CompTIA FC0-U61 CompTIA IT Fundamentals+ Certification Exam Online Training
CompTIA FC0-U61 Online Training
The questions for FC0-U61 were last updated at Jan 28,2025.
- Exam Code: FC0-U61
- Exam Name: CompTIA IT Fundamentals+ Certification Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent.
Which of the following is the BEST option for storing the data?
- A . Flat file
- B . Memory
- C . Relational database
- D . Solid state drive
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
- A . Contract
- B . Patent
- C . Copyright
- D . Trademark
Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
- A . Infrared
- B . NFC
- C . Bluetooth
- D . WiFi
The IT department has established a new password policy for employees.
Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the las six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Select TWO).
- A . Password lockout
- B . Password complexity
- C . Password expiration
- D . Passwords history
- E . Password length
- F . Password age
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?
- A . Email previewing
- B . Patching
- C . Clear browsing cache
- D . Kill process
A user wants to use a laptop outside the house and still remain connected to the Internet.
Which of the following would be the BEST choice to accomplish this task?
- A . Thunderbolt cable
- B . Bluetooth module
- C . Infrared port
- D . WLAN card
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised.
Which of the following has Joe MOST likely performed?
- A . Password reuse
- B . Snooping
- C . Social engineering
- D . Phishing
A technician is installing a new wireless network and wants to secure the wireless network to prevent
unauthorized access.
Which of the following protocols would be the MOST secure?
- A . WPA
- B . SSID
- C . WEP
- D . WPA2
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
- A . SMTP
- B . POP3
- C . SNMP
- D . DHCP
- E . ICMP
- F . SFTP
A database administrator finds that a table is not needed in a relational database.
Which of the following commands is used to completely remove the table and its data?
- A . UPDATE
- B . DELETE
- C . ALTER
- D . DROP