CompTIA FC0-U61 Practice Test

Prepare smarter and boost your chances of success with our CompTIA FC0-U61 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use FC0-U61 practice exam are 40–50% more likely to pass on their first attempt.

Start practicing today and take the fast track to becoming CompTIA FC0-U61 certified.

1750 already prepared
Updated On : 13-Jan-2026
75 Questions
CompTIA IT Fundamentals+ Certification Exam
4.8/5.0

Page 1 out of 8 Pages

Think You're Ready?

Your Final Exam Before the Final Exam.
Dare to Take It?

Which of the following intellectual property concepts BEST represents a legally protected slogan of a
business?

A.

Contract

B.

Patent

C.

Copyright

D.

Trademark

D.   

Trademark



Explanation

A business slogan is a short, memorable phrase used to identify and promote a brand in the marketplace. Intellectual property laws protect different types of creations, and only one category is specifically designed to safeguard brand identifiers such as names, logos, symbols, and advertising slogans from being used by competitors.

✅ Correct Option: D. Trademark
Trademarks protect distinctive signs that identify the source of goods or services. Registering a slogan as a trademark gives the owner exclusive rights to use it in commerce and prevents others from using confusingly similar phrases, ensuring customers associate the slogan only with that brand.

❌ Incorrect Option: A. Contract
A contract is a binding agreement between specific parties. While it can include terms about using or protecting a slogan, it only affects the people who signed it and offers no public protection against unrelated companies copying the same phrase.

❌ Incorrect Option: B. Patent
Patents grant exclusive rights to new inventions, machines, processes, or compositions of matter. A slogan is a creative expression, not a technical innovation, so it cannot be patented regardless of how clever or original the wording may be.

❌ Incorrect Option: C. Copyright
Copyright automatically protects original works of authorship (books, music, art, software). Although very short phrases can sometimes qualify, copyright does not effectively protect slogans used as brand identifiers and is not the primary legal tool businesses rely on for this purpose.

Summary
Business slogans function as source identifiers in advertising. Trademark law is specifically created to protect these commercial identifiers. Patents, copyrights, and contracts protect entirely different things. The correct and best answer is Trademark.

Reference:
https://www.comptia.org/certifications/it-fundamentals (Download Exam Objectives PDF)

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A.

Proprietary software

B.

Commercial software

C.

Open source software

D.

Cross-platform software

C.   

Open source software



Explanation

This question tests knowledge of software licensing by asking which model provides the legal right to access a program's foundational instructions (source code), make changes to them, and legally share the new, modified version with others.

✅ Correct Option: C. Open source software
Open source licenses (e.g., GPL, MIT) are defined by granting users the freedom to study, modify, and distribute the software's source code. This legal permission is the core principle that enables developers to create and share their own derivative versions of an application.

❌ Incorrect Option: A. Proprietary software
Proprietary or "closed-source" software retains all rights for the copyright holder. The user license typically forbids modifying, reverse-engineering, or redistributing the source code. Users are only granted permission to use the final compiled product.

❌ Incorrect Option: B. Commercial software
Commercial software refers to software developed and sold for profit. This is a business model, not a license type. Software sold commercially can be either proprietary (common) or open source, so the term itself does not grant modification rights.

❌ Incorrect Option: D. Cross-platform software
This term describes a technical characteristic—software engineered to run on multiple operating systems like Windows, Linux, and macOS. It is unrelated to licensing and confers no legal rights regarding code modification or distribution.

Summary
The defining feature that allows code modification and redistribution is central to the open-source licensing model. Proprietary software restricts it, commercial describes a sales method, and cross-platform describes compatibility, not licensing rights.

Reference:
This topic is covered in the IT Fundamentals (FC0-U61) Exam Objectives under the domain comparing software licensing types. For authoritative details, refer to CompTIA's official study materials.

A company requires several reports that analyze related information from sales, inventory, marketing, and compensation datA. Which of the following is the BEST place to store this data?

A.

Flat file

B.

Word processor

C.

Database

D.

Network share

C.   

Database



Explanation:

✅ C. Database
A database is the ideal solution for storing structured, related data from multiple business functions. It allows information from sales, inventory, marketing, and compensation to be linked in tables, enabling efficient queries and automated report generation. Databases ensure data integrity, prevent duplication, and support multiple users simultaneously, which is essential for comprehensive business analysis.

❌ A. Flat file
Flat files store data in a simple, unstructured format like CSV or TXT, without relationships or indexing. While useful for small datasets, flat files are inefficient for integrating multiple data sources or running complex reports. Maintaining consistency and avoiding errors becomes difficult as data grows, making it unsuitable for enterprise-level reporting.

❌ B. Word processor
Word processor documents (e.g., DOCX) are designed for text and formatting, not structured data storage. They cannot handle relational tables, indexing, or querying, so they are inefficient for analyzing large or complex datasets. Using them for business data would make report generation time-consuming and prone to errors.

❌ D. Network share
A network share is simply a shared storage location. While it allows access to files across a network, it does not provide relational database features like queries, reports, or multi-user support. Storing business data solely on a network share lacks the structure and functionality required for comprehensive reporting.

Summary:
For storing and analyzing related business information across sales, inventory, marketing, and compensation, a database is the most effective choice. It provides structure, relationships, reporting capabilities, and multi-user access. Flat files, word processors, and network shares lack these capabilities and are inadequate for integrated business analysis.

Reference:
IT Fundamentals+ (FC0‑U61) Exam Objectives, Domain 5.0 “Database Fundamentals” — explains database storage, queries, and reporting as compared to flat files.

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

A.

Host-based firewall

B.

Strong administrator password

C.

Anti-malware software

D.

Full disk encryption

D.   

Full disk encryption



Explanation

The most effective method to protect data from unauthorized access if a laptop is physically lost or stolen is Full Disk Encryption. This security measure renders all data on the hard drive unreadable to anyone without the correct encryption key (usually tied to a user password or a separate key), even if they remove the drive and attempt to read it on another computer.

🟢 Correct Option: D. Full disk encryption
Full disk encryption (FDE) scrambles all the data on the entire hard drive, including the operating system files. If a thief removes the physical hard drive, the data remains a useless jumble of encrypted text. Without the specific decryption key or password, the attacker cannot access or read any of the files, making this the best protection for data at rest on a stolen device.

❌ Incorrect Options:

A. Host-based firewall
A host-based firewall protects the laptop from unwanted network traffic and malicious connections coming from over the internet or a network. Since a lost or stolen laptop's main risk is physical access to the hard drive, a firewall offers no protection against the thief simply taking the storage drive out and accessing the data directly, bypassing the network.

B. Strong administrator password
A strong administrator password protects against an attacker logging into the operating system. However, a tech-savvy thief can easily bypass this by booting the laptop from a Live USB drive or by physically removing the hard drive and installing it into a different computer, thus completely circumventing the operating system login prompt.

C. Anti-malware software
Anti-malware software protects the laptop from infections like viruses, spyware, and ransomware. While crucial for general security, it is designed to protect the system while it is running and connected. It does not provide a mechanism to prevent unauthorized individuals from reading the data on a non-running, stolen hard drive.

Summary
When a laptop is lost or stolen, the primary goal is preventing unauthorized access to the sensitive data stored on its drive. Full disk encryption is the BEST defense as it scrambles all data, making it unreadable without the correct key, even if the storage device is removed and accessed externally. The other options only protect the device while it is running or connected to a network.

🔗 Reference
IT Fundamentals (FC0-U61) Objective 6.6: Explain common uses of encryption (e.g., data at rest and data in transit).

An end user’s computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician’s NEXT step?

A.

Restart the computer.

B.

Contact other users.

C.

Disconnect the peripherals.

D.

Document the findings.

D.   

Document the findings.



Explanation

In IT support, once a problem like software failure is resolved, the final step follows a structured methodology to ensure accountability and knowledge sharing. This involves recording all details of the incident, diagnosis, and resolution to build a historical record that aids in preventing future issues and training others.

✅ Correct Option: D. Document the findings
Documentation captures the issue's symptoms, troubleshooting steps taken, root cause identified, solution implemented, and verification results. This practice supports compliance, audits, and quick reference for similar problems, making it an essential closure to the support process in professional IT environments.

❌ Incorrect Option: A. Restart the computer
A restart might serve as a quick verification after fixing, but it's not the structured next action. The methodology prioritizes formal recording over optional reboots, which could have been part of the resolution already.

❌ Incorrect Option: B. Contact other users
Reaching out to others is relevant for broad outages affecting multiple systems, like network failures. Here, the fix was isolated to one user's computer, so no further user involvement is needed post-resolution.

❌ Incorrect Option: C. Disconnect the peripherals
Peripheral checks happen during initial diagnostics to rule out hardware conflicts. With the software issue already solved, revisiting this step would be redundant and inefficient.

Summary
Troubleshooting ends with documentation to preserve knowledge and ensure traceability. This step is universal in IT support for efficiency and best practices. Other choices belong to earlier phases or specific scenarios only. Documenting findings is the clear professional next move.

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

A.

Laptop

B.

Workstation

C.

Mobile phone

D.

Server

D.   

Server



Explanation

This question tests your understanding of a fundamental network model: the client-server architecture. It asks you to identify the centralized hardware whose core purpose is to manage and distribute data, applications, or resources to multiple other computers (clients) on a Local Area Network (LAN).

✅ Correct Option: D. Server
A server is a dedicated computer or software system designed to provide centralized resources, such as files, email, or applications, to other devices on a network. Its primary role in a LAN is to handle requests from client devices efficiently and reliably.

❌ Incorrect Option: A. Laptop
A laptop is a portable client device intended for individual use. It connects to a network to consume services (e.g., access the internet, open files from a server) but is not designed to centrally provide services to a group of other devices.

❌ Incorrect Option: B. Workstation
A workstation is a high-performance computer optimized for demanding individual tasks like graphic design or engineering. Like a laptop, it functions as a client on a network, using resources rather than distributing them to multiple users.

❌ Incorrect Option: C. Mobile Phone
A mobile phone is a personal, handheld client device. It connects to networks to access services like email or the web but lacks the hardware, software, and design necessary to act as a centralized service provider for a LAN.

Summary
The question describes the defining characteristics of a server. Servers are centralized resources in a network, while laptops, workstations, and mobile phones are examples of client devices that typically request services from those servers.

Reference:
This knowledge aligns with objectives in the IT Fundamentals (ITF+) certification, which covers basic networking concepts and device roles.

The sales department needs to keep a customer list that contains names, contact information, and sales
records. This list will need to be edited by multiple people at the same time. Which of the following
applications should be used to create this list?

A.

Database software

B.

Word processing software

C.

Conferencing software

D.

Presentation software

A.   

Database software



Explanation

✅ Correct Answer: A. Database software
Database software is specifically designed to store structured and connected customer information such as names, contact details, and sales records. It supports simultaneous editing, ensuring multiple team members can update data without overwriting each other's changes. With built-in features like queries, sorting, permissions, and data reliability, it is the most efficient choice for managing shared records in a sales department.

Incorrect Options

❌ B. Word processing software
Word processors focus on creating and formatting text documents, not storing structured data. They lack features like indexing, data validation, and controlled multi-user editing. Customer lists stored this way can easily become inconsistent due to formatting issues or version conflicts, making it an unreliable option for teams who require accurate and frequently updated information.

❌ C. Conferencing software
Conferencing tools are built for communication—video meetings, chats, and collaboration sessions—but not data management. They do not offer structured tables, search fields, or simultaneous data editing capabilities. Storing customer information in such platforms would be unorganized and inefficient, with no way to maintain consistency or generate business-related insights for the sales team.

❌ D. Presentation software
Presentation software is intended for designing slides and visual content, not organizing customer records. It lacks essential capabilities like multi-user data editing, structured fields, or querying. Maintaining customer lists in slides would lead to messy updates, inconsistent information, and difficulty retrieving data, making it unsuitable for professional customer management.

Summary
Database software is the best choice because it supports structured storage, multi-user updates, and efficient record management. Word processors, conferencing apps, and presentation tools lack the structure, reliability, and collaborative features needed for accurate and organized customer lists.

Reference:
Database Fundamentals

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?

A.

Standalone application

B.

Client-server application

C.

Web application

D.

Cloud application

B.   

Client-server application



Explanation

The scenario describes a two-part system where one piece of software (the spreadsheet, or client) actively requests data from another separate system (the remote database server). This distribution of tasks and data between two distinct entities over a network is the defining characteristic of a Client-Server application architecture. This model efficiently separates data management from the user interface.

🟢 Correct Option: B. Client-server application
This architecture is characterized by a client (the employee's spreadsheet software on their laptop) requesting a service or data from a server (the remote database). The spreadsheet acts as a "thick client" or "two-tier" component, which handles the user interface and report generation, while the remote database server handles the centralized, secure data storage and management tasks for the organization.

❌ Incorrect Options:

A. Standalone application
A standalone application, also called one-tier, is entirely self-contained, meaning all components—user interface, logic, and data—reside on a single machine. Since the spreadsheet software connects to a remote database, the application's data component is external and separate, which fundamentally makes it a distributed system, not a standalone one.

