IT FUNDAMENTALS IT FUNDAMENTALS IT FUNDAMENTALS IT FUNDAMENTALS IT FUNDAMENTALS
100
Which of the following are examples of keyboard connectors? (Select TWO).
A. USB
B. RJ-11
C. Serial
D. FireWire
E. PS/2
E. PS/2
100
Which of the following is considered an optical storage medium?
A. SSD
B. Blu-Ray
C. Flash drive
D. Memory card
B. Blu-Ray
100
Several users want to share a common folder with high availability. Which of the following
devices is BEST to use for this requirement?
A. Large USB flash drive connected to a PC
B. Medium capacity SATA hard drive
C. Network attached storage appliance
D. Firewall with security management
C. Network attached storage appliance
100
Joe, a user, wishes to allow his roommate to access his personal computer for Internet
browsing, but does not want his roommate to have the ability to make changes to the
system. Which of the following BEST describes the type of account Joe should create for
his roommate?
A. Standard
B. Guest
C. Administrator
D. Power user
B. Guest
100
Which of the following is a reason that a user might upgrade a video card driver? (Select
TWO).
A. To decrease the screen resolution
B. To access monitor standby mode
C. To fix an error message
D. To use additional features
E. To adjust the brightness/contrast
C. To fix an error message
D. To use additional features
200
A user had to replace the hard drive in a computer. The user would like to install the games
that came with the computer but were not installed as part of the initial OS setup wizard.
The user can install the games by performing which of the following?
A. Schedule automatic updates.
B. Enable installed OS features.
C. Update hardware drivers.
D. Reinstall productivity applications.
B. Enable installed OS features.
200
Which of the following are best practices when it comes to using a computer in a public
location? (Select TWO).
A. Notify the administrator when finished.
B. Use strong passwords.
C. Turn off the computer when finished.
D. Disable the save password function on web pages.
E. Make sure to clean the keyboard when finished.
F. Make sure to log out of websites when done.
D. Disable the save password function on web pages.
F. Make sure to log out of websites when done.
200
Which of the following would BEST be described as password best practices? (Select
THREE).
A. Use of long passwords
B. Sharing passwords with a trusted source
C. Limiting password reuse
D. Keeping default passwords
E. Use of special characters
F. Writing down difficult passwords
A. Use of long passwords
C. Limiting password reuse
E. Use of special characters
200
A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of
the following describes this type of security threat?
A. Malware
B. Social engineering
C. Spam
D. Physical security
B. Social engineering
200
Before purchasing a new video card for a PC, which of the following should be checked to
ensure there will be enough electricity for the video card to function properly?
A. GPU
B. CPU
C. GUI
D. PSU
D. PSU
300
A user is at the office and has a cellular phone that previously functioned properly. The
phone is powered on with a fully charged battery. However, the phone does not have
connectivity. Which of the following describes the problem?
A. Phone is disconnected from WiFi
B. Provider is conducting system testing
C. MAC address is bad
D. Phone is in airplane mode
D. Phone is in airplane mode
300
Which of the following is a feature of a basic power strip?
A. Protects against lightning strikes
B. Provides multiple outlets for power
C. Generates power for devices
D. Provides battery backup for devices
B. Provides multiple outlets for power
300
Which of the following is MOST likely required during installation in order to legally install
software?
A. Automatic updates
B. Service level agreement
C. License key
D. Antivirus software
C. License key
300
Where can a user find the latest updates, upgrades, or firmware for an electronic device
that the vendor supports?
A. Internet search engine
B. Internet forum
C. Technical community groups
D. OEM website
D. OEM website
300
A laptop owner, Ann, can no longer see web pages when she opens her browser, and she
can only see her search bars and plug-ins. Which of the following is the MOST likely
source of this issue?
A. The computer does not have current antivirus software installed
B. The computer needs to have its components upgraded
C. The downloaded toolbars are filling the browser screen
D. The owner was not using complex passwords
C. The downloaded toolbars are filling the browser screen
400
Which of the following alternative technologies allows a computer to run multiple operating
systems without partitioning the hard drive?
A. Web applications
B. Dual boot
C. Telepresence
D. Virtualization
D. Virtualization
400
Which of the following connectors consists of three separate plugs for video?
A. Display port
B. S-video
C. Thunderbolt
D. Component
D. Component
400
A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which
of the following operating system types is required?
A. 8-bit
B. 16-bit
C. 32-bit
D. 64-bit
D. 64-bit
400
A user needs to download tax documents from a financial website. Which of the following is
the website MOST likely to use for transmission of the tax document to the users browser?
A. HTTP
B. HTTPS
C. SFTP
D. FTP
B. HTTPS
400
Which of the following are considered input devices for a computer? (Select TWO).
A. Mouse
B. Printer
C. Speakers
D. Microphone
E. Monitor
A. Mouse
D. Microphone
500
Which of the following is a 15-pin video connection?
A. DVI
B. S-video
C. Component
D. HDMI
E. VGA
E. VGA
500
Which of the following technologies allows people to communicate all over the world
inexpensively?
A. Virtualization
B. SSID
C. Kinetics
D. VoIP
D. VoIP
500
Which of the following BEST describes the pros and cons of a home wired network?
A. Low throughput, low mobility, high availability, high latency, high security
B. High throughput, high mobility, low availability, low latency, high security
C. High throughput, low mobility, high availability, low latency, high security
D. Low throughput, high mobility, low availability, high latency, low security
C. High throughput, low mobility, high availability, low latency, high security
500
When connecting a printer to a network, which of the following is needed to complete the
process? (Select TWO).
A. IP address
B. User's password
C. Computer’s name
D. Subnet mask
E. HTTP port
F. Fax number
A. IP address
D. Subnet mask
500
While browsing the Internet, a user receives a warning regarding the display of mixed
content. The address bar includes https, and the lock symbol is showing. Which of the
following does this warning indicate about the website?
A. It stores data in cache or cookies, but not both.
B. It requires login credentials for some sections.
C. It contains both secure and non-secure parts.
D. It is best viewed with a different browser.
C. It contains both secure and non-secure parts.






IT Fundamentals Part 2

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline