CompTIA FC0-U61 CompTIA IT Fundamentals+ Certification Exam Online Training
CompTIA FC0-U61 Online Training
The questions for FC0-U61 were last updated at Jan 28,2025.
- Exam Code: FC0-U61
- Exam Name: CompTIA IT Fundamentals+ Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
The broadcast signal from a recently installed wireless access point is not as strong as expected.
Which of the following actions would BEST improve the signal strength?
- A . Update from 802.11b to 802.11g.
- B . Ensure sources of EMI are removed.
- C . Enable WPA2-Enterprise.
- D . Use WiFi Protected Setup.
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user.
Which of the following troubleshooting steps is the technician using by browsing to the same site?
- A . Establish a plan of action.
- B . Gather information
- C . Duplicate the problem.
- D . Find the root cause.
A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed.
Which of the following should the user do to correct this issue?
- A . Ensure both devices are connected to the LAN.
- B . Enable task scheduling.
- C . Reset the proxy settings to their default values.
- D . Review the fault tolerance configurations.
Which of the following relational database constructs is used to ensure valid values are entered for a column?
- A . Schema
- B . Permissions
- C . Constraint
- D . Column
A user is buying a laptop. The user will have a lot of personal and confidential information on the
laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen.
Which of the following should be set up to accomplish this?
- A . Encryption
- B . Compression
- C . Permissions
- D . Auditing
A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines.
This program is an example of:
- A . a storage area network.
- B . an embedded OS.
- C . network attached storage.
- D . a Type 1 hypervisor.
Which of the following is a compiled language?
- A . Perl
- B . JScript
- C . Java
- D . PowerShell
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
- A . Document the solution and cause.
- B . Create a new theory of cause.
- C . Research the problem online.
- D . Implement preventive measures.
Which of the following is a value that uniquely identifies a database record?
- A . Foreign key
- B . Public key
- C . Primary key
- D . Private key
A systems administrator wants to return results for a time range within a database.
Which of the following commands should the administrator use?
- A . SELECT
- B . INSERT
- C . DELETE
- D . UPDATE