Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CompTIA FC0-U51 CompTIA IT Fundamentals Exam Practice Test

Demo: 31 questions
Total 286 questions

CompTIA IT Fundamentals Questions and Answers

Question 1

Which of the following alternative technologies allows a computer to run multiple operating systems without partitioning the hard drive?

Options:

A.

Web applications

B.

Dual boot

C.

Telepresence

D.

Virtualization

Question 2

Which of the following operating systems is very lightweight and relies heavily on Internet applications?

Options:

A.

Chrome OS

B.

Windows

C.

Linux

D.

Blackberry OS

Question 3

Which of the following file formats contain other files within them? (Select TWO).

Options:

A.

tiff

B.

dmg

C.

png

D.

mp3

E.

iso

F.

flac

Question 4

By default, which of the following types of operating systems can automatically detect a user’s location while the user is traveling in a bus?

Options:

A.

Server

B.

Desktop workstation

C.

Virtual server

D.

Mobile

Question 5

Which of the following features of a smartphone controls the screen orientation?

Options:

A.

Gyroscope

B.

NFC

C.

Accelerometer

D.

GPS

Question 6

A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following?

Options:

A.

Schedule automatic updates.

B.

Enable installed OS features.

C.

Update hardware drivers.

D.

Reinstall productivity applications.

Question 7

A user, Ann, is experiencing slow browsing on a website she frequently visits that displays constant pop-up ads. Which of the following is the MOST likely cause?

Options:

A.

The browser is incompatible with the website

B.

The workstation has been infected with malware

C.

The website is not secured by SSL

D.

The certificate of the website has expired

Question 8

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?

Options:

A.

Email address

B.

Phone number

C.

Mother’s maiden name

D.

Last name

Question 9

A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?

Options:

A.

Malware

B.

Social engineering

C.

Spam

D.

Physical security

Question 10

Joe, a user, wishes to allow his roommate to access his personal computer for Internet browsing, but does not want his roommate to have the ability to make changes to the system. Which of the following BEST describes the type of account Joe should create for his roommate?

Options:

A.

Standard

B.

Guest

C.

Administrator

D.

Power user

Question 11

A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).

Options:

A.

Keyboard

B.

Speakers

C.

Mouse

D.

Bluetooth

E.

NFC

Question 12

A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?

Options:

A.

The computer does not have current antivirus software installed

B.

The computer needs to have its components upgraded

C.

The downloaded toolbars are filling the browser screen

D.

The owner was not using complex passwords

Question 13

An employee’s new computer came with a free 30-day trial version of antivirus software. The employee’s company provides enterprise antivirus software from a different vendor. Which of the following should the employee do in order to use a full version of antivirus software?

Options:

A.

Enter the company product key for the antivirus software, enabling the full version.

B.

Uninstall the current version antivirus software and install the company version.

C.

Verify Internet connectivity and run online virus scanning software.

D.

Update the trial antivirus software to the latest version.

Question 14

Which of the following is a file on a computer that links to another program or file somewhere else on the same computer?

Options:

A.

Shortcut

B.

URL

C.

Attachment

D.

FTP

Question 15

A user working on a laptop notices the mouse cursor frequently moves to random locations in a document while typing. Which of the following should the user do FIRST to help resolve this issue?

Options:

A.

Ask tech support for help.

B.

Reboot the laptop.

C.

Turn off the touchpad.

D.

Reconnect the mouse.

Question 16

Which of the following can a user configure on an operating system so that an audible sound is made when an error message is displayed?

Options:

A.

Encryption

B.

Hot keys

C.

Accessibility options

D.

Screen captures

Question 17

After initial OS and application installation on a laptop, an application warns that it will only work 24 more times. Which of the following should be done NEXT?

Options:

A.

The application has to be registered to the user.

B.

The application must be upgraded to a 64-bit version.

C.

The application must be activated.

D.

The application needs to be reinstalled.

Question 18

Ann, a user, reports that her computer was working this morning, but now the screen is blank. The power indicator for the monitor is on. Pressing the space bar or mouse does not fix the problem. Which of the following is the cause?

Options:

A.

The monitor power cable is unplugged.

B.

The video cable has become disconnected.

C.

The video driver is not installed.

D.

The operating system has encountered a stop error.

E.

The screen saver has activated.

Question 19

A user, Joe, is concerned about the safety of his personal information on a website. Which of the following can Joe look for to ensure that his personal information is not at risk? (Select TWO).

Options:

A.

HTTP on the browser address bar

B.

Suspicious ads in the browser

C.

HTTPS on the browser address bar

D.

A lock symbol on the browser address bar

E.

The word secure in the browser address bar

Question 20

Which of the following allows for hands-free operation of a wireless device?

Options:

A.

Encryption

B.

Wireless password

C.

Bluetooth pairing

D.

Internet connectivity

Question 21

Which of the following internal components is used for temporary data storage in a workstation?

Options:

A.

Power supply

B.

CPU

C.

RAM

D.

Hard drive

Question 22

Which of the following storage methods is MOST likely used in corporate settings to save large amounts of data in a secured manner?

Options:

A.

HTTP

B.

HTTPS

C.

FTPS

D.

FTP

Question 23

Which of the following data connections can span the FARTHEST distance?

Options:

A.

WiFi

B.

Dial-up

C.

Satellite

D.

Cable

Question 24

Which of the following is considered an open-source operating system?

Options:

A.

Windows

B.

Chrome OS

C.

Mac OS X

D.

Linux

Question 25

Which of the following computer components are used to store data? (Select TWO).

Options:

A.

GPU

B.

HDD

C.

RAM

D.

NIC

E.

CPU

Question 26

When considering backup media, which of the following holds the MOST data?

Options:

A.

BD-R

B.

DVD-R

C.

DVD-DL

D.

CD-ROM

Question 27

Which of the following is considered an optical storage medium?

Options:

A.

SSD

B.

Blu-Ray

C.

Flash drive

D.

Memory card

Question 28

Which of the following is the function of a CPU?

Options:

A.

Encrypts data for remote transmission

B.

Performs data computation

C.

Supplies electricity to components

D.

Provides storage location for files

Question 29

Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).

Options:

A.

Network connection

B.

Microphone

C.

Modem

D.

Firewall

E.

Webcam

F.

Cable connection

G.

Wired NIC

Question 30

Which of the following could be described as both an input and output device?

Options:

A.

Flat-screen monitor

B.

Multi-function printer

C.

Microphone

D.

Scanner

Question 31

Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?

Options:

A.

Change the router administrator username.

B.

Change the router’s broadcasting channel.

C.

Update the unit’s firmware.

D.

Use a complex administrator password.

Demo: 31 questions
Total 286 questions