Over 300 CompTIA IT Fundamentals ITF+ FC0-U61 Exam Questions and Answers

Question 11: A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?

A. Flat file
B. Word processor
C. Database
D. Network share

Question 12: Which of the following would be used to send messages using the SMTP protocol?

A. Document sharing software
B. Instant messaging software
C. Conferencing software
D. Email software

Question 13: Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A. Proprietary software
B. Commercial software
C. Open source software
D. Cross-platform software

Question 14: Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

A. Fiber
B. DSL
C. Cable
D. Satellite

Question 15: An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

A. Data correlation
B. Data manipulation
C. Data gathering
D. Data definition

Question 16: For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

A. redundancy.
B. replication.
C. prioritization.
D. fault tolerance.

Question 17: A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Question 18: Which of the following is the closest to machine language?

A. Scripted languages
B. Compiled languages
C. Query languages
D. Assembly languages

Question 19: The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words.
Passwords must contain at least one special character.
Passwords must be different from the last six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Select TWO).

A. Password lockout
B. Password complexity
C. Password expiration
D. Passwords history
E. Password length
F. Password age

Question 20: A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?

A. Patent
B. Trademark
C. Watermark
D. Copyright