Over 300 CompTIA IT Fundamentals ITF+ FC0-U61 Exam Questions and Answers

Question 301: What is the defining characteristic of Trojan horse programs?

A. They appear to be harmless but hide malicious intent.
B. They are not intended to cause harm and only make fun of the user.
C. They replicate and attach themselves to host files.
D. They do not require user intervention to spread or function.

Question 302: Which of the following operating systems is available for free and can be modified by anyone?

A. Windows
B. Linux
C. Mac OS
D. Chrome OS

Question 303: A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?

A. Dumpster diving
B. Shoulder surfing
C. Phishing
D. Social engineering

Question 304: Which of the following are not availability concerns?

A. Power Outage
B. Impersonation
C. Destruction
D. Hardware Failure

Question 305: A Multi-factor Authentication requires only one method of verification, such as a password. True or False?

Question 306: Which of the following are an example of Factor Authentication?
(Choose Three)

A. Passwords
B. PIN Numbers
C. Backup
D. Firewall
E. Security Questions
F. Permissions

Question 307: Which Function sends information from Computer to the User in various ways?

A. Storage
B. Input
C. Processing
D. Output

Question 308: When transferring a file across the network, which of the following would be the SLOWEST transfer rate?

A. 1.24Pbps
B. 1.89Mbps
C. 1.65Mbps
D. 1293Kbps

Question 309: Which of the following would BEST help to protect against unauthorized use of a mobile phone?

A. Pop-up blocker and cookie cleaner
B. Alternate browser and private mode
C. PIN and screen lock
D. Encrypted messaging and time-expiring texts

Question 310: Ann, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken by Ann. Which of the following installation types does this BEST describe?

A. Driver installation
B. Plug and play
C. Web based
D. Manual

Published by Thomas Apel

, a dynamic and self-motivated information technology architect, with a thorough knowledge of all facets pertaining to system and network infrastructure design, implementation and administration. I enjoy the technical writing process and answering readers' comments included.