IT CertificationsComprehensive Study Set

B.4 Comptia It Fundamentals Fc0 U61 Certification Practice Exam

95 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

"A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function? A. Permission B. Ink cartridge C. USB cable D. Driver"

ANSWER

D. Driver

QUESTION 2

An administrator grants permission for a user to access data in a database. Which of the following actions was performed? A. Data correlation B. Data manipulation C. Data gathering D. Data definition

ANSWER

D. Data definition

QUESTION 3

A user connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local pages. Which of the following actions would MOST likely fix the problem? A. Renew the IP address. B. Configure the browser proxy settings. C. Clear the browser cache. D. Disable the pop-up blocker

ANSWER

B. Configure the browser proxy settings

QUESTION 4

Ann is experiencing difficulty getting her IP-based security camera to function at her house after a rainstorm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem? A. The power interruption caused the camera to malfunction. B. Ann has a compatibility problem with the camera. C. A firmware update needs to be applied to the camera. D. Ann's Internet connection and wireless router are still down.

ANSWER

D. Ann's Internet connection and wireless router are still down.

QUESTION 5

The president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used? A. Fiber B. DSLC. Cable D. Satellite

ANSWER

D. Satellite

QUESTION 6

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength? A. Update from 802.11b to 802.11g B. Ensure sources of EMI are removed. C. Enable WPA-2-Enterprise D. Use WiFi Protected Setup

ANSWER

B. Ensure sources of EMI are removed

QUESTION 7

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task? A. Optical Drive B. Hard disk Drive C. Solid state drive D. Flash drive

ANSWER

A. Optical Drive

QUESTION 8

A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data? A. Flatfile B. Word processor C. Database D. Network share

ANSWER

C. Database

QUESTION 9

A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data? A. UPDATE B. DELETE C. ALTER D. DROP

ANSWER

D. DROP

QUESTION 10

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed? A. Algorithm B. Software C. Pseudocode D. Flowchart

ANSWER

A. Algorithm

QUESTION 11

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use? A. Standalone application B. Client-server applicationC. Web application D. Cloud application

ANSWER

B. Client-server application

QUESTION 12

An end user's computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step? A. Restart the computer B. Contact other users C. Disconnect the peripherals D. Document the findings

ANSWER

D. Document the findings.

QUESTION 13

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of: A. redundancy. B. replication. C. prioritization. D. fault tolerance.

ANSWER

C. Prioritization

QUESTION 14

For which of the following is a relational database management system MOST commonly used? A. Building Flowcharts B. Storing information C. Generating reports D. Creating diagrams

ANSWER

B. Storing information

QUESTION 15

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy? A. Laptop B. Server C. Game console D. Workstation

ANSWER

B. Server

QUESTION 16

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issues before. Which of the following should the technician do first? A. Check Knowledge Base B. Search Local Logs C. Research possible theories D. Question Users

ANSWER

A. Check Knowledge Base

QUESTION 17

If you use an open network, what email configuration setting should you ensure is enabled? A. Enable anti-malware software to protect from viruses B. Enable secure sockets layer/Transport layer security (SSL/TLS) encryption to protect the account password. C. Disable active content types such as Flash and Java to protect the web browser D. Enable a script blocker to prevent scripts from running

ANSWER

B. Enable secure sockets layer/Transport layer security (SSL/TLS) encryption to protect the account password.

QUESTION 18

"In which of the following situations should there be come expectation of privacy? A. Posting a comment on a friend's social media page B. Submitting personal information on a school enrollment site C. Posting a comment on a video sharing site D. Sending email and pictures to a close relative"

ANSWER

B. Submitting personal information a school enrollment site

QUESTION 19

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the program's run. Which of the following would Joe MOST likely use to accomplish this? A. Loop B. Variable C. Constant D. Function

ANSWER

B. Variable

QUESTION 20

"Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed? A. Password reuse B. Snooping C. Social engineering D. Phishing"

ANSWER

A. Password reuse

QUESTION 21

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing? A. Turn on private browsing B. Delete browsing history on program close. C. Notify when downloads are complete. D. Configure prompting before downloading content.

