CompTIA IT Fundamentals Certification Practice Questions
CompTIA IT Fundamentals Certification Practice Questions
Questions
Question 1
Which of the following is used for temporary storage of program data that
is cleared when the computer is turned off?
A. CPU
B. SSD
C. Hard drive
D. System memory
Question 2
Which of the following methods of patching allows for vendor controlled
updates, reduced user interaction, and increased security of the operating
system or application?
Question 3
Which of the following security threats would the use of cable locks
reduce?
A. Shoulder surfing
B. Phishing
C. Hardware theft
D. Dumpster diving
Question 4
Which of the following is a reason why password complexity is a best
practice?
1|Page
A. It makes passwords harder to crack.
B. It encourages users to write down passwords so they are not forgotten.
C. It forces users to develop typing skills.
D. It discourages users from using the same password with different accounts.
Question 5
A user receives an email containing a link. When they hover the mouse
over the link, the actual URL does not match the text in the body of the
email and appears to be a string of random characters. Which of the
following is the BEST course of action?
Question 6
Which of the following components serves as temporary storage for
computer operations?
A. System board
B. Central processing unit
C. Random access memory
D. Expansion card
Question 7
The extension .rtf is an example of which of the following file types?
A. Document
B. Executable
C. Audio
D. Speadsheet
2|Page
Question 8
Which of the following is a common way to prevent physical theft of a
laptop or workstation?
Question 9
After installing a new software application, a user notices that the
application launches in demo mode. Which of the following needs to be
done to fully activate the software package?
Question 10
A user's laptop hard drive contains sensitive information. The user often
plugs the laptop into the corporate network. A sensitive file from the laptop
has been found on another user's laptop. How could the user have
prevented this breach?
Question 11
A user's government identification number, birth date, and current address
are considered which of the following?
A. IMAP
B. HTTP
3|Page
C. PII
D. HTTPS
Question 12
Which of the following is the function of a CPU?
Question 13
When trying to activate the operating system, a user receives a notice that
the software is not genuine. Which of the following security threats has
occurred?
A. Social engineering
B. Phishing
C. Virus attack
D. License theft
Question 14
A user is configuring a SOHO wireless router. The user should change the
router's default administrator password for which of the following reasons?
Question 15
A user wants to purchase a CAD application that requires 8GB of RAM to
operate. Which of the following operating system types is required?
A. 8-bit
B. 16-bit
4|Page
C. 32-bit
D. 64-bit
Question 16
Several users want to share a common folder with high availability. Which
of the following devices is BEST to use for this requirement?
Question 17
Which of the following is the component responsible for interconnectivity
of internal system devices?
A. System case
B. Power supply
C. Motherboard
D. Expansion card
Question 18
Which of the following software types protects a desktop from malicious
attacks?
A. Backup
B. Antivirus
C. Diagnostic
D. Screensaver
Question 19
Which of the following internal computer components is used to connect
video, audio, and network cards?
A. CPU
B. Motherboard
5|Page
C. Hard drive
D. Modem
Question 20
Which of the following is MOST important to ensure a computer
temperature is maintained within normal limits?
Question 21
An employee is using a desk phone that is connected only via a network
cable. Which of the following technologies is the phone using?
A. LTE
B. GSM
C. VoIP
D. CDMA
Question 22
Which of the following file types is used to consolidate a group of files?
A. .rtf
B. .m3u
C. .avi
D. .rar
Question 23
Which of the following permissions is required to run a .bat file?
A. Delete
B. Execute
C. Write
D. Modify
6|Page
Question 24
After installing the OS on a workstation, a technician notices that
everything is displayed in large windows and the viewing area is limited.
Which of the following will the technician need to adjust to resolve this
issue?
A. Color depth
B. Orientation
C. DPI settings
D. Resolution
Question 25
Which of the following connector types can be used by both mice and
keyboards? (Select TWO).
A. Thunderbolt
B. eSATA
C. USB
D. PS/2
E. FireWire
Question 26
Which of the following will allow the easiest and fastest way to share a
single file between two modern smartphones without joining the same WiFi
network?
A. Micro SD card
B. Bluetooth
C. USB connection
D. Infrared
Question 27
An end-user has 16GB of RAM installed on a computer system. Which of
the following describes why the OS only uses a maximum of 4GB of RAM?
7|Page
A. The operating system is 16-bit.
B. The computer has corrupted RAM.
C. The computer has a defective motherboard.
D. The operating system is 32-bit.
E. The computer has a virus.
Question 28
A technician just installed a new computer. Which of the following is the
BEST way to manage the cables?
A. Line the cables up neatly and wrap them together with cable ties.
B. Leave the cables loose to prevent interference between wires.
C. Nail the cables to the wall.
D. Tuck the cables neatly underneath the carpet.
Question 29
A user wants to run a major update on a laptop. Which of the following
should be considered before running any major updates?
Question 30
Which of the following allows for the FASTEST printer connections?
A. Bluetooth
B. USB
C. Parallel
D. Serial
Question 31
A user needs to establish an initial password for an email account. Which
of the following is the BEST example of a complex password?
8|Page
A. 01#iWant!2686612338
B. iWantobeaCosmonau#
C. 01c234n56789v9876x21
D. 012iWanttobe210
Question 32
Which of the following is an advantage of using a 64-bit operating system?
Question 33
A user has finished browsing the Internet on a public hotel workstation.
Which of the following steps should be taken to BEST secure PII?
Question 34
Which of the following storage units can be used to represent 1024MB?
A. 1GB
B. 1KB
C. 1TB
D. 1PB
Question 356
An image displayed on a monitor is an example of:
A. input.
B. output.
9|Page
C. processing.
D. storage.
Question 36
A school has a sign posted in the computer lab that says, "Sharing
passwords with others is prohibited." This is an example of:
A. social networking.
B. a security policy.
C. file sharing.
D. instant messaging.
Question 37
A user buys a new desktop computer and then connects a cable that allows
the computer to connect to the web. Which of the following ports would
MOST likely be used?
A. DVI
B. HDMI
C. Ethernet
D. Thunderbolt
E. Bluetooth
Question 38
Which of the following would BEST help to protect against unauthorized
use of a mobile phone?
Question 39
Ann, a user, connects a new mouse to a laptop, and the mouse works with
10 | P a g e
no additional steps taken by Ann. Which of the following installation types
does this BEST describe?
A. Driver installation
B. Plug and play
C. Web based
D. Manual
Question 40
Which of the following protocols is used for secure web browsing?
A. SFTP
B. HTTPS
C. L2TP
D. IMAP
Question 41
Which of the following is the MOST secure password?
A. happybirthday12
B. HappyDay12!
C. H*ppyBirthDay%12
D. HappyBirthDay123
Question 42
Which of the following computer components is primarily responsible for
preventing overheating?
A. Fan
B. SSD
C. CPU
D. Firmware
Question 43
Which of the following software licensing types is MOST likely to require
the renewal of terms/conditions agreements and has annual fees?
11 | P a g e
A. One-time purchase
B. Open source
C. Group license
D. Subscription
Question 44
A technician is setting up a computer that was shipped. After everything is
plugged in, the computer will not turn on. Which of the following should the
technician do FIRST to identify the issue?
Question 45
A user wants to purchase a CAD application that requires 8GB of RAM to
operate. Which of the following operating system types is required?
Answer : D
A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit
Question 46
What is 75 decimal in binary?
A) 1001001
B) 1011010
C) 1001011
D) 1100101
12 | P a g e