CompTIA IT Fundamentals - Practice Exam (85 Questions)
On a Windows operating system (OS), when a user wants to uninstall a driver, which page or window does NOT offer the relevant options to complete this task?
a. Control panel
b. Device manager
c. Task manager
d. System properties
What is the term used to describe technologies that ensure data availability in case of hardware failures?
a. Data encryption
b. Data backup
c. Data compression
d. Data virtualization
What is the primary importance of saving data to a storage device, like a hard disk?
To free up RAM (Random Access Memory) for faster system performance.
To ensure data persistence and prevent data loss in case of power failure or system shutdown.
To improve network connectivity and data sharing.
To enhance data processing speed for real-time applications.
How can a user safeguard sensitive information from malware when using a public computer?
Log out of all accounts and shut down the workstation.
Use a strong, unique password for each account.
Clear the browser cache and browsing history regularly.
Disable automatic updates for the operating system.
What distinguishes scripted languages from scripting languages?
Scripted languages are exclusively used for web development, while scripting languages are versatile and used in various applications.
Scripted languages are compiled, while scripting languages are interpreted.
Scripted languages are statically typed, while scripting languages are dynamically typed.
Scripted languages are designed for writing standalone applications, while scripting languages are mainly used for automating tasks and controlling other software.
Using a CLI can offer what benefit?
Faster execution of tasks and greater resource efficiency.
Enhanced visual appeal and ease of use for beginners.
More intuitive and user-friendly interactions.
Better support for multimedia applications and gaming.
What service is hosted in the cloud?
An online email service where users access their email accounts via a web browser.
A spreadsheet program installed on a desktop computer.
A computer game downloaded and played offline.
What is a benefit of using a relational database instead of a key/value pair database?
Enhanced scalability for large datasets.
Simplicity of data modeling and storage.
Efficient retrieval of specific data based on complex queries.
Better suited for caching and session management.
What is a method that ensures data is encrypted when it is stored on a storage device or disk?
VPN (Virtual Private Network)
Full-disk encryption
Firewall configuration
Intrusion Detection System (IDS)
When working with address information that includes a house number and a street name, which data type is most suitable for representing the house number?
Integer
Text
Date
Boolean
An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe?
Power Outage
Hardware failure
Man-in-the-Middle (MitM)
Denial of Service (DoS)
A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?
Devices and Printers
Settings/Devices
Device Drivers
Device Manager
What are the four functions which represent most of the ways that data moves through a computer system?
Input, output, processing, storage
Addition, subtraction, division, multiplication
Typing, editing, copying, printing
Automation, replication, optimization, recovery
What's a true statement about query languages?
Query language code is the most complex code.
Query language code is not human-readable.
Query language code does not need to be compiled.
Query languages can only be used on one platform.
A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it?
Type II, because VirtualBox is a software application within a host operating system
Type I, because VirtualBox manages the virtual machine environment
Type II, because Linux provides the resources for the virtual environment
Type I, because the Linux OS is installed directly on the computer
Which of the following does NOT follow accepted MAC (Media Access Control) address format?
192:168:0.10/100
a1-b2-c3-d4-e5-f6
0123456789ff
1111.2222.3333
A web application contains a form, which users fill out. What is the most likely use for this form?
To create a flat file for each user
To create a database
To manually input data into a database
To import data from a flat file into a database
What does a database dump contain?
SQL statements which can recreate all tables
A flat file with full contents of all tables
A hard disk with an exact copy of the database
A formatted report of the contents of all tables
If a worm propagates over a network, which of the following is the first action to take, to prevent further infection?
Escalate the problem to a support professional.
Use antivirus software to try to remove the infection.
Disconnect the network link.
Enable on-access scanning.
When a general language performs scripting, what does it call on as part of the code?
Markup instructions
Query statements
System commands
Machine code
Why would a programmer create a function instead of a procedure?
The function needs to include a nested loop, which does not work in a procedure.
The process which calls the function needs to receive back a return value.
Procedures do not exist in some programming languages.
Functions compile more efficiently.
Data encryption, firewalls, and backups are examples of what?
Intellectual property
Data breach
Data capture
Security controls
Which file system allows a file with the name "Encyclopedia:Volume 1.txt"?
FAT32
HFS+
Ext4
NTFS
Which of the following is an example of an optical drive?
SSD
DVD
HDD
DDR
A web browser is an example of productivity software. What type of software is an email client?
Collaboration software
Open source software
Business software
Productivity software
An employee makes unauthorized copies of customer Social Security numbers, saves them in an unencrypted spreadsheet, and transfers them to the employee’s personal email account. The employee then opens new credit card accounts with this information and uses the cards to buy personal items. Which of the following did NOT occur?
Identity checks
Identity theft
Identity fraud
Mishandling Personally Identifiable Information (PII)
What is an authorization policy that would help a systems administrator grant rights to users to perform their job and no more?
Non-repudiation
Requiring digital signatures
Least privilege
Reviewing logging events
If a password is short and non-complex, what type of attack can it be vulnerable to?
Man-in-the-Middle (MitM)
Malware
Brute force
Distributed Denial of Service (DDoS)
The first step in the troubleshooting process is to identify the problem. What are some of the components of this step?
Approach multiple problems individually; divide and conquer.
Question users; document findings.
Research symptoms; consider multiple approaches.
Duplicate the problem; determine if anything has changed.
A systems administrator is installing a new wireless access point (AP). During installation, the administrator should make sure to complete which of the following?
Enable all services on the wireless AP.
Change the SSID to something that helps identify the administrator.
Change the default password.
Store a hardcopy of a complex password of at least 12 characters.
Which of the following is NOT part of IoT (Internet of Things) home automation?
Sprinkler system
Door lock
Insulin pump
HVAC
When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service?
A short password history
Password managers
Reusing passwords across multiple sites
The IT department resetting passwords
Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?
NFC
NAS
NIC
NID
Which of the following is the best example of variety of data in a database?
A table with a string, number, and date fields
A string field with data in multiple languages
A table with a tinyint, integer, float, and decimal fields
A number field with values from -999,999,999,999 to 999,999,999,999
What is an advantage of the float data type compared to the integer data type?
The float data type is a more natural way of expressing numbers in computing systems.
The float data type is not limited to whole numbers.
The float data type requires less processing time for arithmetic operations.
The float data type consumes less storage.
What is an advantage of using a CLI (Command Line Interface) instead of GUI (Graphical User Interface)?
With CLI, it is easier to multitask when working on different things at once
Non-technical users can learn how to use CLI faster than GUI
CLI takes up less system resources to run.
More people use CLI, so there is more help available.
What type of database uses a schema?
Document
Semi-structured
Key/value pair
Relational
Which of these practices is unsecure as your security becomes dependent on other organizations' security measures?
Shortening password expiration
Reusing across sites
Writing down password
Using passphrase with special characters/tabs
A computer program contains a boolean variable. What are the stored values of this variable?
FALSE, TRUE
"F", "T"
0,1
'false","true'
Which of the following SQL (Structured Query Language) commands can run with just one parameter?
CREATE DATABASE
CREATE TABLE
CREATE INDEX
CREATE VIEW
A wireless network in a small home office generated poor signal quality. The signal improved when an old cordless phone stopped working. What problem did the cordless phone cause when it was active?
Bluetooth signal overlap
Attenuation
Modulation
Interference
A new scanner is purchased for the office, and the technician is using a disk with driver software instead of Plug-and-Play. What is the most likely reason?
The technician does not have enough expertise to use Plug-and-Play.
Plug-and-Play installation did not work for this scanner model.
The computer is running Windows 7, which does not have Plug-and-Play.
The scanner is wireless and therefore does not qualify for Plug-and-Play.
What does this pseudocode declare? declare MinutesPerHour as Number = 60
A primary key
A constant
A variable
An array
What is the easiest way to install a standard mouse, and configure it to use basic settings?
Get the disk with a special driver.
Download online driver from the manufacturer.
Use Control Panel/Settings
Use the Mouse app on the smartphone.
Why would a business choose satellite service instead of DSL (Digital Subscriber Line)?
Satellite systems provide bigger areas of coverage
Satellite service requires no special installation.
Satellite connection is faster.
Satellite connection is more reliable.
When does this pseudocode execute the print command?
If i == 0 AND i != 0
Then
print "Yes"
End If
When i is not equal to 0
Always
When i is equal to 0
Never
What is the main cause of memory leaks?
Damaged memory chips
Programming errors
Outdated software
Operating system upgrades
How does an object store its attributes?
As a vector
As comments
As private variables
As public variables
What is true regarding a 32-bit vs. a 64-bit CPU (Central Processing Unit)?
A 32-bit CPU can run a 64-bit OS.
All tablets use a 64-bit CPU.
All smartphones use a 32-bit CPU.
A 64-bit CPU can run a 32-bit OS.
Convert the binary number 1000000 into decimal notation.
40
32
64
128
What storage technology do SSDs (Solid State Drives) use?
Magnetic tape
Optical drive
Spinning disk
Flash memory
What type of software is project management software?
Productivity software
Networking software
Business software
Collaboration software
CompTIA's troubleshooting model includes having to establish a theory of probable cause. What is one of the components of this step?
Question the theory
Question the obvious
Question the internet
Question users
What does this pseudocode do? declare i as Number = 0 Do While i <= 100 i = i + 1 print i i = i - 1 Loop
Displays number "1" 100 times
Produces an infinite loop
Displays numbers from 0 to 99
Displays numbers from 1 to 100
Which of the following exposes a user to a Man-in-the-Middle (MitM) attack?
Encryption
Cipher text
A cryptographic hash
Plain text
What is a proper example of a string definition?
"It is polite to say "Thank you""
"The sales person said to the customer: "Have a nice day!" and smiled."
'It's going to be a great day.'
"We're so happy to see you!'
What is a key difference between copyright and a patent?
Patents are registered for a limited time only, but copyright protection is permanent
Copyright is valid for a limited time only, but a patent is granted on a permanent basis
Patents are granted automatically, but a copyright must be applied for and registered
Copyright protection happens automatically, but a patent must be applied for and registered
A systems engineer wants to control access to critical data. Which of the following describes a security concern regarding storing and transferring data without authorization?
Confidentiality
Integrity
Social engineering
Availability
Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?
In-vehicle entertainment
Black box
Parking assist
Sat-nav
A company operates in 2 offices. Both offices are located in the same town, with about 100 employees in each building. What type of network does it need to connect all of its employees, LAN (Local Area Network), or WAN (Wide Area Network)?
WAN, because LAN is unable to accommodate more than a few computers
LAN, because the company owns the equipment and cabling required to set it up
WAN, because there are multiple locations
LAN, because the offices are local to each other
Why would a locally installed application store data files in a user folder and not the application folder?
To separate the data layer from the application layer
To be able to uninstall the application without deleting the data files
For faster backups of the data fileso prevent users from modifying application folders
Which of the following is the most likely example of cross-platform software?
Application that runs on a Dell PC and a Samsung smartphone
Application that runs on a Dell PC and a Samsung laptop
Application that runs on a Samsung tablet and a Motorola smartphone
Application that runs from the Chrome browser on a Dell PC and Safari browser on an iMac
A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?
The enclosure provides ports to connect the drive to the computer
The enclosure protects the fragile drive from water damage
The enclosure converts a 2.5" portable drive into the 3.5" desktop standard
Te enclosure converts the external hard drive into internal/tabs
What indicates that a website has a highly trusted certificate?
Green padlock icon in front of address bar
URL starting with "https"
Padlock icon in front of address bar
Green address bar with no icon
What type of access control and technology helps ensure non-repudiation, and tracks what users are doing on the network?
Accounting; logs
Authorization access
Least privilege
Implicit deny
Which of the following helps to authenticate the user requesting a password reset over the telephone?
An IP address
A hardware token
Personally Identifiable Information (PII)
Biometric recognition
What type of software is Microsoft Office?
Productivity software
Project management software
Collaboration software
Business software
Which of the following does NOT encrypt web page data?
Hypertext Transfer Protocol Secure (HTTPS)
Mobile device encryption
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
A transport encryption protocol
A senior manager of a regional office branch needs a payroll report of all staff, to calculate next year's budget. Which program is NOT useful for that?
Accounting software
Spreadsheet software
Project management software
Database software
What is the main purpose of NIC (Network Interface Card) expansion card?
To serve as a faster alternative to the onboard NIC
To provide additional NICs to servers on a wired business network
To replace the outdated NIC on the motherboard
To allow workstation computers to connect to the network
The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take?
View log files
Escalate the problem.
Suggest workarounds
Use a product Knowledge Base
What is an example of an output device?
Digital camera
Optical disc
Loudspeaker
Keyboard
A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?
Train staff to identify Personally Identifiable Information (PII).
Install data monitoring solutions
Implement an Acceptable Use Policy
Write a company policy and procedure for escorting visitors
Which of the following ways best defeats social engineering?
Training end-users how to identify and report suspicious activity on the network or workstation
Allowing access to network resources by using innocuous data
By establishing enough trust with end-users so they will reveal secure information
Making sure employees directly observe other users type passwords
What is an example of using a locally installed application without network access?
Using Microsoft Word to write a letter
Using Microsoft Outlook to check email
Using the Intuit Quicken banking application to pay bills
Using Apple iTunes to listen to a podcast
A program is a sequence of what?
Attributes
Instructions
Flow charts
Functions
How do the CPU (Central Processing Unit) and storage devices in a computer process data?
As bits and bytes
As characters and strings
As integers and decimals
As zeros and ones
A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field?
As an attribute of the Customer object
As its own object
As an array of variables across all programs
As a property of the Customer object
What are the properties of a file "Books/CoverPhoto.js"?
It's an image file named "Books/CoverPhoto.js".
It's an executable file named "CoverPhoto.js" in folder "Books".
It's an image file named "CoverPhoto.js" in folder "Books".
It's a document file named "Books/CoverPhoto.js".
Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?
SELECT
DELETE
INSERT
DROP
A file contains information about the company's customers. The information includes Name, Address, Phone, and Email for each customer. What's the best way to convert this file into a database?
Create a database called Customers, with tables called Name, Address, Phone, and Email.
Create a database called Customers, with fields called Name, Address, Phone, and Email.
Create a table called Customers, with fields called Name, Address, Phone, and Email.
Create a table called Customers, with records called Name, Address, Phone, and Email.
An office computer needs a new keyboard and mouse. Before ordering them, the assistant should check which ports are available, to decide which style to purchase. Which port is NOT part of the consideration?
PS/2
USB
HDMI
Bluetooth
What problem is Windows' UAC (User Account Control) designed to solve?
Too many guest accounts
Elevated privileges
Too many administrative accounts
Inadequate account authentication
What is the end result of the iterative process of establishing and testing a theory while troubleshooting?
Ensure that the problem is never repeated.
Establish a root cause for the problem.
Resolve the problem.
Ientify the person responsible for creating the problem.
The direct database access method is the best method to run which SQL (Structured Query Language) command?
SELECT
UPDATE
GRANT
INSERT
Last updated