ANSWER

D. Configure prompting before downloading content.

QUESTION 22

Mice and keyboards CANNOT connect to which types of ports? A. PS/2 Ports B. Bluetooth Interface C. Ethernet Ports D. USB Ports

ANSWER

C. Ethernet Ports

QUESTION 23

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data? A. Flatfile B. Memory C. Relational database D. Solid state drive

ANSWER

A. Flatfile

QUESTION 24

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of? A. Non-repudiation B. Authentication C. Integrity D. Accounting

ANSWER

B. Authentication

QUESTION 25

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list? A. Database software B. Word processing software C. Conferencing software D. Presentation software

ANSWER

A. Database software

QUESTION 26

A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely? A. The quality of the computer used to connect B. A security method of allowing connections C. The employees' home ISP speeds D. The geographical location of the employees

ANSWER

B. A security method of allowing connections

QUESTION 27

A software develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document? A. Patent B. Trademark C. Watermark D. Copyright

ANSWER

D. Copyright

QUESTION 28

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO). A. Patent B. Copyright C. NDA D. Trademark E. EULA

ANSWER

B. Copyright D. Trademark

QUESTION 29

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of: A. a storage area network B. an embedded OS C. Network-attached storage. D. a Type 1 hypervisor

ANSWER

D. a Type 1 hypervisor

QUESTION 30

A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use? A. SELECT B. INSERT C. DELETE D. UPDATE

ANSWER

A. SELECT

QUESTION 31

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign? A. 127.0.0.1 B. 172.16.2.189 C. 192.168.257.1 D. 255.255.255.0

ANSWER

B. 172.16.2.189

QUESTION 32

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation? A. USB B. NFC C. DSL D. DVI

ANSWER

D. DVI

QUESTION 33

A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure? A. WPA B. SSID C. WEP D. WPA2

ANSWER

D. WPA2

QUESTION 34

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step? A. Implement the solution. B. Document lessons learned. C. Establish a plan of action. D. Verify full system functionality.

ANSWER

C. Establish a plan of action

QUESTION 35

"The IT department has established a new password policy for employees. Specifically, the policy reads: Passwords must not contain common dictionary words Passwords must contain at least one special character. Passwords must be different from the last six passwords used. Passwords must use at least one capital letter or number. Which of the following practices are being employed? (Select TWO). A. Password lockout B. Password complexity C. Password expiration D. Passwords history E. Password length F. Password age"

ANSWER

B. Password Complexity D. Passwords history

QUESTION 36

True or False? Most Modern apps can run in either the modern UI or desktop

ANSWER

True

QUESTION 37

True or False? In terms of a control panel, the System and Security section has seen the most change in Windows 8 compare to Windows 7

ANSWER

True

QUESTION 38

A UPS provides protection against: A. denial of service B. replay attack. C. power outages. D. wiretapping.

ANSWER

C. Power Outages

QUESTION 39

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue? A. Ensure both devices are connected to the LAN B. Enable task scheduling C. Reset the proxy settings to their default values D. Review the fault tolerance configurations

ANSWER

A. Ensure both devices are connected to the LAN

QUESTION 40

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this? A. Encryption B. Compression C. Permissions D. Auditing

ANSWER

A. Encryption

QUESTION 41

A user is getting an error when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The Technician opens a browser locally and browse to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site? A. Establish a plan of action B. Gather information C. Duplicate the problem D. Find the root cause

ANSWER

C. Duplicate the problem

QUESTION 42

What device is used to connect computers together in an Ethernet Network? A. Access Point B. Internet Router C. A Switch D. An internet Modem

ANSWER

A. Access Point

QUESTION 43

What does a hard disk connected to a computer via a USB port describe? A. Network attached storage B. Network Printer Sharing C. Direct Attached storage D. Cloud-based storage

ANSWER

C. Direct Attached Storage

QUESTION 44

What function of an operating system is performed by the "shell"? A. Interface between the application and the hardware. B. Interface between the hardware and the firmware C. Interface between the user and the computer D. Interface between a host computer adn a guest operating system

ANSWER

C. Interface between the user and the computer

QUESTION 45

What is a Wide Area Network (WAN)? A. A network that connects sites in different geographic locations B. A network in a single location C. A company that specializes in providing Internet access D. A company that operates the national telephone networks

ANSWER

A. A network that connects sites in different geographic locations

QUESTION 46

What is the difference between DDR3 system memory compared to DDR2? A. Data is transferred three times per clock cycle rather than twice. B. The bus works at four times the speed of the memory chips rather than two times the speed. C. The bus works at three times the speed of the memory chips rather than two times the speed. D. The bus works at three times the speed of the memory chips rather than two times the speed.

ANSWER

A. Data is transferred three times per clock cycle rather than twice.

QUESTION 47

What security concern does snooping affect most directly? A. Integrity B. Availability C. Confidentiality D. Authentication

ANSWER

C. Confidentiality

QUESTION 48

What should you do before attempting to set up a new computer system? A. Verify that the computer is concealed within a desks compartment and out of sight. B. Verify that the environment is suitable and that the installation will be safe. C. Verify that the computer cables are loose and free of any bindings. D. Verify that the computer cables are loose and free of any bindings.

ANSWER

B. Verify that the environment is suitable and that the installation will be safe

QUESTION 49

What shows the structure of code without using the specific syntax of any one language? A. A Variable B. Pseudocode C. A Function D. Conditional Statement

ANSWER

B. Pseudocode

QUESTION 50

What systems use a Central Processing Unit (CPU) and memory? A. All Types of Computers B. Servers Only C. Desktops Only D. Laptops Only

ANSWER

A. All Types of Computers

QUESTION 51

What type of component provides persistent storage? A. CPU B. RAM C. GPU D. HDD or SDD

ANSWER

D. HDD or SDD

QUESTION 52

What type of gesture is typically used for zooming on a touchscreen? A. Slide B. Tap-and-Hold C. Pinch D. Swipe

ANSWER

C. Pinch

QUESTION 53

When transferring a file across the network, which of the following would be the FASTEST transfer rate? A. 1001Kbps B. 110Mbps C. 1.22Gbps D. 123Mbps

ANSWER

C. 1.22Gbps

QUESTION 54

Which notation system supports presenting the largest numbers using the fewest digits? A. Hexadecimal B. Decimal C. Binary D. Kilobyte

ANSWER

A. Hexadecimal

QUESTION 55

Which of the following actions is the FINAL step in the standard troubleshooting methodology? A. Document the solution and cause B. Create a new theory of cause. C. Research the problem online. D. Implement preventive measures.

ANSWER

A. Document the solution and cause

QUESTION 56

Which of the following allows wireless devices to communicate to a wired network? A. Modem B. Switch C. Firewall D. Access Point

ANSWER

D. Access Point

QUESTION 57

Which of the following are the basic operations? A. Input, process, output, and feedback B. Input, output, storage, and feedback C. Input, process, and output D. Input, process, output, and storage

ANSWER

D. Input, process, output, and storage

QUESTION 58

Which of the following BEST describes an application running on a typical operating system? A. Processing B. Thread C. Function D. Task

ANSWER

A. Processing

QUESTION 59

Which of the following BEST describes the practice of providing user credentials when logging onto the network? A. Output B. Storage C. Input D. Processing

ANSWER

C. Input

QUESTION 60

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN? A. Laptop B. Workstation C. Mobile Phone D. Server

ANSWER

D. Server

QUESTION 61

Which of the following configuration changes does NOT reduce the attack surface A. losing unnecessary network ports B. Configuring data backups in case ransomware encrypts the file system C. Disabling unused OS features and services D. Removing unwanted and unnecessary software

ANSWER

B. Configuring data backups in case ransomware encrypts the file system

QUESTION 62

Which of the following database concepts would MOST likely use a CVS File? A. Data querying B. Data reports C. Data importing D. Data persistence

ANSWER

B. Data reports

QUESTION 63

Which of the following data types should a developer use when creating a variable to hold a postal code? A. Integer B. String C. Float D. Boolean

ANSWER

B. String

QUESTION 64

Which of the following describes something in a database that refers to the unique identifier in the parent table? A. Attribute B. Constraint C. Foreign Key D. Schema

ANSWER

A. Attribute

QUESTION 65

Which of the following intellectual property concepts BEST represents a legally protected slogan of a business? A. Contract B. Patent C. Copyright D. Trademark

ANSWER

D. Trademark

QUESTION 66

Which of the following is an advantage of using a 64-bit operating system compared to a 32-bit operating system? A. Ability to recognize an SSD B. Ability to obtain an IPv6 address 3 C. Ability to utilize a larger amount of RAM D. Ability to add two or more drives

ANSWER

C. Ability to utilize a larger amount of RAM

QUESTION 67

Which of the following is an compiled language? A. Perl B. Jscript C. Java D. PowerShelle

ANSWER

C. Java

QUESTION 68

Which of the following is an example of multifactor authentication? A. Password and passphrase B. Fingerprint and retina scan C. Hardware token and smartphone D. Smart card and PIN

ANSWER

D. Smart card and PIN

QUESTION 69

Which of the following is a value that uniquely identifies a database record? A. Foreign key B. Public Key C. Primary key D. Private key

ANSWER

C. Primary Key

QUESTION 70

Which of the following is a wireless communication that requires devices to be within 6 inches of each other to transfer information? A. Infrared B. NFC C. Bluetooth D. WiFi

ANSWER

B. NFC

QUESTION 71

Which of the following is MOST likely used to represent international text data? A. ASCII B. Octal C. Hexadecimal D. Unicode

ANSWER

D. Unicode

QUESTION 72

Which of the following is primarily a confidentiality concern? A. Eavesdropping B. Impersonation C. Destructing D. Altering

