0% found this document useful (0 votes)
845 views12 pages

CompTIA IT Fundamentals Certification Practice Questions

This document contains 33 multiple choice questions from a practice exam for CompTIA IT Fundamentals certification. It covers topics like system components, security best practices, file types, operating systems, and troubleshooting issues. The questions are followed by an answer key providing the correct response for each question.

Uploaded by

Sarang Bhaisare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
845 views12 pages

CompTIA IT Fundamentals Certification Practice Questions

This document contains 33 multiple choice questions from a practice exam for CompTIA IT Fundamentals certification. It covers topics like system components, security best practices, file types, operating systems, and troubleshooting issues. The questions are followed by an answer key providing the correct response for each question.

Uploaded by

Sarang Bhaisare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

CompTIA IT Fundamentals Certification

Practice Questions
Question 1
Which of the following is used for temporary storage of program data that is cleared
when the computer is turned off?

A. CPU
B. SSD
C. Hard drive
D. System memory

Question 2
Which of the following methods of patching allows for vendor controlled updates,
reduced user interaction, and increased security of the operating system or application?

A. Upgrading on a periodic basis


B. Frequent patching
C. Automatic updates
D. Patching scheduled daily

Question 3
Which of the following security threats would the use of cable locks reduce?

A. Shoulder surfing
B. Phishing
C. Hardware theft
D. Dumpster diving

Question 4
Which of the following is a reason why password complexity is a best practice?

A. It makes passwords harder to crack.


B. It encourages users to write down passwords so they are not forgotten.
C. It forces users to develop typing skills.
D. It discourages users from using the same password with different accounts.

Question 5
A user receives an email containing a link. When they hover the mouse over the link,
the actual URL does not match the text in the body of the email and appears to be a
string of random characters. Which of the following is the BEST course of action?

A. Forward the email to a friend to ask for advice.


B. Reply to the sender asking for confirmation that it is safe to open.
C. Delete the email without clicking on the link.
D. Click the link because malware protection software is installed on the computer.

Question 6
Which of the following components serves as temporary storage for computer
operations?

A. System board
B. Central processing unit
C. Random access memory
D. Expansion card

Question 7
The extension .rtf is an example of which of the following file types?

A. Document
B. Executable
C. Audio
D. Speadsheet

Question 8
Which of the following is a common way to prevent physical theft of a laptop or
workstation?

A. Shred any sensitive information to prior to disposal.


B. Avoid storing passwords near the computer.
C. Practice good awareness skills when entering passwords/PINs.
D. Cable and lock device securely attached to a solid object.

Question 9
After installing a new software application, a user notices that the application launches
in demo mode. Which of the following needs to be done to fully activate the software
package?

A. Enter a product or license key.


B. Contact the vendor support.
C. Reinstall the software application.
D. Complete the software installation.

Question 10
A user's laptop hard drive contains sensitive information. The user often plugs the
laptop into the corporate network. A sensitive file from the laptop has been found on
another user's laptop. How could the user have prevented this breach?

A. Disable file and print sharing on the laptop.


B. Delete unused drives from the network.
C. Remove shared keys from the key ring.
D. Set the read-only attribute on the files.

Question 11
A user's government identification number, birth date, and current address are
considered which of the following?

A. IMAP
B. HTTP
C. PII
D. HTTPS

Question 12
Which of the following is the function of a CPU?

A. Encrypts data for remote transmission


B. Performs data computation
C. Supplies electricity to components
D. Provides storage location for files

Question 13
When trying to activate the operating system, a user receives a notice that the software
is not genuine. Which of the following security threats has occurred?

A. Social engineering
B. Phishing
C. Virus attack
D. License theft
Question 14
A user is configuring a SOHO wireless router. The user should change the router's
default administrator password for which of the following reasons?

A. To prevent improper data transmission encryption


B. To prevent unauthorized configuration changes
C. To prevent social engineering attacks
D. To increase wireless signal strength

Question 15
A user wants to purchase a CAD application that requires 8GB of RAM to operate.
Which of the following operating system types is required?

A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit

Question 16
Several users want to share a common folder with high availability. Which of the
following devices is BEST to use for this requirement?

A. Large USB flash drive connected to a PC


B. Medium capacity SATA hard drive
C. Network attached storage appliance
D. Firewall with security management

Question 17
Which of the following is the component responsible for interconnectivity of internal
system devices?

A. System case
B. Power supply
C. Motherboard
D. Expansion card

Question 18
Which of the following software types protects a desktop from malicious attacks?

A. Backup
B. Antivirus
C. Diagnostic
D. Screensaver

Question 19
Which of the following internal computer components is used to connect video, audio,
and network cards?

A. CPU
B. Motherboard
C. Hard drive
D. Modem

Question 20
Which of the following is MOST important to ensure a computer temperature is
maintained within normal limits?

A. Maintaining constant power output


B. Ensuring sufficient airflow
C. Keeping the case open
D. Turning the wireless off when not needed

Question 21
An employee is using a desk phone that is connected only via a network cable. Which of
the following technologies is the phone using?

A. LTE
B. GSM
C. VoIP
D. CDMA

Question 22
Which of the following file types is used to consolidate a group of files?

A. .rtf
B. .m3u
C. .avi
D. .rar

Question 23
Which of the following permissions is required to run a .bat file?
A. Delete
B. Execute
C. Write
D. Modify

Question 24
After installing the OS on a workstation, a technician notices that everything is
displayed in large windows and the viewing area is limited. Which of the following will
the technician need to adjust to resolve this issue?

A. Color depth
B. Orientation
C. DPI settings
D. Resolution

Question 25
Which of the following connector types can be used by both mice and keyboards?
(Select TWO).

A. Thunderbolt
B. eSATA
C. USB
D. PS/2
E. FireWire

Question 26
Which of the following will allow the easiest and fastest way to share a single file
between two modern smartphones without joining the same WiFi network?

A. Micro SD card
B. Bluetooth
C. USB connection
D. Infrared

Question 27
An end-user has 16GB of RAM installed on a computer system. Which of the following
describes why the OS only uses a maximum of 4GB of RAM?

A. The operating system is 16-bit.


B. The computer has corrupted RAM.
C. The computer has a defective motherboard.
D. The operating system is 32-bit.
E. The computer has a virus.

Question 28
A technician just installed a new computer. Which of the following is the BEST way to
manage the cables?

A. Line the cables up neatly and wrap them together with cable ties.
B. Leave the cables loose to prevent interference between wires.
C. Nail the cables to the wall.
D. Tuck the cables neatly underneath the carpet.

Question 29
A user wants to run a major update on a laptop. Which of the following should be
considered before running any major updates?

A. Restore folders from back up


B. Change administrator account password
C. Back up important folders
D. Print all personal documents

Question 30
Which of the following allows for the FASTEST printer connections?

A. Bluetooth
B. USB
C. Parallel
D. Serial

Question 31
A user needs to establish an initial password for an email account. Which of the
following is the BEST example of a complex password?

A. 01#iWant!2686612338
B. iWantobeaCosmonau#
C. 01c234n56789v9876x21
D. 012iWanttobe210

Question 32
Which of the following is an advantage of using a 64-bit operating system?
A. Ability to recognize an SSD
B. Ability to obtain an IPv6 address3
C. Ability to utilize a larger amount of RAM
D. Ability to add two or more hard drives

Question 33
A user has finished browsing the Internet on a public hotel workstation. Which of the
following steps should be taken to BEST secure PII?

A. Log out of the guest account and reboot


B. Update the browsers, extensions and plugins
C. Run a virus scan on the workstation
D. Clear the browser cache, cookies and history

IT Fundamentals Answer Key


Question 1) D. System memory

Question 2) C. Automatic updates

Question 3) C. Hardware theft

Question 4) A. It makes passwords harder to crack.

Question 5) C. Delete the email without clicking on the link.

Question 6) C. Random access memory

Question 7) A. Document

Question 8) D. Cable and lock device securely attached to a solid object.

Question 9) A. Enter a product or license key.

Question 10) A. Disable file and print sharing on the laptop.

Question 11) C. PII

Question 12) B. Performs data computation

Question 13) D. License theft

Question 14) B. To prevent unauthorized configuration changes

Question 15) D. 64-bit


Question 16) C. Network attached storage appliance

Question 17) C. Motherboard

Question 18) B. Antivirus

Question 19) B. Motherboard

Question 20) B. Ensuring sufficient airflow

Question 21) C. VoIP

Question 22) D. .rar

Question 23) B. Execute

Question 24) D. Resolution

Question 25) C. USB & D. PS/2

Question 26) B. Bluetooth

Question 27 D. The operating system is 32-bit.

Question 28) A. Line the cables up neatly and wrap them together with cable ties.

Question 29) C. Back up important folders

Question 30) B. USB

Question 31) A. 01#iWant!2686612338

Question 32) C. Ability to utilize a larger amount of RAM

Question 33) D. Clear the browser cache, cookies and history


CompTIA IT Fundamentals+ Certification
Practice Questions
Question 1
Which of the following storage units can be used to represent 1024MB?

A. 1GB
B. 1KB
C. 1TB
D. 1PB

Question 2
An image displayed on a monitor is an example of:

A. input.
B. output.
C. processing.
D. storage.

Question 3
A school has a sign posted in the computer lab that says, "Sharing passwords with
others is prohibited." This is an example of:

A. social networking.
B. a security policy.
C. file sharing.
D. instant messaging.

Question 4
A user buys a new desktop computer and then connects a cable that allows the
computer to connect to the web. Which of the following ports would MOST likely be
used?

A. DVI
B. HDMI
C. Ethernet
D. Thunderbolt
E. Bluetooth
Question 5
Which of the following would BEST help to protect against unauthorized use of a
mobile phone?

A. Pop-up blocker and cookie cleaner


B. Alternate browser and private mode
C. PIN and screen lock
D. Encrypted messaging and time-expiring texts

Question 6
Ann, a user, connects a new mouse to a laptop, and the mouse works with no additional
steps taken by Ann. Which of the following installation types does this BEST describe?

A. Driver installation
B. Plug and play
C. Web based
D. Manual

Question 7
Which of the following protocols is used for secure web browsing?

A. SFTP
B. HTTPS
C. L2TP
D. IMAP

Question 8
Which of the following is the MOST secure password?

A. happybirthday12
B. HappyDay12!
C. H*ppyBirthDay%12
D. HappyBirthDay123

Question 9
Which of the following computer components is primarily responsible for preventing
overheating?

A. Fan
B. SSD
C. CPU
D. Firmware
Question 10
Which of the following software licensing types is MOST likely to require the renewal of
terms/conditions agreements and has annual fees?

A. One-time purchase
B. Open source
C. Group license
D. Subscription

IT Fundamentals+ Answer Key


Question 1) A. 1GB

Question 2) B. output

Question 3) B. a security policy.

Question 4) C. Ethernet

Question 5) C. PIN and screen lock

Question 6) B. Plug and play

Question 7) B. HTTPS

Question 8) C. H*ppyBirthDay%12

Question 9) A. Fan

Question 10) D. Subscription

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy