IT FUNDAMENTALS IT FUNDAMENTALS IT FUNDAMENTALS IT FUNDAMENTALS IT FUNDAMENTALS
100
Which of the following is an example of ransomware?
A. A user is asked to pay a fee for a password to unlock access to their files.
B. A user receives an email demanding payment for a trial application that has stopped working.
C. A user has opened an Internet browser and is taken to a site that is not the normal home page.
D. A user is asked to open an attachment that verifies the price of an item that was not ordered.
A. A user is asked to pay a fee for a password to unlock access to their files.
100
Malware that has an embedded keylogger to capture all of the keystrokes and steal logins
is considered:
A. adware
B. spyware
C. ransomware
D. phishing
B. spyware
100
A home computer that has been in operation for more than five years is now suffering from
random shutdowns during the day. The PC is set up in an enclosed cubby built into the
home office desk. Which of the following is MOST likely plaguing the PC?
A. The PC was switched over to 240v operation mode
B. Dust accumulation
C. The PC’s BIOS is severely out-of-date, causing PSU issues
D. EMI
B. Dust accumulation
100
Which of the following defines why backup verification is important?
A. To ensure that the backup runs as quickly as possible
B. To ensure that the backup can be stored indefinitely
C. To ensure that the backup can be saved to the cloud
D. To ensure that the backup contains usable data
D. To ensure that the backup contains usable data
100
A user wants to have the latest security patches and bug fixes installed on a computer.
Which of the following is the BEST method to achieve this?
A. Configure anti-malware updates
B. Manually update before each use
C. Update every six months
D. Schedule automatic updates
D. Schedule automatic updates
200
A user is configuring a new wireless router. Which of the following should be done to
ensure that unauthorized changes cannot be made?
A. Change the SSID
B. Change the router’s address
C. Change the administrator password
D. Change the encryption key
C. Change the administrator password
200
Ann, a user, reports that her computer was working this morning, but now the screen is
blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not
fix the problem. Which of the following is the cause?
A. The monitor power cable is unplugged.
B. The video cable has become disconnected.
C. The video driver is not installed.
D. The operating system has encountered a stop error.
E. The screen saver has activated.
B. The video cable has become disconnected.
200
Which of the following has the lowest latency?
A. SSD
B. NAS
C. Blu-Ray
D. DVD
A. SSD
200
A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy
access to all of her banking and email. Which of the following precautions could be taken to
mitigate this issue?
A. Only browse the Internet on WiFi connections that use WPA2
B. Turn off the guest account in the operating system
C. Disable autofill functionality within the web browser
D. Remove any legacy browsers from the computer
C. Disable autofill functionality within the web browser
200
A technician has added an external hard drive to a personal computer. The hard drive is
powered on, but the computer does not see the new hard disk. Which of the following is the
FIRST thing the technician should check?
A. The power cable
B. The OS version for compatibility
C. The hard drive firmware revision
D. The data cable
D. The data cable
300
When setting up a new device, there are multiple features available that will never be used.
Which of the following should the user do to make the new device more secure?
A. Make all users administrators.
B. Remove or disable the unnecessary features.
C. Install a password manager on the device.
D. Make all users guests.
B. Remove or disable the unnecessary features.
300
Joe, a user, has just installed his first home wireless router. Which of the following tasks
should be considered to help secure the unit from any confirmed exploits?
A. Change the router administrator username.
B. Change the router’s broadcasting channel.
C. Update the unit’s firmware.
D. Use a complex administrator password.
C. Update the unit’s firmware.
300
Which of the following is the BEST security practice to use when configuring the
management options of a wireless router?
A. Disable DHCP
B. Change the admin password
C. Enable SSID
D. Enable remote administration
B. Change the admin password
300
Which of the following permissions is required to run a .bat file?
A. Delete
B. Execute
C. Write
D. Modify
B. Execute
300
A user, Joe, is concerned about the safety of his personal information on a website. Which
of the following can Joe look for to ensure that his personal information is not at risk?
(Select TWO).
A. HTTP on the browser address bar
B. Suspicious ads in the browser
C. HTTPS on the browser address bar
D. A lock symbol on the browser address bar
E. The word secure in the browser address bar
C. HTTPS on the browser address bar
D. A lock symbol on the browser address bar
400
Which of the following is a safety feature of cloud-based backups?
A. Incremental copy of data
B. Local copy of data
C. Offsite storage of data
D. Full backup of PC data
C. Offsite storage of data
400
Which of the following is required to have a multimedia conversation with someone across
the Internet? (Select THREE).
A. Network connection
B. Microphone
C. Modem
D. Firewall
E. Webcam
F. Cable connection
G. Wired NIC
A. Network connection
B. Microphone
E. Webcam
400
When trying to activate the operating system, a user receives a notice that the software is
not genuine. Which of the following security threats has occurred?
A. Social engineering
B. Phishing
C. Virus attack
D. License theft
D. License theft
400
Which of the following security threats is classified as license theft?
A. Entering the neighbor’s software key
B. Using software to reveal a password
C. Searching through the trash for passwords
D. Watching what a user types on screen
A. Entering the neighbor’s software key
400
Which of the following CPU cooling types is BEST in a dusty environment?
A. Liquid cooling
B. Open case
C. Case fan
D. Heat sink fan
A. Liquid cooling
500
After initial OS and application installation on a laptop, an application warns that it will only
work 24 more times. Which of the following should be done NEXT?
A. The application has to be registered to the user.
B. The application must be upgraded to a 64-bit version.
C. The application must be activated.
D. The application needs to be reinstalled.
C. The application must be activated.
500
Joe, a user, saves a document to a flash drive on his computer in order to print the
document from a public computer kiosk. After returning home and reinserting the flash
drive in his computer, the security software identifies an infected file on the flash drive.
Which of the following is the MOST likely cause of the infection?
A. The flash drive was infected by a war driving hacker on the way to the public kiosk.
B. The public workstation was infected by Joe’s flash drive.
C. The public workstation was infected and passed the virus to the flash drive.
D. The flash drive was already infected by the user’s computer.
C. The public workstation was infected and passed the virus to the flash drive.
500
A technician wants to minimize the risk of having third parties track previously visited web
pages. Which of the following should be performed in the Internet browsers settings?
(Select TWO).
A. Select form data
B. Disable location services
C. Remove cookies
D. Clear history
E. Change passwords
C. Remove cookies
D. Clear history
500
Which of the following allows for hands-free operation of a wireless device?
A. Encryption
B. Wireless password
C. Bluetooth pairing
D. Internet connectivity
C. Bluetooth pairing
500
A home user wants to share files between two different computers. The user wants the files
to be available to either computer, regardless of whether either computer is turned on.
Which of the following is the BEST storage method?
A. USB storage
B. Internal storage
C. Direct attached storage
D. Network attached storage
D. Network attached storage






IT Fundamentals Part 5

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline