IT CertificationsAnswer Key

Comptia It Fundamentals Practice Test

34 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

After installing the OS on a workstation a technician notices everything is displayed in large windows and the viewing area is limited. What will the technician need to adjust to resolve this issue?

ANSWER

Resolution

QUESTION 2

A User's OS is set to automatically update as updates are released. However, last week's updates failed to download. Which of the following should the user do FIRST to install the updates?

ANSWER

Manually download the updates

QUESTION 3

What component is used for temporary storage of program data that is cleared when the computer is turned off?

ANSWER

System Memory

QUESTION 4

Which method of patching allows for vendor controlled updates, reduced user interaction, and increased security of the OS or application?

ANSWER

Automatic Updates

QUESTION 5

What security threat would the use of cable locks reduce?

ANSWER

Hardware Theft

QUESTION 6

Name one reason why password complexity is a best practice.

ANSWER

It makes passwords harder to crack.

QUESTION 7

A user receives an email including a link, when they hover the mouse over the link, the actual URL does not match the text in the body of the email and appears to be a string of random characters. What would be the best course of action?

ANSWER

Delete the email without clicking the link.

QUESTION 8

What component serves as temporary storage for computer operations?

ANSWER

RAM

QUESTION 9

The extension .rtf is an example of what file type?

ANSWER

Document

QUESTION 10

What is a common method of preventing physical theft of a laptop or workstation?

ANSWER

Cable and lock device securely attached to a secure object.

QUESTION 11

After installing a new software application a user notices the application launches in demo mode. What needs to be done to fully activate the software package?

ANSWER

Enter a product or licence key.

QUESTION 12

A user's laptop contains sensitive information. The user often plugs the computer into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevent this breach?

ANSWER

Disable file and print sharing on the laptop.

QUESTION 13

A user's government ID number, birth date, and current address are considered what?

ANSWER

PII

QUESTION 14

What is the function of a CPU?

ANSWER

Performs data computation

QUESTION 15

When trying to activate the OS, a user receives a notice that the software is not genuine. What security threat has occurred?

ANSWER

License theft

QUESTION 16

A user is configuring a SOHO wireless router. The user should change the router's default administrator password for what reason?

ANSWER

To prevent unauthorized configuration changes

QUESTION 17

A user wants to purchase a CAD application that requires 8GB of RAM to operate. What OS type is required?

ANSWER

64-bit

QUESTION 18

Several users want to share a common folder with high availability. What device is best to use for this requirement?

ANSWER

Network attached storage appliance (NAS)

QUESTION 19

Which component is responsible for the interconnectivitiy of internal system devices?

ANSWER

Motherboard

QUESTION 20

What software type protects a desktop from malicious attacks?

ANSWER

Antivirus software

QUESTION 21

What internal computer component is used to connect video, audio, and network cards?

ANSWER

Motherboard

QUESTION 22

What method is most important to make sure computer temperature is maintained within normal limits?

ANSWER

Ensuring of efficient airflow

QUESTION 23

An employee is using a desk phone that is connected by only a network cable. What technology is the phone using?

ANSWER

VoIP

QUESTION 24

What is an example of a file type that can be used to consolidate a group of files?

ANSWER

.rar

QUESTION 25

What permission is required to run a .bat file?

ANSWER

Execute

QUESTION 26

What connector types can be used by both mice and keyboards?

ANSWER

USB/PS2

QUESTION 27

What will allow the easiest and fastest way to share a file between 2 modern smart phones without joining the same WIFI network?

ANSWER

Bluetooth

QUESTION 28

An end user has 16 GB of ram installed on a computer system. Why does the OS only use a maximum of 4 GB of ram?

ANSWER

The OS is 32 bit

QUESTION 29

A technician just installed a new computer. What is the best way to manage the cables?

ANSWER

Line the cables up neatly and wrap them together with cable ties.

QUESTION 30

A user wants to run a major update on a laptop. What should be considered before running any major updates?

ANSWER

Backup important files

QUESTION 31

What allows for the fastest printer connections?

ANSWER

USB

QUESTION 32

A user needs to establish a password for an email account. What is a good example of a complex password?

ANSWER

01#iWant!2686612338

QUESTION 33

What is an advantage of using a 64-bit OS?

ANSWER

Ability to use a larger amount of RAM

QUESTION 34

A user has finished browsing the internet at a public workstation. What steps should be taken to best secure PII?

ANSWER

Clear the browser cache, cookies, and history.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials