Over 300 CompTIA IT Fundamentals ITF+ FC0-U61 Exam Questions and Answers

Question 221: Which of the following features of a smartphone controls the screen orientation?

A. Gyroscope
B. NFC
C. Accelerometer
D. GPS

Question 222: A user’s operating system is set to automatically update as updates are released. However, last week’s updates failed to download. Which of the following should the user do FIRST to install the updates?

A. Reference the OS manufacturer’s website.
B. Run a virus scan to remove viruses.
C. Reinstall the operating system.
D. Change the automatic update schedule.
E. Manually download the updates.

Question 223: Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

A. Large USB flash drive connected to a PC
B. Medium capacity SATA hard drive
C. Network attached storage appliance
D. Firewall with security management

Question 224: Which of the following is a 15-pin video connection?

A. DVI
B. S-video
C. Component
D. HDMI
E. VGA

Question 225: Which of the following are considered input devices for a computer? (Select TWO).

A. Mouse
B. Printer
C. Speakers
D. Microphone
E. Monitor

Question 226: Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).

A. Network connection
B. Microphone
C. Modem
D. Firewall
E. Webcam
F. Cable connection
G. Wired NIC

Question 227: Which of the following components is required to send faxes via POTS?

A. NIC
B. Power supply
C. Modem
D. Wireless adapter

Question 228: A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?

A. Swap the mouse and keyboard to the other PS/2 ports.
B. Remap the mouse and keyboard in the BIOS.
C. Update the BIOS to recognize the newer keyboard and mouse.
D. Configure the keyboard localization settings.

Question 229: A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?

A. Malware
B. Social engineering
C. Spam
D. Physical security

Question 230: Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:

A. adware
B. spyware
C. ransomware
D. phishing

Published by Thomas Apel

, a dynamic and self-motivated information technology architect, with a thorough knowledge of all facets pertaining to system and network infrastructure design, implementation and administration. I enjoy the technical writing process and answering readers' comments included.