CompTIA IT Fundamentals+ Certification Exam Test Questions With Answers

comptia IT Fundamentals Exam Practice Test Questions Answers Techhyme

CompTIA offers everything you need to get you ready for your IT Fundamentals certification exam. CompTIA IT Fundamentals (ITF+) is an introduction to basic IT knowledge and skills that helps professionals or students decide if a career in IT is right for them. It also helps organizations prepare non-technical teams for digital transformation.

The CompTIA IT Fundamentals exam focuses on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike, including:

Q1) Which of the following allows wireless devices to communicate to a wired network?

A. Modem
B. Switch
C. Firewall
D. Access point

Correct Answer: D

Q2) Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

A. Laptop
B. Workstation
C. Mobile phone
D. Server

Correct Answer: D

Q3) Which of the following BEST describes an application running on a typical operating system?

A. Process
B. Thread
C. Function
D. Task

Correct Answer: A

Q4) The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

A. Update from 802.11b to 802.11g.
B. Ensure sources of EMI are removed.
C. Enable WPA2-Enterprise.
D. Use WiFi Protected Setup.

Correct Answer: B

Q5) A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

A. a storage area network.
B. an embedded OS.
C. network attached storage.
D. a Type 1 hypervisor.

Correct Answer: D

Q6) Which of the following is a compiled language?

A. Perl
B. JScript
C. Java
D. PowerShell

Correct Answer: C

Q7) Which of the following actions is the FINAL step in the standard troubleshooting methodology?

A. Document the solution and cause.
B. Create a new theory of cause.
C. Research the problem online.
D. Implement preventive measures.

Correct Answer: A

Q8) Which of the following is a value that uniquely identifies a database record?

A. Foreign key
B. Public key
C. Primary key
D. Private key

Correct Answer: C

Q9) A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?

A. SELECT
B. INSERT
C. DELETE
D. UPDATE

Correct Answer: A

Q10) Which of the following statements BEST describes binary?

A. A notational system used to represent an “on” or “off” state
B. A notational system used to represent media access control
C. A notational system used to represent Internet protocol addressing
D. A notational system used to represent a storage unit of measurement

Correct Answer: A

Q11) A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?

A. Variable
B. If
C. Datatype
D. Comment

Correct Answer: B

Q12) A UPS provides protection against:

A. denial of service
B. replay attack.
C. power outages.
D. wiretapping.

Correct Answer: C

Q13) A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

A. Optical drive
B. Hard disk drive
C. Solid state drive
D. Flash drive

Correct Answer: A

Q14) A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician’s NEXT step?

A. Implement the solution.
B. Document lessons learned.
C. Establish a plan of action.
D. Verify full system functionality.

Correct Answer: C

Q15) Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

A. Oatmeal
B. Bacon and eggs
C. Waffles
D. Pancakes

Correct Answer: C

Q16) Which of the following BEST describes a kilobyte?

A. A kilobyte is a measurement of storage (e.g., 100KB).
B. A kilobyte is a measurement of throughput (e.g.,100Kbps).
C. A kilobyte is a measurement of power (e.g., 100KW).
D. A kilobyte is a measurement of processor speed (e.g., 2.4KHz).

Correct Answer: A

Q17) Which of the following security concerns is a threat to confidentiality?

A. Replay attack
B. Denial of service
C. Service outage
D. Dumpster diving

Correct Answer: A

Q18) Which of the following software license models allows a developer to modify the original code and release its own version of the application?

A. Proprietary software
B. Commercial software
C. Open source software
D. Cross-platform software

Correct Answer: C

Q19) Which of the following are the basic computing operations?

A. Input, process, output, and feedback
B. Input, output, storage, and feedback
C. Input, process, and output
D. Input, process, output, and storage

Correct Answer: D

Q20) Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

A. Infrared
B. NFC
C. Bluetooth
D. WiFi

Correct Answer: B

Q21) The IT department has established a new password policy for employees. Specifically, the policy reads:
Passwords must not contain common dictionary words
Passwords must contain at least one special character.
Passwords must be different from the last six passwords used.
Passwords must use at least one capital letter or number.
Which of the following practices are being employed? (Select TWO).

A. Password lockout
B. Password complexity
C. Password expiration
D. Passwords history
E. Password length
F. Password age

Correct Answer: B, D

Q22) Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a person’s computer?

A. Email previewing
B. Patching
C. Clear browsing cache
D. Kill process

Correct Answer: B

Q23) A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?

A. Thunderbolt cable
B. Bluetooth module
C. Infrared port
D. WLAN card

Correct Answer: D

Q24) Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

A. Password reuse
B. Snooping
C. Social engineering
D. Phishing

Correct Answer: A

Q25) Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)

A. SMTP
B. POP3
C. SNMP
D. DHCP
E. ICMP
F. SFTP

Correct Answer: A, B

Q26) A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

A. UPDATE
B. DELETE
C. ALTER
D. DROP

Correct Answer: D

Q27) Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

A. Fiber
B. DSL
C. Cable
D. Satellite

Correct Answer: D

Q28) Which of the following language types would a web developer MOST likely use to create a website?

A. Interpreted
B. Query
C. Compiled
D. Assembly

Correct Answer: A

Q29) A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

A. Patent
B. Copyright
C. NDA
D. Trademark
E. EULA

Correct Answer: B, D

Q30) Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

A. Host-based firewall
B. Strong administrator password
C. Anti-malware software
D. Full disk encryption

Correct Answer: D

Q31) Which of the following data types should a developer use when creating a variable to hold a postal code?

A. Integer
B. String
C. Float
D. Boolean

Correct Answer: B

Q32) A function is BEST used for enabling programs to:

A. hold a list of numbers.
B. be divided into reusable components.
C. define needed constant values.
D. define variables to hold different values.

Correct Answer: D

Q33) A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

A. Laptop
B. Server
C. Game console
D. Workstation

Correct Answer: B