Practice Free FC0-U61 Exam Online Questions
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).
- A . Windows 7
- B . Windows 8
- C . UNIX
- D . Windows Server 2012
- E . Android
- F . Linux
C, F
Explanation:
UNIX and Linux are the examples of operating systems that do not require extensions on files to execute a program. UNIX and Linux are operating systems that are based on the same kernel and share many features and commands. UNIX and Linux do not rely on file extensions to determine the file type or function. Instead, they use file permissions and attributes to indicate whether a file is executable or not. File extensions are optional and mainly used for human readability or compatibility with other systems.
Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 86.
Which of the following is required for a cloud network?
- A . Local applications
- B . Credentials
- C . Internet access
- D . Network infrastructure
C
Explanation:
For a cloud network to function, internet access is essential. This connectivity allows users and devices to access cloud services and resources hosted remotely. Without internet access, the interaction with cloud-based applications and data storage would be impossible, making it a fundamental requirement for utilizing cloud services.
Reference: CompTIA IT Fundamentals documentation frequently underscores the importance of internet connectivity in the context of cloud computing, detailing how it enables access to remote services and resources integral to cloud networks.
A user is trying to set up a new wireless access point.
Which of the following should the user do first?
- A . Change the SSID to a unique name.
- B . Change the default password.
- C . Enable WPA2 encryption.
- D . Enable the highest available wireless standard.
B
Explanation:
A wireless access point (WAP) is a device that allows wireless devices to connect to a wired network using Wi-Fi or Bluetooth. A WAP usually has a default configuration that is set by the manufacturer, which may include a default password, SSID (service set identifier), encryption type, and wireless standard. The default password is often weak or well-known, which makes the WAP vulnerable to unauthorized access or hacking. Therefore, the first thing that a user should do when setting up a new WAP is to change the default password to a strong and unique one. This will help secure the WAP and prevent unwanted changes or attacks. Changing the SSID to a unique name, enabling WPA2 encryption, and enabling the highest available wireless standard are also important steps to improve the security and performance of the WAP, but they should be done after changing the default password.
A company purchased a software program. The EULA states that the software can be installed on as many computers as the company wants, but only four users can be using the software at any point in time.
Which of the following types of licenses is this an example of?
- A . Group license
- B . Concurrent license
- C . Subscription license
- D . Open-source license
B
Explanation:
: A concurrent license is a type of software license that allows a software program to be installed on as many computers as the company wants, but only a limited number of users can use the software at the same time. A concurrent license is based on the number of simultaneous users rather than the number of installations. A concurrent license can help a company save money and resources by sharing the software among multiple users who do not need to use the software all the time.
Reference: The Official CompTIA IT Fundamentals (ITF+) Study Guide (FC0-U61), page 211.
A network administrator wants to keep track of all system messages and alerts.
Which of the following would best allow for the administrator to follow trends?
- A . Logs
- B . Scheduled tasks
- C . Systems management console
- D . Systems notification tool
A
Explanation:
To track system messages and alerts effectively and observe trends over time, the best tool to use are system logs. Logs record events and data during the operation of a system or software application, allowing a network administrator to review historical data, spot patterns, or identify recurrent issues. This is essential for troubleshooting, auditing, and maintaining the overall health of the IT infrastructure.
Reference: The importance of using logs for monitoring and tracking system activities is covered under the "Networking and Connectivity" section of CompTIA IT Fundamentals, as well as various sections discussing system maintenance and troubleshooting across CompTIA certification study materials.
A company allows employees to use their own devices for work.
Which of the following is the best security method for such devices?
- A . Update the device software.
- B . Enable passwords.
- C . Enable host IDS.
- D . Remove browser cookies.
A
Explanation:
The best security method for employees who use their own devices for work is to keep the device software updated. Regular software updates include security patches that address vulnerabilities, reducing the risk of exploits. This preventative measure is crucial for maintaining the security integrity of not only the individual devices but also the corporate network they connect to.
Reference: Mobile and device security, including the importance of software updates, is covered in CompTIA IT Fundamentals, highlighting the best practices for securing devices used in a corporate environment.
A systems administrator is setting up a new server using RAID technology. If one hard drive in the array fails, the data is stored on another drive, preventing data loss.
Which of the following business continuity concepts does this explain?
- A . File backup
- B . Data restoration
- C . Fault tolerance
- D . Restoring access
C
Explanation:
Fault tolerance is the ability of a system to continue functioning even when one or more components fail. RAID (Redundant Array of Independent Disks) is a technology that uses multiple hard drives to store data in a way that improves performance and reliability. If one hard drive in the RAID array fails, the data can be recovered from another drive without losing any information. This is an example of fault tolerance.
Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 6:
Infrastructure Concepts, page 240.
When transferring a file across the network, which of the following would be the FASTEST transfer rate?
- A . 1001Kbps
- B . 110Mbps
- C . 1.22Gbps
- D . 123Mbps
C
Explanation:
Which of the following is both an input and output device?
- A . Microphone
- B . Speaker
- C . Touch-screen monitor
- D . Keyboard
C
Explanation:
A touch-screen monitor is a device that can function as both an input and output device. An input device is a device that allows users to enter data or commands into a computer or system. An output device is a device that displays or produces data or information from a computer or system. A touch-screen monitor can function as an input device by detecting the touch or gesture of the user on the screen and sending the corresponding signal to the computer or system. A touch-screen monitor can also function as an output device by showing visual information on the screen. A microphone, a speaker, and a keyboard are not devices that can function as both an input and output device. A microphone is an input device that allows users to record sound or voice into a computer or system. A speaker is an output device that plays sound or voice from a computer or system. A keyboard is an input device that allows users to type text or characters into a computer or system.
Reference: CompTIA IT Fundamentals+ Study Guide: Exam FC0-U61, Second Edition, Chapter 3: Computing Components, page 106.
A Chief Executive Officer (CEO) wants to have the ability to log on to all applications upon arrival at the office. The CEO would like to have the ability to provide credentials only once.
Which of the following is best for this requirement?
- A . SSO
- B . Software token
- C . PIN
- D . Multifactor authentication