C. Web application
A web application uses a web browser (like Chrome or Firefox) as its client interface to interact with a server via protocols like HTTP. While the student information system likely has a web interface, the employee explicitly used spreadsheet software, which is typically a desktop application, to establish the data connection, making the specific task non-web based.

D. Cloud application
A cloud application is an application that runs in a cloud environment (like AWS or Azure). While the remote database could be hosted in the cloud, this term describes the deployment location or delivery model (SaaS, PaaS) rather than the basic architectural interaction (Client-Server) that is occurring between the local spreadsheet and the remote database.

Summary
The interaction between the local spreadsheet software (client) and the remote database (server) is the core concept of the Client-Server application model. This architecture separates the presentation layer (the spreadsheet) from the data layer (the database) over a network, allowing the client to pull the required data efficiently for generating the needed report.

Which of the following is a compiled language?

A.

Perl

B.

JScript

C.

Java

D.

PowerShell

C.   

Java



Explanation

This question tests your understanding of programming language categories by asking you to identify which one undergoes a compilation process before execution, resulting in a machine-readable output (bytecode) rather than being interpreted line-by-line at runtime.

✅ Correct Option: C. Java
Java is a quintessential compiled language. Its source code (.java files) is processed by a compiler (javac) into platform-independent bytecode (.class files). This bytecode is then executed by the Java Virtual Machine (JVM). This distinct compilation step into an intermediate format is the defining characteristic.

❌ Incorrect Option: A. Perl
Perl is primarily an interpreted language (scripting language). It is executed line-by-line by an interpreter (perl) at runtime. While it may have an internal compilation phase for optimization, it is not traditionally considered a compiled language in the sense that it does not produce a standalone compiled output file for direct execution.

❌ Incorrect Option: B. JScript
JScript is Microsoft's legacy implementation of JavaScript, which is a core interpreted scripting language for web browsers. Like other scripting languages, JScript code is executed directly by an interpreter (like the one in Internet Explorer) without a prior compilation step into bytecode or machine code.

❌ Incorrect Option: D. PowerShell
PowerShell is a task automation and scripting language. Its scripts (.ps1 files) are interpreted at runtime by the PowerShell engine. While it may use just-in-time compilation for performance, it does not involve a developer-driven compilation step to create a separate executable or bytecode file before running the script.

Summary
The core distinction tested is between compiled and interpreted languages. Java requires a separate compilation step to create bytecode, while Perl, JScript, and PowerShell are executed directly by an interpreter, classifying them as interpreted or scripting languages.

Reference:
This aligns with objectives in the official exam guide for the IT Fundamentals certification (Exam FC0-U61) under the domain covering software development concepts.

A technician is called to replace a display for a workstation. Which of the following would MOST likely be
used to connect the display to the workstation?

A.

USB

B.

NFC

C.

DSL

D.

DVI

D.   

DVI



Explanation

✅ Correct Answer: D. DVI
DVI is a common video interface used to connect computer displays to workstations. It supports high-quality video signals and is widely found on monitors, graphics cards, and desktop systems. When a technician replaces a display, DVI is one of the standard connection types expected for workstation setups, making it the most likely choice among the options provided.

Incorrect Options

❌ A. USB
USB can be used for peripherals such as keyboards, mice, storage devices, and in some cases specialty USB-based display adapters. However, it is not typically the primary or standard connector used for regular computer monitors. Displays for workstations usually rely on video-specific ports like DVI, HDMI, VGA, or DisplayPort rather than standard USB connections.

❌ B. NFC
NFC is a short-range wireless communication technology used for contactless payments, quick data exchanges, and device pairing. It is not capable of transmitting video signals and cannot be used to connect a workstation to a display. This makes it completely unsuitable as a monitor connection option in any desktop environment.

❌ C. DSL
DSL is a telecommunications technology used for internet connectivity over telephone lines. It has no role in transmitting video output from a computer to a display. Because it is specific to network and internet communication, it cannot function as a cable or connector for workstation monitors, making it irrelevant in this scenario.

Summary
DVI is the most appropriate and likely connector for linking a workstation to a display, as it is a dedicated video interface. USB, NFC, and DSL do not serve as standard video connection methods and therefore cannot be used to connect a typical monitor to a workstation.

Reference:
IT Fundamentals (FC0-U61) Exam Objectives — Display and connector types

Page 1 out of 8 Pages