primary functions of an operating system. These are functions that can be performed by other types of software or hardware devices.
Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 3: Computing Components, page 127.
Which file system is primarily used in Linux installations?
- A . NTFS
- B . FAT32
- C . exFAT
- D . ext4
Which of the following best practices can be used to mitigate password reuse?
- A . Password length
- B . Password complexity
- C . Password reset
- D . Password history
D
Explanation:
Password history is a best practice that helps mitigate password reuse by preventing users from reusing previous passwords. This policy ensures that users must choose new, unique passwords after each reset, enhancing security by reducing the risk of password recycling.
Which of the following would a company consider an asset?
- A . An external company used to destroy defective hard drives
- B . Information residing on backup tapes
- C . A company-sponsored technology conference
- D . A certified third-party vendor that provides critical components
B
Explanation:
Information residing on backup tapes is an example of an asset that a company would consider valuable or important. An asset is any resource or item that has value or benefit for an organization, such as hardware, software, data, personnel, etc. An asset can be tangible or intangible, physical or digital, owned or leased, etc. Information residing on backup tapes is an asset because it contains data that may be critical or essential for the organization’s operations, functions, or goals. Information residing on backup tapes may also contain sensitive or confidential data that needs to be protected from loss, damage, theft, or unauthorized access.
Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 204.