Exam 9: CompTIA IT Fundamentals
Exam 1: CompTIA A+ Certification Exam: Core 1471 Questions
Exam 2: CompTIA A+ Certification Exam: Core 2409 Questions
Exam 3: CompTIA Advanced Security Practitioner (CASP+) CAS-003442 Questions
Exam 4: CompTIA Advanced Security Practitioner (CASP+) CAS-004107 Questions
Exam 5: CompTIA Cloud Essentials+165 Questions
Exam 6: CompTIA CySA+ Certification Exam (CS0-002)294 Questions
Exam 7: CompTIA Cloud+ (CV0-002)48 Questions
Exam 8: CompTIA Cloud+67 Questions
Exam 9: CompTIA IT Fundamentals387 Questions
Exam 10: CompTIA Network+829 Questions
Exam 11: CompTIA Project+540 Questions
Exam 12: CompTIA PenTest+ Certification Exam165 Questions
Exam 13: CompTIA Server+66 Questions
Exam 14: CompTIA Server+ Certification Exam779 Questions
Exam 15: CompTIA Security+1 k+ Questions
Exam 16: CompTIA Security+ 2021129 Questions
Exam 17: CompTIA CTT+ Essentials378 Questions
Exam 18: CompTIA Linux+252 Questions
Select questions type
Which of the following software types allows for the creation of a single file composed of multiple subfiles, while at the same time reducing the overall size of the combined elements?
(Multiple Choice)
4.8/5
(34)
Which of the following operating systems is very lightweight and relies heavily on Internet applications?
(Multiple Choice)
4.7/5
(42)
Which of the following file types is considered executable?
(Multiple Choice)
4.8/5
(47)
Which of the following technologies would allow a user to run multiple operating systems at the same time on a single computer?
(Multiple Choice)
4.8/5
(29)
Which of the following could be a reason for limited web page visibility while using a large screen?
(Multiple Choice)
4.8/5
(30)
Which of the following allows for hands-free operation of a wireless device?
(Multiple Choice)
4.7/5
(38)
Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person's computer?
(Multiple Choice)
4.9/5
(37)
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
(Multiple Choice)
4.7/5
(29)
While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?
(Multiple Choice)
4.8/5
(28)
Which of the following protocols is used to secure communications between sender and receiver?
(Multiple Choice)
4.8/5
(42)
Which of the following should be performed after a backup has been completed?
(Multiple Choice)
4.8/5
(28)
Which of the following components are used to store data? (Select TWO).
(Multiple Choice)
4.9/5
(41)
Which of the following is a significant advantage of a locally stored file?
(Multiple Choice)
5.0/5
(30)
A user wants to run a major update on a laptop. Which of the following should be considered before running any major updates?
(Multiple Choice)
4.8/5
(38)
Which of the following relational database constructs is used to ensure valid values are entered for a column?
(Multiple Choice)
4.8/5
(26)
Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?
(Multiple Choice)
5.0/5
(31)
A user with an outdated operating system is consistently browsing sensitive websites such as banking, email, and corporate intranets. The Internet browser of choice is one that has already lost patch support and is not updated anymore. Which of the following actions will remedy this situation?
(Multiple Choice)
4.8/5
(37)
After configuring a new SOHO wireless router, Joe, a user, noticed that he was connected to the wrong access point. Which of the following steps of the configuration process should Joe implement to avoid this scenario in the future?
(Multiple Choice)
4.7/5
(36)
Showing 21 - 40 of 387
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)