Over 300 CompTIA IT Fundamentals ITF+ FC0-U61 Exam Questions and Answers

Question 131: A user is attempting to open a file and receives a pop-up message stating that the action cannot be accomplished. This is MOST likely a result of which of the following?

A. The user is not logged into the system properly.
B. The file is a read-only file.
C. The user is not granted permission to access the file.
D. The file attribute is set to hidden.

Question 132: A company needs an application that filters unwanted network traffic. Which of the following should be configured?

A. Secure sockets layer
B. Software firewall
C. 128-bit encryption
D. Span filter

Question 133: An employee who is working for a small business would like to prevent shoulder surfing. Which of the following should the employee do?

A. Lock the computer.
B. Purchase a privacy screen.
C. Enable encryption.
D. Create a strong password.

Question 134: When logging in to a laptop, which of the following is an example of multifactor authentication?

A. Logging on via key fob, password, and fingerprint reader
B. Entering an account number, PIN, and password to log in
C. A technician using the fingerprint reader and a retina scan
D. A user entering a strong password to log in

Question 135: Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

A. Laptop
B. Workstation
C. Mobile phone
D. Server

Question 136: A traveling business user is utilizing an LTE cellular connection that provides good coverage but experiences numerous outages during a given week. This would be classified as which of the following?

A. High mobility and low reliability
B. High mobility and high latency
C. High availability and low mobility
D. High availability and low throughput

Question 137: Joe, a user, has installed a new SOHO wireless router. The router keeps dropping PC connections. Which of the following should be check?

A. SSID
B. MAC address
C. Firmware
D. Password

Question 138: Which of the following are MOST likely to be configured during the initial setup of an OS on a basic workstation? (Select two.)

A. Antivirus settings
B. License keys
C. Email setup
D. Localization settings
E. Printer configuration

Question 139: A technician wants to test a new OS version locally without interfering with a production installation. Which of the following is the BEST technology to use?

A. Cloud application software
B. Virtualization software
C. Telepresence software
D. Collaboration software

Question 140: Which of the following connection methods requires line-of-sight to be effective?

A. Fiber optics
B. Infrared
C. Cellular
D. Wi-Fi

Published by Thomas Apel

, a dynamic and self-motivated information technology architect, with a thorough knowledge of all facets pertaining to system and network infrastructure design, implementation and administration. I enjoy the technical writing process and answering readers' comments included.