ANSWER

A. Eavesdropping

QUESTION 73

Which of the following is the closest to machine language? A. Scriptedlanguages B. Compiled languages C. Query languages D. Assembly languages

ANSWER

D. Assembly languages

QUESTION 74

Which of the following language types would a web developer MOST likely use to create a website? A. Interpreted B. Query C. Compiled D. Assembly

ANSWER

A. Interpreted

QUESTION 75

Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.) A. SMTP B. POP3 C. SNMP D. DHCP E. ICMP F. SFTP

ANSWER

A. SMTP B. POP3

QUESTION 76

Which of the following security concerns is a threat to confidentiality? A. Replay attack B. Denial of service C. Service outage D. Dumpster diving

ANSWER

A. Replay Attack

QUESTION 77

Which of the following statements regarding Windows 8 are true? (Choose two.) A. Traditional applications can be pinned to the taskbar. B. Toolbars can only be added to the Start screen. C. Modern apps can be pinned to the taskbar. D. Similar to tiles on the Start screen, desktop icons can be dragged to new locations.

ANSWER

A. Traditional applications can be pinned to the task-bar. D. Similar to tiles on the Start screen, desktop icons can be dragged to new locations.

QUESTION 78

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen? A. Host-based firewall B. Strong administrator password C. Anti-malware software D. Full disk encryption

ANSWER

D. Full disk encryption

QUESTION 79

Which of the following statements best describes binary notation? A. A notational system used to represent an on or off state B. A notational system used to represent media access control C. A notational system used to represent Internet protocol addressing D. A notational system used to represent a storage unit of measurement

ANSWER

A. A notational system used to represent an on or off state

QUESTION 80

Which of the following is an advantage of installing an application to the cloud? A. Data is not stored locally. B. Support is not required. C. Service is not required. D. Internet access is not required.

ANSWER

A. Data is not stored locally

QUESTION 81

What is the defining characteristic of Trojan horse programs? A. They appear to be harmless but hide malicious intent. B. They are not intended to cause harm and only make fun of the user. C. They replicate and attach themselves to host files. D. They do not require user intervention to spread or function.

ANSWER

A. They appear to be harmless but hide malicious intent.

QUESTION 82

Which of the following operating systems is available for free and can be modified by anyone? A. Windows B. Linux C. Mac OS D. Chrome OS

ANSWER

B. Linux

QUESTION 83

Which of the following is an example of ransomware? A. A user is asked to pay a fee for a password to unlock access to their files. B. A user receives an email demanding payment for a trial application that has stopped working. C. A user has opened an Internet browser and is taken to a site that is not the normal home page. D. A user is asked to open an attachment that verifies the price of an item that was not ordered.

ANSWER

A. A user is asked to pay a fee for a password to unlock access to their files

QUESTION 84

Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered: A. adware B. spyware C. ransomware D. phishing

ANSWER

B. spyware

QUESTION 85

Which of the following printer types uses a powder-based consumable with a lower cost per page compared to other printers? A. Thermal B. Laser C. Dot matrix D. Inkjet

ANSWER

B. Laser

QUESTION 86

A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat? A. Malware B. Social engineering C. Spam D. Physical security

ANSWER

B. Social Engineering

QUESTION 87

Which of the following printers requires a special type of paper in order to print? A. Impact B. Thermal C. Inkjet D. Laser

ANSWER

B. Thermal

QUESTION 88

Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information? A. Hacking B. Phishing C. Spam D. Cracking

ANSWER

B. Phishing

QUESTION 89

Which of the following should be performed after a backup has been completed? A. Delete the backup B. Verify the backup C. Save the backup D. Schedule the backup

ANSWER

B. Verify the backup

QUESTION 90

A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation? A. Dumpster diving B. Shoulder surfing C. Phishing D. Social engineering

ANSWER

B. Shoulder surfing

QUESTION 91

Which of the following are not availability concerns? A. Power Outage B. Impersonation C. Destruction D. Hardware Failure

ANSWER

B. Impersonation

QUESTION 92

A Multi-factor Authentication requires only one method of verification, such as a password. True or False

ANSWER

False

QUESTION 93

Which of the following are an example of Factor Authentication? (Choose Three) A. Passwords B. PIN Numbers C. Backup D. Firewall E. Security Questions F. Permissions

ANSWER

A. Passwords B. PIN Numbers E. Security Questions

QUESTION 94

Which Function sends information from Computer to the User in various ways? A. Storage B. Input C. Processing D. Output

ANSWER

D. Output

QUESTION 95

When transferring a file across the network, which of the following would be the SLOWEST transfer rate? A. 1.24Pbps B. 1.89Mbps C. 1.65Mbps D. 1293Kbps

ANSWER

D. 1293Kbps

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials