CompTIA ITF+ Practice Test (FC0-U61)
Use the form below to configure your CompTIA ITF+ Practice Test (FC0-U61). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA ITF+ FC0-U61 (V5) Information
CompTIA IT Fundamentals (ITF+) FC0-U61 Exam
The CompTIA IT Fundamentals (ITF+) certification is an entry-level certification designed for individuals who are new to information technology. It provides a broad understanding of essential IT concepts and helps candidates determine whether a career in IT is right for them. This certification is suitable for students, career changers, and professionals who need basic IT knowledge.
Exam Overview
The FC0-U61 exam consists of a maximum of 75 multiple-choice questions. Candidates have 60 minutes to complete the test. The exam costs $134 USD. A passing score is 650 on a scale of 900. Unlike other CompTIA certifications, ITF+ does not require renewal and does not expire.
Exam Content
The exam covers six key areas: IT concepts and terminology, infrastructure, applications and software, software development, database fundamentals, and security. IT concepts and terminology focus on basic computing principles and troubleshooting. Infrastructure covers hardware, networking, and storage. Applications and software include operating systems and file management. Software development introduces programming concepts and logic. Database fundamentals discuss data organization and storage. Security covers threats, encryption, and best practices for online safety.
Who Should Take This Exam?
CompTIA ITF+ is designed for individuals who have little to no experience in IT. It is ideal for students exploring a future in technology, professionals who need basic IT knowledge, and career changers entering the IT field. It is also useful for business professionals who interact with IT teams and want a better understanding of technical concepts.
How to Prepare
Candidates should review the official CompTIA ITF+ study materials and practice with sample questions. CompTIA offers online courses, study guides, and hands-on labs to help with exam preparation. Practical experience with computers, software, and networking concepts can also improve understanding.
Summary
The CompTIA IT Fundamentals (ITF+) FC0-U61 certification is an excellent starting point for individuals interested in IT. It provides foundational knowledge in computing, software, security, and databases. This certification helps candidates determine if a career in IT is the right choice and prepares them for more advanced IT certifications.

Free CompTIA ITF+ FC0-U61 (V5) Practice Test
- 20 Questions
- Unlimited
- IT Concepts and TerminologyInfrastructureApplications and SoftwareSoftware Development ConceptsDatabase FundamentalsSecurity
Your company's policy requires that operating system backups be performed in a way that ensures the continuity of business operations with minimal downtime in case of a system failure. Which of the following backup solutions best aligns with this policy?
Incremental backups stored on-site only
Full backups stored both locally and at an off-site location
Snapshots of the operating system stored on a local file server
Differential backups synchronized to the cloud twice a week
Answer Description
Having both local and off-site backups ensures that if a disaster impacts the physical location of the business, such as a natural disaster, there will still be access to the operating system backups. Local backups allow for quick restoration to minimize downtime, while off-site backups provide additional security against localized incidents. Full backups ensure that the entire operating system is available for restoration, which is critical for business continuity. Incremental or differential backups might not always store the full state needed for a complete and rapid system recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are full backups better for business continuity compared to incremental or differential backups?
What is the purpose of having both local and off-site backups?
How do snapshots differ from full backups, and why are they less suitable for this situation?
Your company is developing a new client tracking system, and you have been given the task of creating a new table within the database to store basic client information such as 'ClientID', 'ClientName', and 'ContactNumber'. Which statement would you use to initially set up this table?
CREATE TABLE Clients (ClientID int, ClientName varchar(255), ContactNumber varchar(255));
ALTER TABLE Clients ADD COLUMN (ClientID int, ClientName varchar(255), ContactNumber varchar(255));
INSERT INTO Clients (ClientID, ClientName, ContactNumber) VALUES (1, 'Example Name', '123-456-7890');
CREATE DATABASE Clients (ClientID int, ClientName varchar(255), ContactNumber varchar(255));
Answer Description
The correct answer is CREATE TABLE, because this SQL statement defines a brand-new table and its columns inside the current database. ALTER TABLE is used only for modifying an existing table definition, such as adding or deleting columns. INSERT INTO adds new rows to an existing table. CREATE DATABASE establishes an entirely new database, not a table within one.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the CREATE TABLE statement do in SQL?
How does ALTER TABLE differ from CREATE TABLE in SQL?
What is the purpose of INSERT INTO in SQL?
You are an IT support technician and a user reports that their computer is not connecting to the network. You have verified that the network cable is properly connected and the port is working. What is the next step you should take?
Contact the network administrator.
Replace the network cable.
Check the network settings on the user's computer.
Reboot the computer.
Answer Description
The next step in testing your theory is to check the network settings on the user's computer. This includes verifying that the correct network adapter is enabled and that the IP settings are correct. If these settings are incorrect or the network adapter is disabled, the computer may not connect to the network. Rebooting the computer to reset the network settings can also be a logical next step but should typically follow verifying the settings. Replacing the network cable or contacting the network administrator should be considered after initial troubleshooting steps.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are network settings, and why are they important for troubleshooting connectivity issues?
What is a network adapter, and how can it affect a computer's network connectivity?
How do you verify and adjust IP settings on a computer?
An employee in your company is creating a new password for their company email account. Which of the following options is the BEST example of a strong password according to common best practices?
letmeinnow
bR7*!xQ2w$3Lz
1234567890
password123
Answer Description
A strong password should be complex, including a combination of uppercase letters, lowercase letters, numbers, and symbols. It should be long enough to resist common brute-force attacks, typically recommended to be at least 12 characters long. In this case, 'bR7*!xQ2w$3Lz' meets these criteria, making it the strongest password option provided.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are symbols, numbers, and mixed-case letters important in strong passwords?
What is a brute-force attack and how does a strong password protect against it?
Why is 'password123' considered a weak password?
Using standard ANSI SQL syntax (not vendor-specific extensions), which of the following statements correctly inserts a new record into the table Students so that Name is 'Alice' and Age is 10?
INSERT INTO Students (Name, Age) VALUES ('Alice', 10);
INSERT INTO Students SET Name='Alice', Age=10;
ADD RECORD Alice, 10 TO Students;
UPDATE Students ADD (Name, Age) VALUES ('Alice', 10);
Answer Description
The statement "INSERT INTO Students (Name, Age) VALUES ('Alice', 10);" follows ANSI SQL syntax for inserting a row: it names the target table, lists the columns, and supplies matching values in the VALUES clause. The other choices are invalid in standard SQL: the SET form is a MySQL-only extension, "ADD RECORD" is not an SQL command, and combining UPDATE with ADD and VALUES is syntactically incorrect.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is ANSI SQL?
Why is the SET syntax in the first option incorrect for this scenario?
How does the VALUES clause work in an INSERT statement?
Which file system is traditionally used by Macintosh computers?
Ext4
NTFS
FAT32
HFS
Answer Description
HFS, also known as Hierarchical File System, is the correct answer because it was originally developed by Apple for use in Macintosh computers. NTFS is primarily used by Windows operating systems, and Ext4 is used in Linux environments. FAT32 is an older file system that was used by various operating systems including Windows and DOS but has limitations on file sizes and partition sizes compared to more modern file systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is HFS, and how does it work?
How is HFS different from NTFS?
What are the limitations of FAT32 compared to HFS?
What is the primary benefit of using a file system that implements journaling?
It compresses files to save disk space
It maintains a log of file system changes to help recover from crashes
It increases the maximum size of files that can be stored
It encrypts files for added security
Answer Description
The correct answer is 'It maintains a log of file system changes to help recover from crashes'. Journaling ensures that even in the event of a system crash or power failure, the file system can be restored to a consistent state by consulting the log. This reduces the risk of data corruption and loss. The other options, although related to file systems, do not accurately describe the primary benefit of journaling.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is journaling in a file system?
How does journaling prevent data corruption during a crash?
Are there different types of journaling in file systems?
When attempting to solve a problem on a computer, why is it important to establish a theory of probable cause?
It involves replacing necessary hardware components.
It enables the computer to repair itself.
It helps prevent further problems.
It allows troubleshooters to focus on specific potential issues.
Answer Description
Establishing a theory of probable cause allows troubleshooters to focus their efforts on specific potential issues, systematically identify and fix the problem. It involves making an educated guess based on gathered information about what might be causing the issue.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'establishing a theory of probable cause' entail in troubleshooting?
How does establishing a theory of probable cause differ from trial-and-error troubleshooting?
Why is it important to gather information before forming a theory of probable cause?
What term is used to describe the part of a program designed to repeat a block of code until a certain condition is met?
Sequence
Functions
Branching
Looping
Answer Description
The term 'Looping' is used to define a structure in programming that repeats a sequence of instructions until a specific condition is met. In contrast, 'Branching' refers to the part of the program where decisions are made to execute different parts of code based on certain conditions. 'Sequence' describes the order in which code executes and does not inherently involve repetition. 'Functions' are reusable pieces of code designed to perform a specific task and are not directly related to the concept of repetition.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main types of loops in programming?
How does a loop decide when to stop?
What is an infinite loop, and how can it be avoided?
Which type of cable should you use to connect a monitor to a PC when you need high-definition video but no audio signal?
HDMI
VGA
DisplayPort
DVI
Answer Description
The Digital Visual Interface (DVI) standard was designed to transmit uncompressed digital video-up to 1920×1200 on single-link or even higher on dual-link-without defining an audio channel. Because HDMI and DisplayPort embed audio alongside video and VGA is limited to lower-quality analog signals, DVI is the appropriate choice when the requirement is high-definition video only.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between DVI and HDMI?
What is the difference between single-link and dual-link DVI?
Why is DVI better than VGA for high-definition video?
You are tasked with setting up a wired network connection for a new workstation in an office. Which of the following connectors is required to connect the workstation's network interface card to the company's network switch?
VGA
RJ-11
PS/2
RJ-45
Answer Description
The correct answer is RJ-45. An RJ-45 connector is the standard for Ethernet networking and is used to connect devices like workstations to network switches. This allows the workstation to communicate with the local network and access shared resources. The other options are incorrect; RJ-11 is typically used for telephone lines, VGA is for analog video displays, and PS/2 is an older legacy connector for keyboards and mice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an RJ-45 connector?
What is the difference between an RJ-45 connector and an RJ-11 connector?
Why is a network switch essential for wired connections?
In object-oriented programming, which of the following is a function that is part of a class and defines a behavior or action that an object can perform?
Array
Variable
Method
Constant
Answer Description
Correct. In object-oriented programming, a method is a function associated with an object or class that defines the behaviors an object can perform. A variable is a named storage location for data that can change. A constant is a value that does not change during program execution. An array is a data structure that holds a collection of similar data types.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a method in object-oriented programming?
How are methods different from variables in OOP?
What role do methods play in encapsulation?
In a non-relational database environment, when tasked with handling a data model primarily composed of complex hierarchical structures with multiple one-to-many relationships and the need for flexible schema changes, which database is the BEST fit?
Graph databases
Document databases
Key/value stores
Wide-column stores
Answer Description
The correct answer is Document databases because they are well-suited for handling hierarchical data structures due to their document-oriented nature, where each document can contain nested information that represents such one-to-many relationships. They also offer schema flexibility, allowing for easy adjustments and evolution of the data structure as requirements change. Graph databases are excellent for relationships but do not inherently offer the same hierarchical structure and schema flexibility for document storage. Wide-column stores can handle large amounts of data with some flexibility, but are not optimized for complex hierarchical data as in the case of document databases. Key/value stores are highly performant for simple data models but lack the necessary features to efficiently manage complex hierarchical data structures with flexible schema changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What distinguishes document databases from relational databases?
How do document databases handle hierarchical data structures?
What does 'schema flexibility' mean in document databases?
In a standard program flowchart, the decision symbol (a diamond) represents a Yes/No or True/False test. How many outgoing flow lines (arrows) does this symbol typically have?
Two - one for Yes/True and one for No/False
One - control continues along a single path
Three - one for Yes, one for No, and one for Maybe
It can have an unlimited number because each branch is drawn from the same diamond
Answer Description
The purpose of a decision symbol is to split the control flow based on the result of a binary test, so two arrows leave the diamond-one labeled Yes/True and the other No/False. If a problem requires more than two possible outcomes, the flow should generally be decomposed into additional decision symbols rather than adding extra exits to a single diamond.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does a decision symbol typically have only two outgoing flow lines?
When and why would you use multiple decision symbols in a flowchart?
What would happen if a decision symbol had more than two outgoing flow lines?
Your office currently uses routers limited to IEEE 802.11g. To gain the greatest improvement in both speed and indoor coverage for modern client devices, which Wi-Fi standard should you deploy?
Keep using 802.11g because it already meets typical office needs.
Upgrade to 802.11n for a moderate boost in performance and range.
Switch to 802.11a to extend range at the expense of speed.
Upgrade to 802.11ac for the best overall speed and range.
Answer Description
802.11ac (Wi-Fi 5) operates only in the less-crowded 5 GHz band and introduces wider 80/160 MHz channels, higher-order 256-QAM modulation, more spatial streams and mandatory beamforming. These enhancements raise theoretical throughput to well over 1 Gbps and maintain stronger links at a given distance compared with 802.11g or 802.11n gear. While 802.11n can work on both 2.4 GHz and 5 GHz and offers better performance than 802.11g, its maximum speed (≈450 Mbps) is still far below 802.11ac. Legacy standards such as 802.11a, 802.11b and 802.11g cannot meet modern bandwidth demands.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does 802.11ac provide better speed and range than 802.11g?
What is the difference between the 5GHz and 2.4GHz frequency bands?
What technologies does 802.11ac use to achieve faster speeds and improved range?
A home user wants to protect personal documents and photos stored on a laptop. Which reason best explains why creating regular file backups should be part of the user's basic computer-maintenance routine?
They automatically apply the latest software and security patches.
They ensure that copies of files are available for recovery if the originals become inaccessible.
They reorganize disk sectors to improve overall system performance.
They keep the operating system free of viruses and other malware.
Answer Description
Backups create additional copies of data on separate media or in the cloud so the information can be restored if the original files are lost, corrupted, or accidentally deleted. Tasks such as running antivirus software, installing software updates, or defragmenting a drive are also important, but none of them produce a separate, recoverable copy of the data. Only backups provide an insurance policy that lets the user retrieve files after a primary data failure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are file backups and why are they important?
What is the difference between full, incremental, and differential backups?
What storage options are available for backups, and how do they differ?
A marketing team at an e-commerce company regularly analyzes customer purchase histories, product page views, and abandoned cart data. They use the insights gained from this analysis to recommend new product lines and features to the development team. Which of the following IT concepts does this business practice best represent?
Data-driven business decisions
Investing in data security
Online marketing and advertising
Creating digital art
Answer Description
This process is an example of data-driven business decisions. The company is using data capture and collection to analyze and correlate sales information to make informed decisions about product offerings, exemplifying how data can be turned into actionable insights to support business strategies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does data-driven business decisions mean in this context?
How does the company collect and analyze data like purchase histories and abandoned carts?
What are some examples of actionable insights gained from analyzing customer data?
Which type of CPU allows a laptop to effectively utilize more than 4GB of RAM?
64-bit
ARM
32-bit
Dual-core
Answer Description
A 64-bit CPU can handle more than 4GB of RAM because it uses larger bit widths for memory addresses, allowing it to access a much larger range of memory locations. A 32-bit CPU is limited to addressing a maximum of 4GB of RAM and therefore cannot effectively utilize memory beyond this limit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the primary difference between 64-bit and 32-bit CPUs?
Why is a 32-bit CPU limited to 4GB of RAM?
Can ARM CPUs also support more than 4GB of RAM?
Which of the following internal computing components typically provides the fastest data access for the CPU?
Hard disk drive (HDD)
Random-access memory (RAM)
Solid-state drive (SSD)
Read-only memory (ROM)
Answer Description
Random-access memory (RAM) is a type of volatile memory that functions as the computer's primary 'working' memory. It is designed for extremely high-speed, low-latency data access, allowing the CPU to retrieve and process data quickly. While solid-state drives (SSDs) are much faster than traditional hard disk drives (HDDs), they are non-volatile storage devices and are significantly slower than RAM. Read-only memory (ROM) is primarily used for firmware and is not designed for the high-speed read/write operations that RAM performs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is RAM considered volatile memory?
How does an SSD differ from RAM in terms of speed and function?
What is the role of ROM in a computer compared to RAM?
During an audit, you are asked to verify that a software license purchase was made by your company. What would serve as the best form of non-repudiation to prove the transaction occurred?
Verbal assurance from the department head
Purchase receipt of the software license
User manual for the software
Installed version of the software on the company computers
Answer Description
A purchase receipt serves as a formal acknowledgment of the transaction that has taken place. It provides proof that the company acquired the software license, which is essential for non-repudiation. A user manual or the software itself does not serve as proof of purchase. An assurance from the department head might indicate the purchase happened, but unlike a receipt, it's not a solid piece of evidence that auditors typically rely on.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does non-repudiation mean in the context of auditing?
Why is a purchase receipt considered a reliable form of non-repudiation?
How does non-repudiation differ from authentication and authorization?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.