Exam 9: CompTIA IT Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

(Multiple Choice)
4.8/5
(32)

Which of the following are examples of keyboard connectors? (Select TWO).

(Multiple Choice)
4.8/5
(46)

A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?

(Multiple Choice)
4.8/5
(36)

Which of the following ports can be used to connect an external hard drive to a computer? (Select TWO).

(Multiple Choice)
4.9/5
(36)

Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?

(Multiple Choice)
4.9/5
(34)

Joe, a technician, has discovered that his SOHO router does not include features that are listed on the manufacturer's website. Which of the following would allow Joe to enable these missing features?

(Multiple Choice)
4.9/5
(43)

Which of the following is an advantage of installing an application to the cloud?

(Multiple Choice)
4.9/5
(40)

Which of the following describes sleep mode for a computer?

(Multiple Choice)
4.8/5
(43)

A user wants to update a driver for additional features. Where would the user find a current version of the driver from an official source?

(Multiple Choice)
4.8/5
(42)

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

(Multiple Choice)
4.9/5
(36)

A technician is setting up a computer that was shipped. After everything is plugged in, the computer will not turn on. Which of the following should the technician do FIRST to identify the issue?

(Multiple Choice)
4.9/5
(43)

A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?

(Multiple Choice)
4.8/5
(40)

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

(Multiple Choice)
4.7/5
(44)

Which of the following types of encryption would BEST protect a laptop computer in the event of theft?

(Multiple Choice)
4.8/5
(36)

Which of the following is considered an open-source operating system?

(Multiple Choice)
4.9/5
(35)

Which of the following are MOST likely to be configured during the initial setup of an OS on a basic workstation? (Select two.)

(Multiple Choice)
4.8/5
(33)

After installing the OS on a workstation, a technician notices that everything is displayed in large windows and the viewing area is limited. Which of the following will the technician need to adjust to resolve this issue?

(Multiple Choice)
4.9/5
(37)

When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?

(Multiple Choice)
4.8/5
(32)

A database administrator wants to populate a database with large amounts of data from an external source. Which of the following actions should be used to get the database populated?

(Multiple Choice)
4.8/5
(40)

A company needs an application that filters unwanted network traffic. Which of the following should be configured?

(Multiple Choice)
4.8/5
(41)
Showing 361 - 380 of 387
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)