IT Fundamentals

Here you have the best CompTIA FC0-U61 practice exam questions

  • You have 188 total questions to study from
  • Each page has 5 questions, making a total of 38 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on December 16, 2024
Question 1 of 188

Which of the following is primarily a confidentiality concern?

    Correct Answer: A

    Eavesdropping is a confidentiality concern because it involves unauthorized listening to private communications. This jeopardizes the confidentiality of the information being communicated, as it is accessed by someone not intended to have it.

Question 2 of 188

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?

    Correct Answer: D

    To best protect a document with step-by-step instructions on how to use software, the developer should use copyright. Copyright protects original works of authorship, including literary works such as instruction manuals and guides. A patent is used to protect inventions, a trademark protects brand names and logos, and a watermark is used to mark documents but does not legally protect them from being published or used by others. Copyright ensures that the developer maintains control over the reproduction, distribution, and public display of their document.

Question 3 of 188

Which of the following database concepts would MOST likely use a CSV file?

    Correct Answer: C

    A CSV (Comma Separated Values) file is a common format for importing data into a database system. CSV files are simple to create and read, making them ideal for transferring data from one system to another. While they can also be used for exporting data for reporting purposes, the primary and most likely use in the context of database concepts is data importing.

Question 4 of 188

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

    Correct Answer: A

    The first step a help desk technician should take when encountering an issue is to check the Knowledge Base. The Knowledge Base is a repository of documented problems and their solutions, often contributed by other technicians who have dealt with similar issues. By consulting the Knowledge Base first, the technician can quickly find if the issue has been encountered before and the steps taken to resolve it, thereby saving time and effort.

Question 5 of 188

Which of the following BEST describes the practice of providing user credentials when logging onto the network?

    Correct Answer: C

    The practice of providing user credentials when logging onto the network is best described as 'Input.' This is because users are inputting their credentials (such as username and password) into the system in order to gain access.