Over 300 CompTIA IT Fundamentals ITF+ FC0-U61 Exam Questions and Answers

Question 231: Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?

A. Hacking
B. Phishing
C. Spam
D. Cracking

Question 232: A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

A. UPDATE
B. DELETE
C. ALTER
D. DROP

Question 233: Joe, a technician, has discovered that his SOHO router does not include features that are listed on the manufacturer’s website. Which of the following would allow Joe to enable these missing features?

A. Update the firmware
B. Enable WPA2
C. Change the SSID
D. Reset the router

Question 234: A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?

A. Thunderbolt cable
B. Bluetooth module
C. Infrared port
D. WLAN card

Question 235: Which of the following extensions identifies a video file?

A. .msi
B. .tar
C. .img
D. .mp4

Question 236: Which of the following file formats contain other files within them? (Select TWO).

A. tiff
B. dmg
C. png
D. mp3
E. iso
F. flac

Question 237: Which of the following is performed during WiFi setup on a mobile device?

A. Configuring bluetooth pairing settings
B. Configuring email settings
C. Configuring screen lock settings
D. Configuring SSID settings

Question 238: Which of the following is a reason that a user might upgrade a video card driver? (Select TWO).

A. To decrease the screen resolution
B. To access monitor standby mode
C. To fix an error message
D. To use additional features
E. To adjust the brightness/contrast

Question 239: When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

A. Social engineering
B. Phishing
C. Virus attack
D. License theft

Question 240: A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?

A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit

Published by Thomas Apel

, a dynamic and self-motivated information technology architect, with a thorough knowledge of all facets pertaining to system and network infrastructure design, implementation and administration. I enjoy the technical writing process and answering readers' comments included.