IT Fundamentals Practice Test Questions and Answers
1 view 0 purchase
Course
IT Fundamentals
Institution
IT Fundamentals
IT Fundamentals Practice Test Questions and Answers
Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?
System memory
Which of the following methods of patching allows for vendor controlled updates, reduced user interaction, and...
IT Fundamentals Practice Test Questions
and Answers
Which of the following is used for temporary storage of program data that is
cleared when the computer is turned off?
System memory
Which of the following methods of patching allows for vendor controlled updates,
reduced user interaction, and increased security of the operating system or
application?
Automatic updates
Which of the following security threats would the use of cable locks reduce?
Hardware theft
Which of the following is a reason why password complexity is a best practice?
It makes passwords harder to crack.
A user receives an email containing a link. When they hover the mouse over the
link, the actual URL does not match the text in the body of the email and appears
to be a string of random characters. Which of the following is the BEST course of
action?
Delete the email without clicking on the link.
Which of the following components serves as temporary storage for computer
operations?
Random access memory
The extension .rtf is an example of which of the following file types?
Document
Which of the following is a common way to prevent physical theft of a laptop or
workstation?
Cable and lock device securely attached to a solid object.
After installing a new software application, a user notices that the application
launches in demo mode. Which of the following needs to be done to fully activate
the software package?
Enter a product or license key.
A user's laptop hard drive contains sensitive information. The user often plugs
the laptop into the corporate network. A sensitive file from the laptop has been
found on another user's laptop. How could the user have prevented this breach?
Disable file and print sharing on the laptop.
A user's government identification number, birth date, and current address are
considered which of the following?
PII
Which of the following is the function of a CPU?
Performs data computation
When trying to activate the operating system, a user receives a notice that the
software is not genuine. Which of the following security threats has occurred?
License theft
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICSTORE. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.50. You're not tied to anything after your purchase.