Over 300 CompTIA IT Fundamentals ITF+ FC0-U61 Exam Questions and Answers

Question 51: Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

A. Customer date of birth
B. The first and last name of the Chief Executive Officer (CEO)
C. Customer service number
D. Company social media screen name

Question 52: Which of the following is a value that uniquely identifies a database record?

A. Foreign key
B. Public key
C. Primary key
D. Private key

Question 53: A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?


Question 54: Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

A. Infrared
C. Bluetooth
D. WiFi

Question 55: Which of the following BEST describes a kilobyte?

A. A kilobyte is a measurement of storage (e.g., 100KB).
B. A kilobyte is a measurement of throughput (e.g.,100Kbps).
C. A kilobyte is a measurement of power (e.g., 100KW).
D. A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Question 56: The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A. Update from 802.11b to 802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup.

Question 57: Which of the following security concerns is a threat to confidentiality?

A. Replay attack
B. Denial of service
C. Service outage
D. Dumpster diving

Question 58: A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

A. Patent
B. Copyright
D. Trademark

Question 59: Which of the following is MOST likely used to represent international text data?

B. Octal
C. Hexadecimal
D. Unicode

Question 60: Which of the following actions is the FINAL step in the standard troubleshooting methodology?

A. Document the solution and cause.
B. Create a new theory of cause.
C. Research the problem online.
D. Implement preventive measures.

Published by Thomas Apel

, a dynamic and self-motivated information technology architect, with a thorough knowledge of all facets pertaining to system and network infrastructure design, implementation and administration. I enjoy the technical writing process and answering readers' comments included.