comptia.org-IT Fundamentals Practice Questions Sample Questions Training.pdf

(47 KB) Pobierz
IT Fundamentals Practice Questions | Sample Questions
| Training
comptia.org/training/resources/practice-tests/it-fundamentals-practice-questions
CompTIA IT Fundamentals Certification Practice
Questions
Question 1
Which of the following is used for temporary storage of program data that is
cleared when the computer is turned off?
A. CPU
​B. SSD
​C. Hard drive
D. System memory
Question 2
Which of the following methods of patching allows for vendor controlled updates,
reduced user interaction, and increased security of the operating system or
application?
A. Upgrading on a periodic basis
​B. Frequent patching
​C. Automatic updates
D. Patching scheduled daily
Question 3
Which of the following security threats would the use of cable locks reduce?
A. Shoulder surfing
​B. Phishing
​C. Hardware theft
D. Dumpster diving
Question 4
Which of the following is a reason why password complexity is a best practice?
A. It makes passwords harder to crack.
​B. It encourages users to write down passwords so they are not forgotten.
​C. It forces users to develop typing skills.
​D. It discourages users from using the same password with different accounts.
1/9
Question 5
A user receives an email containing a link. When they hover the mouse over the
link, the actual URL does not match the text in the body of the email and appears
to be a string of random characters. Which of the following is the BEST course of
action?
A. Forward the email to a friend to ask for advice.
​B. Reply to the sender asking for confirmation that it is safe to open.
​C. Delete the email without clicking on the link.
D. Click the link because malware protection software is installed on the computer.
Question 6
Which of the following components serves as temporary storage for computer
operations?
A. System board
​B. Central processing unit
​C. Random access memory
D. Expansion card
Question 7
The extension .rtf is an example of which of the following file types?
A. Document
B. Executable
​C. Audio
​D. Speadsheet
Question 8
Which of the following is a common way to prevent physical theft of a laptop or
workstation?
​A. Shred any sensitive information to prior to disposal.
​B. Avoid storing passwords near the computer.
​C. Practice good awareness skills when entering passwords/PINs.
​D. Cable and lock device securely attached to a solid object.
Question 9
After installing a new software application, a user notices that the application
launches in demo mode. Which of the following needs to be done to fully activate
the software package?
​A. Enter a product or license key.
​B. Contact the vendor support.
2/9
​C. Reinstall the software application.
​D. Complete the software installation.
Question 10
A user's laptop hard drive contains sensitive information. The user often plugs the
laptop into the corporate network. A sensitive file from the laptop has been found
on another user's laptop. How could the user have prevented this breach?
​A. Disable file and print sharing on the laptop.
​B. Delete unused drives from the network.
​C. Remove shared keys from the key ring.
​D. Set the read-only attribute on the files.
Question 11
A user's government identification number, birth date, and current address are
considered which of the following?
​A. IMAP
​B. HTTP
​C. PII
​D. HTTPS
Question 12
Which of the following is the function of a CPU?
​A. Encrypts data for remote transmission
​B. Performs data computation
​C. Supplies electricity to components
​D. Provides storage location for files
Question 13
When trying to activate the operating system, a user receives a notice that the
software is not genuine. Which of the following security threats has occurred?
​A. Social engineering
​B. Phishing
​C. Virus attack
​D. License theft
Question 14
A user is configuring a SOHO wireless router. The user should change the router's
default administrator password for which of the following reasons?
3/9
​A. To prevent improper data transmission encryption
​B. To prevent unauthorized configuration changes
​C. To prevent social engineering attacks
​D. To increase wireless signal strength
Question 15
A user wants to purchase a CAD application that requires 8GB of RAM to operate.
Which of the following operating system types is required?
​A. 8-bit
​B. 16-bit
​C. 32-bit
​D. ​64-bit
Question 16
Several users want to share a common folder with high availability. Which of the
following devices is BEST to use for this requirement?
​A. Large USB flash drive connected to a PC
​B. Medium capacity SATA hard drive
​C. Network attached storage appliance
​D. Firewall with security management
Question 17
Which of the following is the component responsible for interconnectivity of
internal system devices?
​A. System case
​B. Power supply
​C. Motherboard
​D. Expansion card
Question 18
Which of the following software types protects a desktop from malicious attacks?
​A. Backup
​B. Antivirus
​C. Diagnostic
​D. Screensaver
Question 19
Which of the following internal computer components is used to connect video,
audio, and network cards?
4/9
​A. CPU
​B. Motherboard
​C. Hard drive
​D. Modem
Question 20
Which of the following is MOST important to ensure a computer temperature is
maintained within normal limits?
​A. Maintaining constant power output
​B. Ensuring sufficient airflow
​C. Keeping the case open
​D. Turning the wireless off when not needed
Question 21
An employee is using a desk phone that is connected only via a network cable.
Which of the following technologies is the phone using?
​A. LTE
​B. GSM
​C. VoIP
​D. CDMA
Question 22
Which of the following file types is used to consolidate a group of files?
​A. .rtf
​B. .m3u
​C. .avi
​D. .rar
Question 23
Which of the following permissions is required to run a .bat file?
​A. Delete
​B. Execute
​C. Write
​D. Modify
Question 24
After installing the OS on a workstation, a technician notices that everything is
displayed in large windows and the viewing area is limited. Which of the following
will the technician need to adjust to resolve this issue?
5/9
Zgłoś jeśli naruszono regulamin