Free FC0-U61 Sample Questions — CompTIA IT Fundamentals

Free FC0-U61 sample questions for the CompTIA IT Fundamentals exam. No account required: study at your own pace.

Want an interactive quiz? Take the full FC0-U61 practice test

Looking for more? Click here to get the full PDF with 303+ practice questions for $10 for offline study and deeper preparation.

Question 1

An end user clicks on a link from an email that redirects to a web page. Which of the following browser settings should be enabled to reduce the threat of malicious code being executed from the web page?

  • A. Cache clearing
  • B. Private browsing
  • C. Pop-up blocker
  • D. Script blocker
Show Answer
Correct Answer:
D. Script blocker
Question 2

Which of the following is a compiled language?

  • A. Perl
  • B. JScript
  • C. Java
  • D. PowerShell
Show Answer
Correct Answer:
C. Java
Question 3

A Chief Executive Officer (CEO) is concerned about protecting the company’s intellectual property from competitors. Which of the following will address the CEO’s concerns?

  • A. Memorandum of understanding
  • B. Service-level agreement
  • C. Trade secrets
  • D. Copyright
Show Answer
Correct Answer:
D. Copyright
Question 4

Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

  • A. Infrared
  • B. NFC
  • C. Bluetooth
  • D. WiFi
Show Answer
Correct Answer:
B. NFC
Question 5

Which of the following data types would BEST be used for conditional operators?

  • A. Boolean
  • B. Char
  • C. String
  • D. Float
Show Answer
Correct Answer:
A. Boolean
Question 6

When working with storage, 1,000,000MB can also be notated as:

  • A. 0.01PB.
  • B. 1TB
  • C. 100GB
  • D. 10,000,000KB
Show Answer
Correct Answer:
A. 0.01PB.
Question 7

After implementing a solution, which of the following should a technician do NEXT?

  • A. Verify system functionality
  • B. Document the findings
  • C. Determine if anything has changed
  • D. Establish a new theory
Show Answer
Correct Answer:
A. Verify system functionality
Question 8

During a power outage, a server with redundant power supplies shuts down despite being connected to a UPS. The technician determines that the UPS has failed and replaces it. The technician then separates the power supplies to connect them to two separate UPSs. Which of the following troubleshooting steps did the technician just accomplish?

  • A. Implement preventive measures
  • B. Establish a plan of action
  • C. Document findings/lessons learned
  • D. Test the theory to determine the cause
Show Answer
Correct Answer:
A. Implement preventive measures
Question 9

Ann, a user, wants to remove unnecessary software and services from her personal computer to make it more secure. This is an example of:

  • A. baselining
  • B. hardening
  • C. patching
  • D. updating
Show Answer
Correct Answer:
B. hardening
Question 10

A company desires to implement a six-month survey site within a remote location. Which of the following is the BEST option for Internet service?

  • A. Cellular
  • B. Satellite
  • C. Cable
  • D. Fiber
Show Answer
Correct Answer:
B. Satellite
Question 11

A security administrator is adding accounting features to a web application. Which of the following would be the BEST action?

  • A. Enhance the granularity of user permissions
  • B. Enable an audit log
  • C. Implement smart card login
  • D. Adopt a procedure for adding accounts
Show Answer
Correct Answer:
B. Enable an audit log
Question 12

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

  • A. Document the solution and cause
  • B. Create a new theory of cause
  • C. Research the problem online
  • D. Implement preventive measures
Show Answer
Correct Answer:
A. Document the solution and cause
Question 13

After an issue has been identified, which of the following should be performed NEXT?

  • A. Establishing a theory of probable cause
  • B. Verifying system functionality
  • C. Implementing the solution
  • D. Documenting the findings
Show Answer
Correct Answer:
A. Establishing a theory of probable cause
Question 14

A programmer uses DML to modify:

  • A. files
  • B. permissions
  • C. data
  • D. backups
Show Answer
Correct Answer:
C. data
Question 15

Which of the following file management features allows access to resources on a network?

  • A. Encryption
  • B. Journaling
  • C. Permissions
  • D. Authentication
Show Answer
Correct Answer:
D. Authentication
Question 16

A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?

  • A. One-tier
  • B. Two-tier
  • C. Three-tier
  • D. n-tier
Show Answer
Correct Answer:
A. One-tier
Question 17

An IP address is 32 bits long. If converted to bytes, it would be:

  • A. 4 bytes
  • B. 8 bytes
  • C. 16 bytes
  • D. 64 bytes
Show Answer
Correct Answer:
A. 4 bytes
Question 18

A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?

  • A. Variable
  • B. If
  • C. Datatype
  • D. Comment
Show Answer
Correct Answer:
B. If
Question 19

Which of the following availability concerns is mitigated by having a business continuity site?

  • A. Service outage
  • B. Wiretapping
  • C. Eavesdropping
  • D. Replay attack
Show Answer
Correct Answer:
A. Service outage
Question 20

A new device has been installed on a wired network and can be accessed via the LAN but cannot be accessed remotely. Which of the following is the most likely cause?

  • A. Firewall settings
  • B. Improper switch configuration
  • C. Incorrect IP address
  • D. Misconfigured access point
Show Answer
Correct Answer:
A. Firewall settings

Aced these? Get the Full Exam

Download the complete FC0-U61 study bundle with 303+ questions in a single printable PDF.