🎯CompTIA IT Fundamentals - Practice Exam (85 Questions)

On a Windows operating system (OS), when a user wants to uninstall a driver, which page or window does NOT offer the relevant options to complete this task?

a. Control panel

b. Device manager

c. Task manager

d. System properties

What is the term used to describe technologies that ensure data availability in case of hardware failures?

a. Data encryption

b. Data backup

c. Data compression

d. Data virtualization

What is the primary importance of saving data to a storage device, like a hard disk?

  1. To free up RAM (Random Access Memory) for faster system performance.

  2. To ensure data persistence and prevent data loss in case of power failure or system shutdown.

  3. To improve network connectivity and data sharing.

  4. To enhance data processing speed for real-time applications.

How can a user safeguard sensitive information from malware when using a public computer?

  1. Log out of all accounts and shut down the workstation.

  2. Use a strong, unique password for each account.

  3. Clear the browser cache and browsing history regularly.

  4. Disable automatic updates for the operating system.

What distinguishes scripted languages from scripting languages?

  1. Scripted languages are exclusively used for web development, while scripting languages are versatile and used in various applications.

  2. Scripted languages are compiled, while scripting languages are interpreted.

  3. Scripted languages are statically typed, while scripting languages are dynamically typed.

  4. Scripted languages are designed for writing standalone applications, while scripting languages are mainly used for automating tasks and controlling other software.

Using a CLI can offer what benefit?

  1. Faster execution of tasks and greater resource efficiency.

  2. Enhanced visual appeal and ease of use for beginners.

  3. More intuitive and user-friendly interactions.

  4. Better support for multimedia applications and gaming.

What service is hosted in the cloud?

  1. An online email service where users access their email accounts via a web browser.

  2. A spreadsheet program installed on a desktop computer.

  3. A computer game downloaded and played offline.

What is a benefit of using a relational database instead of a key/value pair database?

  1. Enhanced scalability for large datasets.

  2. Simplicity of data modeling and storage.

  3. Efficient retrieval of specific data based on complex queries.

  4. Better suited for caching and session management.

What is a method that ensures data is encrypted when it is stored on a storage device or disk?

  1. VPN (Virtual Private Network)

  2. Full-disk encryption

  3. Firewall configuration

  4. Intrusion Detection System (IDS)

When working with address information that includes a house number and a street name, which data type is most suitable for representing the house number?

  1. Integer

  2. Text

  3. Date

  4. Boolean

An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe?

  • Power Outage

  • Hardware failure

  • Man-in-the-Middle (MitM)

  • Denial of Service (DoS)

A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?

  • Devices and Printers

  • Settings/Devices

  • Device Drivers

  • Device Manager

What are the four functions which represent most of the ways that data moves through a computer system?

  • Input, output, processing, storage

  • Addition, subtraction, division, multiplication

  • Typing, editing, copying, printing

  • Automation, replication, optimization, recovery

What's a true statement about query languages?

  • Query language code is the most complex code.

  • Query language code is not human-readable.

  • Query language code does not need to be compiled.

  • Query languages can only be used on one platform.

A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it?

  • Type II, because VirtualBox is a software application within a host operating system

  • Type I, because VirtualBox manages the virtual machine environment

  • Type II, because Linux provides the resources for the virtual environment

  • Type I, because the Linux OS is installed directly on the computer

Which of the following does NOT follow accepted MAC (Media Access Control) address format?

  • 192:168:0.10/100

  • a1-b2-c3-d4-e5-f6

  • 0123456789ff

  • 1111.2222.3333

A web application contains a form, which users fill out. What is the most likely use for this form?

  • To create a flat file for each user

  • To create a database

  • To manually input data into a database

  • To import data from a flat file into a database

What does a database dump contain?

  • SQL statements which can recreate all tables

  • A flat file with full contents of all tables

  • A hard disk with an exact copy of the database

  • A formatted report of the contents of all tables

If a worm propagates over a network, which of the following is the first action to take, to prevent further infection?

  • Escalate the problem to a support professional.

  • Use antivirus software to try to remove the infection.

  • Disconnect the network link.

  • Enable on-access scanning.

When a general language performs scripting, what does it call on as part of the code?

  • Markup instructions

  • Query statements

  • System commands

  • Machine code

Why would a programmer create a function instead of a procedure?

  • The function needs to include a nested loop, which does not work in a procedure.

  • The process which calls the function needs to receive back a return value.

  • Procedures do not exist in some programming languages.

  • Functions compile more efficiently.

Data encryption, firewalls, and backups are examples of what?

  • Intellectual property

  • Data breach

  • Data capture

  • Security controls

Which file system allows a file with the name "Encyclopedia:Volume 1.txt"?

  • FAT32

  • HFS+

  • Ext4

  • NTFS

Which of the following is an example of an optical drive?

  • SSD

  • DVD

  • HDD

  • DDR

A web browser is an example of productivity software. What type of software is an email client?

  • Collaboration software

  • Open source software

  • Business software

  • Productivity software

An employee makes unauthorized copies of customer Social Security numbers, saves them in an unencrypted spreadsheet, and transfers them to the employee’s personal email account. The employee then opens new credit card accounts with this information and uses the cards to buy personal items. Which of the following did NOT occur?

  • Identity checks

  • Identity theft

  • Identity fraud

  • Mishandling Personally Identifiable Information (PII)

What is an authorization policy that would help a systems administrator grant rights to users to perform their job and no more?

  • Non-repudiation

  • Requiring digital signatures

  • Least privilege

  • Reviewing logging events

If a password is short and non-complex, what type of attack can it be vulnerable to?

  • Man-in-the-Middle (MitM)

  • Malware

  • Brute force

  • Distributed Denial of Service (DDoS)

The first step in the troubleshooting process is to identify the problem. What are some of the components of this step?

  • Approach multiple problems individually; divide and conquer.

  • Question users; document findings.

  • Research symptoms; consider multiple approaches.

  • Duplicate the problem; determine if anything has changed.

A systems administrator is installing a new wireless access point (AP). During installation, the administrator should make sure to complete which of the following?

  • Enable all services on the wireless AP.

  • Change the SSID to something that helps identify the administrator.

  • Change the default password.

  • Store a hardcopy of a complex password of at least 12 characters.

Which of the following is NOT part of IoT (Internet of Things) home automation?

  • Sprinkler system

  • Door lock

  • Insulin pump

  • HVAC

When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service?

  • A short password history

  • Password managers

  • Reusing passwords across multiple sites

  • The IT department resetting passwords

Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?

  • NFC

  • NAS

  • NIC

  • NID

Which of the following is the best example of variety of data in a database?

  • A table with a string, number, and date fields

  • A string field with data in multiple languages

  • A table with a tinyint, integer, float, and decimal fields

  • A number field with values from -999,999,999,999 to 999,999,999,999

What is an advantage of the float data type compared to the integer data type?

  • The float data type is a more natural way of expressing numbers in computing systems.

  • The float data type is not limited to whole numbers.

  • The float data type requires less processing time for arithmetic operations.

  • The float data type consumes less storage.

What is an advantage of using a CLI (Command Line Interface) instead of GUI (Graphical User Interface)?

  • With CLI, it is easier to multitask when working on different things at once

  • Non-technical users can learn how to use CLI faster than GUI

  • CLI takes up less system resources to run.

  • More people use CLI, so there is more help available.

What type of database uses a schema?

  • Document

  • Semi-structured

  • Key/value pair

  • Relational

Which of these practices is unsecure as your security becomes dependent on other organizations' security measures?

  • Shortening password expiration

  • Reusing across sites

  • Writing down password

  • Using passphrase with special characters/tabs

A computer program contains a boolean variable. What are the stored values of this variable?

  • FALSE, TRUE

  • "F", "T"

  • 0,1

  • 'false","true'

Which of the following SQL (Structured Query Language) commands can run with just one parameter?

  • CREATE DATABASE

  • CREATE TABLE

  • CREATE INDEX

  • CREATE VIEW

A wireless network in a small home office generated poor signal quality. The signal improved when an old cordless phone stopped working. What problem did the cordless phone cause when it was active?

  • Bluetooth signal overlap

  • Attenuation

  • Modulation

  • Interference

A new scanner is purchased for the office, and the technician is using a disk with driver software instead of Plug-and-Play. What is the most likely reason?

  • The technician does not have enough expertise to use Plug-and-Play.

  • Plug-and-Play installation did not work for this scanner model.

  • The computer is running Windows 7, which does not have Plug-and-Play.

  • The scanner is wireless and therefore does not qualify for Plug-and-Play.

What does this pseudocode declare? declare MinutesPerHour as Number = 60

  • A primary key

  • A constant

  • A variable

  • An array

What is the easiest way to install a standard mouse, and configure it to use basic settings?

  • Get the disk with a special driver.

  • Download online driver from the manufacturer.

  • Use Control Panel/Settings

  • Use the Mouse app on the smartphone.

Why would a business choose satellite service instead of DSL (Digital Subscriber Line)?

  • Satellite systems provide bigger areas of coverage

  • Satellite service requires no special installation.

  • Satellite connection is faster.

  • Satellite connection is more reliable.

When does this pseudocode execute the print command?

If i == 0 AND i != 0

Then

print "Yes"

End If

  • When i is not equal to 0

  • Always

  • When i is equal to 0

  • Never

What is the main cause of memory leaks?

  • Damaged memory chips

  • Programming errors

  • Outdated software

  • Operating system upgrades

How does an object store its attributes?

  • As a vector

  • As comments

  • As private variables

  • As public variables

What is true regarding a 32-bit vs. a 64-bit CPU (Central Processing Unit)?

  • A 32-bit CPU can run a 64-bit OS.

  • All tablets use a 64-bit CPU.

  • All smartphones use a 32-bit CPU.

  • A 64-bit CPU can run a 32-bit OS.

Convert the binary number 1000000 into decimal notation.

  • 40

  • 32

  • 64

  • 128

What storage technology do SSDs (Solid State Drives) use?

  • Magnetic tape

  • Optical drive

  • Spinning disk

  • Flash memory

What type of software is project management software?

  • Productivity software

  • Networking software

  • Business software

  • Collaboration software

CompTIA's troubleshooting model includes having to establish a theory of probable cause. What is one of the components of this step?

  • Question the theory

  • Question the obvious

  • Question the internet

  • Question users

What does this pseudocode do? declare i as Number = 0 Do While i <= 100 i = i + 1 print i i = i - 1 Loop

  • Displays number "1" 100 times

  • Produces an infinite loop

  • Displays numbers from 0 to 99

  • Displays numbers from 1 to 100

Which of the following exposes a user to a Man-in-the-Middle (MitM) attack?

  • Encryption

  • Cipher text

  • A cryptographic hash

  • Plain text

What is a proper example of a string definition?

  • "It is polite to say "Thank you""

  • "The sales person said to the customer: "Have a nice day!" and smiled."

  • 'It's going to be a great day.'

  • "We're so happy to see you!'

What is a key difference between copyright and a patent?

  • Patents are registered for a limited time only, but copyright protection is permanent

  • Copyright is valid for a limited time only, but a patent is granted on a permanent basis

  • Patents are granted automatically, but a copyright must be applied for and registered

  • Copyright protection happens automatically, but a patent must be applied for and registered

A systems engineer wants to control access to critical data. Which of the following describes a security concern regarding storing and transferring data without authorization?

  • Confidentiality

  • Integrity

  • Social engineering

  • Availability

Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation?

  • In-vehicle entertainment

  • Black box

  • Parking assist

  • Sat-nav

A company operates in 2 offices. Both offices are located in the same town, with about 100 employees in each building. What type of network does it need to connect all of its employees, LAN (Local Area Network), or WAN (Wide Area Network)?

  • WAN, because LAN is unable to accommodate more than a few computers

  • LAN, because the company owns the equipment and cabling required to set it up

  • WAN, because there are multiple locations

  • LAN, because the offices are local to each other

Why would a locally installed application store data files in a user folder and not the application folder?

  • To separate the data layer from the application layer

  • To be able to uninstall the application without deleting the data files

  • For faster backups of the data fileso prevent users from modifying application folders

Which of the following is the most likely example of cross-platform software?

  • Application that runs on a Dell PC and a Samsung smartphone

  • Application that runs on a Dell PC and a Samsung laptop

  • Application that runs on a Samsung tablet and a Motorola smartphone

  • Application that runs from the Chrome browser on a Dell PC and Safari browser on an iMac

A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?

  • The enclosure provides ports to connect the drive to the computer

  • The enclosure protects the fragile drive from water damage

  • The enclosure converts a 2.5" portable drive into the 3.5" desktop standard

  • Te enclosure converts the external hard drive into internal/tabs

What indicates that a website has a highly trusted certificate?

  • Green padlock icon in front of address bar

  • URL starting with "https"

  • Padlock icon in front of address bar

  • Green address bar with no icon

What type of access control and technology helps ensure non-repudiation, and tracks what users are doing on the network?

  • Accounting; logs

  • Authorization access

  • Least privilege

  • Implicit deny

Which of the following helps to authenticate the user requesting a password reset over the telephone?

  • An IP address

  • A hardware token

  • Personally Identifiable Information (PII)

  • Biometric recognition

What type of software is Microsoft Office?

  • Productivity software

  • Project management software

  • Collaboration software

  • Business software

Which of the following does NOT encrypt web page data?

  • Hypertext Transfer Protocol Secure (HTTPS)

  • Mobile device encryption

  • Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

  • A transport encryption protocol

A senior manager of a regional office branch needs a payroll report of all staff, to calculate next year's budget. Which program is NOT useful for that?

  • Accounting software

  • Spreadsheet software

  • Project management software

  • Database software

What is the main purpose of NIC (Network Interface Card) expansion card?

  • To serve as a faster alternative to the onboard NIC

  • To provide additional NICs to servers on a wired business network

  • To replace the outdated NIC on the motherboard

  • To allow workstation computers to connect to the network

The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take?

  • View log files

  • Escalate the problem.

  • Suggest workarounds

  • Use a product Knowledge Base

What is an example of an output device?

  • Digital camera

  • Optical disc

  • Loudspeaker

  • Keyboard

A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?

  • Train staff to identify Personally Identifiable Information (PII).

  • Install data monitoring solutions

  • Implement an Acceptable Use Policy

  • Write a company policy and procedure for escorting visitors

Which of the following ways best defeats social engineering?

  • Training end-users how to identify and report suspicious activity on the network or workstation

  • Allowing access to network resources by using innocuous data

  • By establishing enough trust with end-users so they will reveal secure information

  • Making sure employees directly observe other users type passwords

What is an example of using a locally installed application without network access?

  • Using Microsoft Word to write a letter

  • Using Microsoft Outlook to check email

  • Using the Intuit Quicken banking application to pay bills

  • Using Apple iTunes to listen to a podcast

A program is a sequence of what?

  • Attributes

  • Instructions

  • Flow charts

  • Functions

How do the CPU (Central Processing Unit) and storage devices in a computer process data?

  • As bits and bytes

  • As characters and strings

  • As integers and decimals

  • As zeros and ones

A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field?

  • As an attribute of the Customer object

  • As its own object

  • As an array of variables across all programs

  • As a property of the Customer object

What are the properties of a file "Books/CoverPhoto.js"?

  • It's an image file named "Books/CoverPhoto.js".

  • It's an executable file named "CoverPhoto.js" in folder "Books".

  • It's an image file named "CoverPhoto.js" in folder "Books".

  • It's a document file named "Books/CoverPhoto.js".

Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command?

  • SELECT

  • DELETE

  • INSERT

  • DROP

A file contains information about the company's customers. The information includes Name, Address, Phone, and Email for each customer. What's the best way to convert this file into a database?

  • Create a database called Customers, with tables called Name, Address, Phone, and Email.

  • Create a database called Customers, with fields called Name, Address, Phone, and Email.

  • Create a table called Customers, with fields called Name, Address, Phone, and Email.

  • Create a table called Customers, with records called Name, Address, Phone, and Email.

An office computer needs a new keyboard and mouse. Before ordering them, the assistant should check which ports are available, to decide which style to purchase. Which port is NOT part of the consideration?

  • PS/2

  • USB

  • HDMI

  • Bluetooth

What problem is Windows' UAC (User Account Control) designed to solve?

  • Too many guest accounts

  • Elevated privileges

  • Too many administrative accounts

  • Inadequate account authentication

What is the end result of the iterative process of establishing and testing a theory while troubleshooting?

  • Ensure that the problem is never repeated.

  • Establish a root cause for the problem.

  • Resolve the problem.

  • Ientify the person responsible for creating the problem.

The direct database access method is the best method to run which SQL (Structured Query Language) command?

  • SELECT

  • UPDATE

  • GRANT

  • INSERT

Last updated