Exam 9: CompTIA IT Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A user has just removed a new desktop PC from the box and has plugged in several new peripheral devices. During which of the following steps will the plug and play peripheral devices be installed on the new PC?

(Multiple Choice)
4.9/5
(36)

Which of the following is a requirement to connect a smartphone to a wireless network?

(Multiple Choice)
5.0/5
(37)

A user has finished setting up a new computer. Now the operating system requires activation, but the user discovers the computer has no Internet connection. Which of the following should the user do FIRST?

(Multiple Choice)
4.8/5
(36)

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

(Multiple Choice)
4.7/5
(35)

Which of the following allows users to print to another user's local printer?

(Multiple Choice)
4.8/5
(31)

A user was recently a victim of a brute force attack on an email account. This is considered which of the following security threats?

(Multiple Choice)
4.8/5
(27)

Which of the following has the lowest latency?

(Multiple Choice)
4.8/5
(35)

When setting up a SOHO wireless router, which of the following is the FIRST step to secure the router from configuration changes by an unauthorized user?

(Multiple Choice)
4.8/5
(36)

Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?

(Multiple Choice)
4.8/5
(35)

Which of the following are basic functions to use when working only with files and folders in an OS? (Select two.)

(Multiple Choice)
4.8/5
(32)

A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevented this breach?  

(Multiple Choice)
4.9/5
(39)

When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?

(Multiple Choice)
4.8/5
(38)

Which of the following data connectivity options is the BEST to use when both high availability and reliability are required?

(Multiple Choice)
4.9/5
(37)

Which of the following security threats occurs when a user receives an email from an illegitimate source asking for login information?

(Multiple Choice)
4.8/5
(35)

A student wishes to share contacts with another student's mobile device. Which of the following would be the easiest method to use?

(Multiple Choice)
4.9/5
(38)

A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?

(Multiple Choice)
5.0/5
(32)

Which of the following connection methods requires line-of-sight to be effective?

(Multiple Choice)
4.8/5
(43)

A technician is typing the password to logon to a system. A user is standing in close proximity to the technician and is able to see the password being typed. Which of the following BEST describes this situation?

(Multiple Choice)
4.8/5
(40)

A user is at the office and has a cellular phone that previously functioned properly. The phone is powered on with a fully charged battery. However, the phone does not have connectivity. Which of the following describes the problem?

(Multiple Choice)
4.7/5
(32)

Given the following pseudocode: Given the following pseudocode:   If the Breakfast program ran on Sunday, which of the following would be the output? If the Breakfast program ran on Sunday, which of the following would be the output?

(Multiple Choice)
4.8/5
(40)
Showing 141 - 160 of 387
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)