Practice Free FC0-U61 Exam Online Questions
A technician has verified full system functionality.
Which of the following actions should the technician take next?
- A . Question the users.
- B . Determine if anything has changed.
- C . Document the findings.
- D . Gather Information.
C
Explanation:
Documenting the findings is the last step in the troubleshooting process, after verifying full system functionality. Documenting the findings helps to create a record of the problem and the solution, which can be useful for future reference or training purposes. Questioning the users, determining if anything has changed, and gathering information are steps that precede verifying full system functionality in the troubleshooting process.
Reference: The Official CompTIA IT Fundamentals (ITF+) Student Guide (Exam FC0-U61), Chapter 2: IT Concepts and Terminology1
A hacker was able to obtain a user’s password for email, social media, and bank accounts.
Which of the following should the user do to prevent this type of attack in the future?
- A . Delete the tracking cookies.
- B . Avoid password reuse.
- C . Use a complex password.
- D . Clear the browser cache.
B
Explanation:
Password reuse is a common practice that makes users vulnerable to credential stuffing attacks, where hackers use stolen passwords from one site to access other accounts of the same user. This can lead to identity theft, financial loss, and privacy breaches. To prevent this type of attack in the future, the user should avoid password reuse and create unique and strong passwords for each account. The user should also use a password manager to store and generate passwords securely, and enable multi-factor authentication whenever possible.
Reference: Chapter 32 Explain Password Best Practices – CompTIA IT Fundamentals+ FC0-U61 Cert Guide
Cybersecurity and End User Passwords | Cybersecurity | CompTIA
Managing Password Policies C CompTIA Security+ SY0-401: 5.3
CompTIA IT Fundamentals+ Certification Exam Test Questions With Answers …
Which of the following is an example of multifactor authentication?
- A . Password and passphrase
- B . Fingerprint and retina scan
- C . Hardware token and smartphone
- D . Smart card and PIN
D
Explanation:
Smart card and PIN are the examples of multifactor authentication. Multifactor authentication is a security method that requires two or more factors or pieces of evidence to verify the identity of a user or device. The factors are usually classified into three categories: something you know (such as a password or PIN), something you have (such as a smart card or token), or something you are (such as a fingerprint or retina scan). Multifactor authentication provides stronger security than single-factor authentication because it reduces the risk of compromise if one factor is lost or stolen.
Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 207.
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure.
Which of the following Internet service types should MOST likely be used?
- A . Fiber
- B . DSL
- C . Cable
- D . Satellite
D
Explanation:
Satellite would be the best choice for Internet service for a home in a remote location that has no connectivity to existing infrastructure. Satellite Internet service uses satellites in orbit to provide wireless Internet access to users who have a satellite dish installed at their location. Satellite Internet service can cover areas where other types of Internet service are not available or reliable, such as rural or remote locations. Satellite Internet service can offer high-speed broadband connections, but it may also have drawbacks such as high latency, weather interference, and data caps.
Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 168.
Which of the following is the BEST option for a developer to use when storing the months of a year and when
performance is a key consideration?
- A . Array
- B . Vector
- C . List
- D . String
A
Explanation:
An array is a type of data structure that stores multiple values of the same data type in a fixed-size sequence. An array would be the best option for a developer to use when storing the months of a year and when performance is a key consideration because an array allows fast access to any element by using its index number. A vector, a list, and a string are not types of data structures that offer fast access to elements or store multiple values of the same data type in a fixed-size sequence.
Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 4: Programming Concepts and Data Structures, page 147.
Which of the following BEST describes the physical location of the data in the database?
- A . Table
- B . Column
- C . RAM
- D . HDD
D
Explanation:
HDD (Hard Disk Drive) is a type of storage device that uses magnetic disks to store data permanently. The physical location of the data in the database is on the HDD of the server or computer that hosts the database. The data can be accessed by using logical structures such as tables, columns, rows, and queries.
Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 5:
Database Fundamentals, page 192.
A company wants an application to be accessed by concurrent users and store company information securely.
Which of the following would be the BEST option for storing the information?
