IT Fundamentals Practice Exam With Key Comptia 1
IT Fundamentals Practice Exam With Key Comptia 1
IT Fundamentals Practice Exam With Key Comptia 1
1. Which of the following is used for temporary storage of program data that is cleared when
the computer is turned off?
A. CPU
B. SSD
C. Hard drive
D. System memory
2. Which of the following methods of patching allows for vendor controlled updates, reduced
user interaction, and increased security of the operating system or application?
A. Upgrading on a periodic basis
B. Frequent patching
C. Automatic updates
D. Patching scheduled daily
3. Which of the following security threats would the use of cable locks reduce?
A. Shoulder surfing
B. Phishing
C. Hardware theft
D. Dumpster diving
5. A user receives an email containing a link. When they hover the mouse over the link, the
actual URL does not match the text in the body of the email and appears to be a string of
random characters. Which of the following is the BEST course of action?
A. Forward the email to a friend to ask for advice.
B. Reply to the sender asking for confirmation that it is safe to open.
C. Delete the email without clicking on the link.
D. Click the link because malware protection software is installed on the computer.
6. Which of the following components serves as temporary storage for computer operations?
A. System board
B. Central processing unit
C. Random access memory
D. Expansion card
7. The extension .rtf is an example of which of the following file types?
A. Document
B. Executable
C. Audio
D. Spreadsheet
8. Which of the following is a common way to prevent physical theft of a laptop or workstation?
A. Shred any sensitive information to prior to disposal.
B. Avoid storing passwords near the computer.
C. Practice good awareness skills when entering passwords/PINs.
D. Cable and lock device securely attached to a solid object.
9. After installing a new software application, a user notices that the application launches in
demo mode. Which of the following needs to be done to fully activate the software package?
A. Enter a product or license key.
B. Contact the vendor support.
C. Reinstall the software application.
D. Complete the software installation.
10. A user's laptop hard drive contains sensitive information. The user often plugs the laptop
into the corporate network. A sensitive file from the laptop has been found on another user's
laptop. How could the user have prevented this breach?
A. Disable file and print sharing on the laptop.
B. Delete the file from the laptop before connecting it to the network.
C. Remove shared keys from the key ring.
D. Set the read-only attribute on the files.
11. A user's government identification number, birth date, and current address are considered
which of the following?
A. IMAP
B. HTTP
C. PII
D. HTTPS
14. A user is configuring a SOHO wireless router. The user should change the router's default
administrator password for which of the following reasons?
A. To prevent improper data transmission encryption
B. To prevent unauthorized configuration changes
C. To prevent social engineering attacks
D. To increase wireless signal strength
15. A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of
the following operating system types is required?
A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit
16. Several users want to share a common folder with high availability. Which of the following
devices is BEST to use for this requirement?
A. Large USB flash drive connected to a PC
B. Medium capacity SATA hard drive
C. Network attached storage appliance
D. Firewall with security management
17. Which of the following is the component responsible for interconnectivity of internal
system devices?
A. System case
B. Power supply
C. Motherboard
D. Expansion card
18. Which of the following software types protects a desktop from malicious attacks?
A. Backup
B. Antivirus
C. Diagnostic
D. Screensaver
19. Which of the following internal computer components is used to connect video, audio, and
network cards?
A. CPU
B. Motherboard
C. Hard drive
D. Modem
20. Which of the following is MOST important to ensure a computer temperature is maintained
within normal limits?
A. Maintaining constant power output
B. Ensuring sufficient airflow
C. Keeping the case open
D. Turning the wireless off when not needed
21. An employee is using a desk phone that is connected only via a network cable. Which of the
following technologies is the phone using?
A. LTE
B. GSM
C. VoIP
D. CDMA
22. Which of the following file types is used to consolidate a group of files?
A. .rtf
B. .m3u
C. .avi
D. .rar
24. After installing the OS on a workstation, a technician notices that everything is displayed in
large windows and the viewing area is limited. Which of the following will the technician need
to adjust to resolve this issue?
A. Color depth
B. Orientation
C. DPI settings
D. Resolution
25. Which of the following connector types can be used by both mice and keyboards? (Select
TWO).
A. Thunderbolt
B. eSATA
C. USB
D. PS/2
E. FireWire
26. Which of the following will allow the easiest and fastest way to share a single file between
two modern smartphones without joining the same WiFi network?
A. Micro SD card
B. Bluetooth
C. USB connection
D. Infrared
27. An end-user has 16GB of RAM installed on a computer system. Which of the following
describes why the OS only uses a maximum of 4GB of RAM?
A. The operating system is 16-bit.
B. The computer has corrupted RAM.
C. The computer has a defective motherboard.
D. The operating system is 32-bit.
28. A technician just installed a new computer. Which of the following is the BEST way to
manage the cables?
A. Line the cables up neatly and wrap them together with cable ties.
B. Leave the cables loose to prevent interference between wires.
C. Nail the cables to the wall.
D. Tuck the cables neatly underneath the carpet.
29. A user wants to run a major update on a laptop. Which of the following should be
considered before running any major updates?
A. Restore folders from backup
B. Change administrator account password
C. Back up important folders
D. Print all personal documents
30. Which of the following allows for the FASTEST printer connections?
A. Bluetooth
B. USB
C. Parallel
D. Serial
31. A user needs to establish an initial password for an email account. Which of the following is
the BEST example of a complex password?
A. 01#iWant!2686612338
B. iWantobeaCosmonau#
C. 01c234n56789v9876x21
D. 012iWanttobe210
33. A user has finished browsing the Internet on a public hotel workstation. Which of the
following steps should be taken to BEST secure PII?
A. Log out of the guest account and reboot
B. Update the browsers, extensions and plugins
C. Run a virus scan on the workstation
D. Clear the browser cache, cookies and history
Question 1) D. System memory
Question 2) C. Automatic updates
Question 3) C. Hardware theft
Question 4) A. It makes passwords harder to crack.
Question 5) C. Delete the email without clicking on the link.
Question 6) C. Random access memory
Question 7) A. Document
Question 8) D. Cable and lock device securely attached to a solid object.
Question 9) A. Enter a product or license key.
Question 10) A. Disable file and print sharing on the laptop.
Question 11) C. PII
Question 12) B. Performs data computation
Question 13) D. License theft
Question 14) B. To prevent unauthorized configuration changes
Question 15) D. 64-bit
Question 16) C. Network attached storage appliance
Question 17) C. Motherboard
Question 18) B. Antivirus
Question 19) B. Motherboard
Question 20) B. Ensuring sufficient airflow
Question 21) C. VoIP
Question 22) D. .rar
Question 23) B. Execute
Question 24) D. Resolution
Question 25) C. USB & D. PS/2
Question 26) B. Bluetooth
Question 27 D. The operating system is 32-bit.
Question 28) A. Line the cables up neatly and wrap them together with cable ties.
Question 29) C. Back up important folders
Question 30) B. USB
Question 31) A. 01#iWant!2686612338
Question 32) C. Ability to utilize a larger amount of RAM
Question 33) D. Clear the browser cache, cookies and history