comptia.org-IT Fundamentals Practice Questions Sample Questions Training.pdf
(
47 KB
)
Pobierz
IT Fundamentals Practice Questions | Sample Questions
| Training
comptia.org/training/resources/practice-tests/it-fundamentals-practice-questions
CompTIA IT Fundamentals Certification Practice
Questions
Question 1
Which of the following is used for temporary storage of program data that is
cleared when the computer is turned off?
A. CPU
B. SSD
C. Hard drive
D. System memory
Question 2
Which of the following methods of patching allows for vendor controlled updates,
reduced user interaction, and increased security of the operating system or
application?
A. Upgrading on a periodic basis
B. Frequent patching
C. Automatic updates
D. Patching scheduled daily
Question 3
Which of the following security threats would the use of cable locks reduce?
A. Shoulder surfing
B. Phishing
C. Hardware theft
D. Dumpster diving
Question 4
Which of the following is a reason why password complexity is a best practice?
A. It makes passwords harder to crack.
B. It encourages users to write down passwords so they are not forgotten.
C. It forces users to develop typing skills.
D. It discourages users from using the same password with different accounts.
1/9
Question 5
A user receives an email containing a link. When they hover the mouse over the
link, the actual URL does not match the text in the body of the email and appears
to be a string of random characters. Which of the following is the BEST course of
action?
A. Forward the email to a friend to ask for advice.
B. Reply to the sender asking for confirmation that it is safe to open.
C. Delete the email without clicking on the link.
D. Click the link because malware protection software is installed on the computer.
Question 6
Which of the following components serves as temporary storage for computer
operations?
A. System board
B. Central processing unit
C. Random access memory
D. Expansion card
Question 7
The extension .rtf is an example of which of the following file types?
A. Document
B. Executable
C. Audio
D. Speadsheet
Question 8
Which of the following is a common way to prevent physical theft of a laptop or
workstation?
A. Shred any sensitive information to prior to disposal.
B. Avoid storing passwords near the computer.
C. Practice good awareness skills when entering passwords/PINs.
D. Cable and lock device securely attached to a solid object.
Question 9
After installing a new software application, a user notices that the application
launches in demo mode. Which of the following needs to be done to fully activate
the software package?
A. Enter a product or license key.
B. Contact the vendor support.
2/9
C. Reinstall the software application.
D. Complete the software installation.
Question 10
A user's laptop hard drive contains sensitive information. The user often plugs the
laptop into the corporate network. A sensitive file from the laptop has been found
on another user's laptop. How could the user have prevented this breach?
A. Disable file and print sharing on the laptop.
B. Delete unused drives from the network.
C. Remove shared keys from the key ring.
D. Set the read-only attribute on the files.
Question 11
A user's government identification number, birth date, and current address are
considered which of the following?
A. IMAP
B. HTTP
C. PII
D. HTTPS
Question 12
Which of the following is the function of a CPU?
A. Encrypts data for remote transmission
B. Performs data computation
C. Supplies electricity to components
D. Provides storage location for files
Question 13
When trying to activate the operating system, a user receives a notice that the
software is not genuine. Which of the following security threats has occurred?
A. Social engineering
B. Phishing
C. Virus attack
D. License theft
Question 14
A user is configuring a SOHO wireless router. The user should change the router's
default administrator password for which of the following reasons?
3/9
A. To prevent improper data transmission encryption
B. To prevent unauthorized configuration changes
C. To prevent social engineering attacks
D. To increase wireless signal strength
Question 15
A user wants to purchase a CAD application that requires 8GB of RAM to operate.
Which of the following operating system types is required?
A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit
Question 16
Several users want to share a common folder with high availability. Which of the
following devices is BEST to use for this requirement?
A. Large USB flash drive connected to a PC
B. Medium capacity SATA hard drive
C. Network attached storage appliance
D. Firewall with security management
Question 17
Which of the following is the component responsible for interconnectivity of
internal system devices?
A. System case
B. Power supply
C. Motherboard
D. Expansion card
Question 18
Which of the following software types protects a desktop from malicious attacks?
A. Backup
B. Antivirus
C. Diagnostic
D. Screensaver
Question 19
Which of the following internal computer components is used to connect video,
audio, and network cards?
4/9
A. CPU
B. Motherboard
C. Hard drive
D. Modem
Question 20
Which of the following is MOST important to ensure a computer temperature is
maintained within normal limits?
A. Maintaining constant power output
B. Ensuring sufficient airflow
C. Keeping the case open
D. Turning the wireless off when not needed
Question 21
An employee is using a desk phone that is connected only via a network cable.
Which of the following technologies is the phone using?
A. LTE
B. GSM
C. VoIP
D. CDMA
Question 22
Which of the following file types is used to consolidate a group of files?
A. .rtf
B. .m3u
C. .avi
D. .rar
Question 23
Which of the following permissions is required to run a .bat file?
A. Delete
B. Execute
C. Write
D. Modify
Question 24
After installing the OS on a workstation, a technician notices that everything is
displayed in large windows and the viewing area is limited. Which of the following
will the technician need to adjust to resolve this issue?
5/9
Plik z chomika:
aur_ora
Inne pliki z tego folderu:
comptia.org-PenTest Practice Questions Sample Questions Training.pdf
(29 KB)
comptia.org-CSA Practice Questions Sample Questions Training.pdf
(34 KB)
comptia.org-IT Fundamentals FC0-U61 Practice Questions Sample Questions Training.pdf
(29 KB)
comptia.org-IT Fundamentals Practice Questions Sample Questions Training.pdf
(47 KB)
comptia.org-Security 501 Practice Questions Sample Questions Training.pdf
(26 KB)
Inne foldery tego chomika:
Audiobooks
BZK
Dokumenty
Galeria
japan mags
Zgłoś jeśli
naruszono regulamin