- A . Word processing document
- B . Flat file
- C . Database
- D . Spreadsheet
C
Explanation:
A database is a collection of data that is organized and stored in a way that allows easy access, manipulation, and analysis. A database would be the best option for storing information for an application that needs to be accessed by concurrent users and store company information securely. A database can handle multiple user requests, enforce data integrity and security, and perform complex queries and operations on the data. A word processing document, a flat file, and a spreadsheet are not options that can support concurrent users, store company information securely, or perform complex operations on the data.
Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 5: Database Fundamentals, page 191.
Which of the following relational database constructs is used to ensure valid values are entered for a column?
- A . Schema
- B . Permissions
- C . Constraint
- D . Column
C
Explanation:
A constraint is a rule or a restriction that is applied to a column or a table in a relational database to ensure that only valid values are entered. Constraints help to maintain the integrity, accuracy, and consistency of the data. For example, a constraint can be used to specify that a column must not contain null values, or that a column must contain unique values, or that a column must match a value in another table12.
Reference: = CompTIA IT Fundamentals (ITF+) Study Guide, 2nd Edition, Chapter 5: Database Fundamentals3; Constraints in Relational Database Model – Online Tutorials Library
Given the following pseudocode:
If there are seven apples in the basket, which of the following would be the number of oranges a person eats?
- A . 10
- B . 14
- C . 15
- D . 17
C
Explanation:
The number of oranges a person eats would be 15 given the input (userin) of “analyst” and the following pseudocode:
Pseudocode is a simplified version of programming language that uses plain English words and symbols to describe the logic and steps of an algorithm or a program. Pseudocode can be used to plan, design, or test a program before writing it in an actual programming language. To find the number of oranges a person eats given the input (userin) of “analyst”, we need to follow the pseudocode line by line and evaluate the expressions or statements based on the input value.
Line 1: Declare userin as string
This line declares userin as a string variable, which means it can store text or characters.
Line 2: Declare oranges as integer
This line declares oranges as an integer variable, which means it can store whole numbers.
Line 3: Declare apples as integer
This line declares apples as an integer variable, which means it can store whole numbers.
Line 4: Set apples = 7
This line assigns the value of 7 to apples.
Line 5: Set oranges = 10
This line assigns the value of 10 to oranges.
Line 6: Input userin
This line asks for user input and assigns it to userin.
Line 7: If userin = “analyst” then
This line checks if userin is equal to “analyst”. Since we are given that userin is “analyst”, this condition is true and we proceed to execute the next line.
Line 8: Set oranges = oranges + apples
This line adds the value of oranges and apples and assigns it back to oranges. Since oranges is 10 and apples is 7, this line sets oranges to 17.
Line 9: End if
This line marks the end of the if statement.
Line 10: If userin = “manager” then
This line checks if userin is equal to “manager”. Since we are given that userin is “analyst”, this condition is false and we skip the next line.
Line 11: Set oranges = oranges – apples
This line subtracts the value of apples from oranges and assigns it back to oranges. Since this line is skipped, oranges remains 17.
Line 12: End if
This line marks the end of the if statement.
Line 13: Set oranges = oranges – 2
This line subtracts 2 from oranges and assigns it back to oranges. Since oranges is 17, this line sets oranges to 15.
Line 14: Output oranges
This line displays the value of oranges, which is 15.
Therefore, the number of oranges a person eats would be 15 given the input (userin) of “analyst” and the following pseudocode.
Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 4: Programming Concepts and Data Structures, page 142.
The finance department needs software that includes depreciation functionality for asset management.
Which of the following types of software would best accomplish this goal?
- A . Database
- B . Accounting
- C . Project management
- D . Spreadsheet
B
Explanation:
Accounting software is specifically designed to manage financial transactions, including asset management functionalities such as calculating depreciation. This type of software supports various accounting processes, making it the most suitable choice for a finance department that needs to handle depreciation among other financial tasks.
Reference: CompTIA IT Fundamentals resources often explore different types of software applications used in business environments, including the specific uses of accounting software in managing financial operations.