Practice Free FC0-U61 Exam Online Questions
A technician is troubleshooting a problem. The technician tests the theory and determines the theory is
confirmed.
Which of the following should be the technician’s NEXT step?
- A . Implement the solution.
- B . Document lessons learned.
- C . Establish a plan of action.
- D . Verify full system functionality.
C
Explanation:
The technician’s next step after testing the theory and determining the theory is confirmed is to establish a plan of action to resolve the problem and identify potential effects. This step involves preparing a specific method to implement the solution and considering how the solution might affect other components or users. The technician should also test the plan in an isolated environment before applying it to the actual system.
Implementing the solution is not the next step after testing the theory and determining the theory is confirmed, as it requires establishing a plan of action first. Documenting lessons learned is not the next step after testing the theory and determining the theory is confirmed, as it comes after verifying full system functionality and implementing preventive measures. Verifying full system functionality is not the next step after testing the theory and determining the theory is confirmed, as it comes after implementing the solution.
A user has an HDD that is almost at full capacity.
Which of the following operating system features should be used to free up some space without deleting any files?
- A . Compression
- B . Encryption
- C . Journaling
- D . Formatting
A
Explanation:
To free up space on an HDD without deleting files, using the operating system’s compression feature is the best approach. Compression reduces the size of files on the disk by using algorithms to minimize the space they take up, thus freeing up storage capacity while keeping the files accessible.
Reference: File system management, including the use of compression to optimize storage, is a topic discussed in the CompTIA IT Fundamentals, which also covers system utilities and management practices.
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
- A . Host-based firewall
- B . Strong administrator password
- C . Anti-malware software
- D . Full disk encryption
D
Explanation:
Full disk encryption would be the best way to keep the data on a laptop safe if the laptop is lost or stolen. Full disk encryption is a security technique that encrypts all the data on a hard drive, including the operating system, applications, and files. Full disk encryption prevents unauthorized access to the data without the correct password or key. Full disk encryption can protect the data on a laptop even if the laptop is physically removed or tampered with.
Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 203.
An attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information.
Which of the following best describes this scenario?
- A . Phishing attack
- B . Social engineering
- C . On-path attack
- D . Eavesdropping
B
Explanation:
The scenario where an attacker is using subversive tactics to gain the trust of a target in order to obtain entry to a location or access to confidential information is best described as social engineering. Social engineering is a type of attack that exploits human psychology and behavior to manipulate people into performing actions or revealing information that benefits the attacker. Social engineering can take various forms, such as phishing, vishing, baiting, quid pro quo, pretexting, or tailgating. Phishing attack is a type of social engineering attack that involves sending fraudulent emails or messages that appear to come from legitimate sources to trick recipients into clicking on malicious links or attachments, or providing personal or financial information. On-path attack is a type of network attack that involves intercepting or modifying data packets that are transmitted between two parties on a network. Eavesdropping is a type of network attack that involves listening to or capturing data packets that are transmitted between two parties on a network.
Reference: The Official CompTIA IT Fundamentals (ITF+) Student Guide (Exam FC0-U61), Chapter 7: Security Concepts1
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems.
Which of the following types of Internet service connections would BEST meet the user’s needs?
- A . T1 line
- B . Satellite
- C . Fiber optic
- D . DSL
C
Explanation:
Fiber optic is a type of Internet service connection that uses thin strands of glass or plastic to transmit data using light signals. Fiber optic offers high bandwidth, speed, and reliability compared to other types of Internet service connections. T1 line, satellite, and DSL are not types of Internet service connections that offer significant bandwidth for remote users.
Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 6: Infrastructure Concepts, page 229.
Which of the following allows wireless devices to communicate to a wired network?
- A . Modem
- B . Switch
- C . Firewall
- D . Access point
D
Explanation:
An access point is a device that allows wireless devices to communicate to a wired network. An access point acts as a bridge between the wireless and wired networks, converting radio signals from wireless devices into data packets that can be transmitted over the network cable. An access point can also extend the range and coverage of a wireless network3.
Reference: = CompTIA IT Fundamentals (ITF+) Study Guide, 2nd Edition, Chapter 4: Networking Concepts2
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band.
Which of the following should the technician select?
- A . 802.11a
- B . 802.11b
- C . 802.11g
- D . 802.11n
B
Explanation:
A network administrator requires that a non-magnetic drive be used to store critical data for a project. The project is expected to last a few years.
Which of the following would the administrator most likely choose for the project?
- A . USB flash drive
- B . Solid-state drive
- C . Tape drive
- D . Hard disk
B
Explanation:
A solid-state drive (SSD) is a non-magnetic storage device that uses flash memory to store data. It is preferred in situations requiring high durability, speed, and reliability over several years. Unlike traditional hard drives, SSDs have no moving parts and are immune to magnetic fields, which makes them a better choice for long-term data storage in critical projects. SSDs also offer faster read/write speeds compared to hard drives or tape drives.
A USB flash drive is a viable non-magnetic option but typically has smaller storage capacities and less durability for long-term projects.
Tape drives are magnetic and used mainly for archival storage, not frequent access.
Hard disks are magnetic and susceptible to physical damage and slower performance over time.
Reference: CompTIA A+ Core 1 (220-1001) Exam Objectives
Official CompTIA IT Fundamentals (ITF+) Certification Training
Which of the following computer components allows for communication over a computer network?
- A . RAM
- B . NIC
- C . CPU
- D . NAS
B
Explanation:
A NIC (network interface card) is the computer component that allows for communication over a computer network. A NIC is a hardware device that connects a computer to a network cable or a wireless access point. A NIC enables the computer to send and receive data packets over the network using protocols such as TCP/IP (Transmission Control Protocol/Internet Protocol). A NIC has a unique identifier called a MAC (media access control) address that distinguishes it from other devices on the network.
Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 169.
A user is selecting software to visually display information in a marketing meeting.
Which of the following software types should the user select?
- A . Spreadsheet
- B . Word processing
- C . Web browsing
- D . Presentation