FC0-U51 : CompTIA IT Fundamentals : Part 07

  1. Which of the following should be done to reduce physical safety hazards around a newly installed computer?

    • Verify all connections are seated properly.
    • Avoid placing other computers nearby.
    • Bundle loose cables with zip ties or Velcro straps.
    • Attach all peripherals to the computer.
  2. A user with an outdated operating system is consistently browsing sensitive websites such as banking, email, and corporate intranets. The Internet browser of choice is one that has already lost patch support and is not updated anymore. Which of the following actions will remedy this situation?

    • Uninstall all unused browser extensions and toolbars to help reduce risks.
    • Convert the user’s account to an admin level account, to provide better overall security.
    • Move to an alternate browser that still has consistent security update support.
    • Install multiple anti-malware and firewall products to harden the computing experience.
  3. Which of the following connectors is MOST often used to connect a computer to a network?

    • RJ-45
    • RJ-11
    • IDE
    • eSATA
  4. A user is installing a new scanner on a computer. Which of the following MOST likely needs to be installed in order for this equipment to work?

    • License key
    • OS update
    • Firmware
    • Driver
  5. Which of the following software is used to reduce the size of a file or folder?

    • Desktop publishing
    • Basic database
    • Compression
    • Anti-malware
  6. Which of the following is used with a touch screen to increase accuracy?

    • Touchpad
    • Stylus pen
    • Joystick
    • Trackball
  7. Which of the following internal components is used for temporary data storage in a workstation?

    • Power supply
    • CPU
    • RAM
    • Hard drive
  8. Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?

    • CPU
    • SSD
    • Hard drive
    • System memory
  9. Which of the following connectors supports both high definition video and audio?

    • S-video
    • Component
    • HDMI
    • DVI
  10. Which of the following BEST describes malicious software that demands the end-user pay a fee or face the destruction of their files?

    • Trojan
    • Virus
    • Spyware
    • Ransomware
  11. Which of the following should be done to reduce the risk of having sensitive passwords compromised while browsing the Internet?

    • Enable software firewalls to block unknown ports
    • Disable autofill of forms and passwords
    • Enable screensavers and time-outs on the computer
    • Use ad-blocking software on the computer
  12. Which of the following would be the MOST efficient way to transport a file from one location on a local hard drive to a different location on the same hard drive?

    • Rename
    • Cut
    • Move
    • Save
  13. A student wishes to share contacts with another student’s mobile device. Which of the following would be the easiest method to use?

    • Network attached storage
    • Bluetooth sharing
    • Local hard drive
    • Peer-to-Peer network
  14. When setting up a new desktop, which of the following should be performed FIRST?

    • Configure user accounts
    • Plug in cables
    • Install security software
    • Configure wireless network settings
  15. A user, Joe, wants to install an application on his computer. Which of the following factors should he be aware of before beginning?

    • The computer has the proper hard drive drivers installed.
    • The computer is connected to a secure wireless network.
    • Check for any updates for the application.
    • The computer meets the application’s minimum requirements.
  16. Which of the following applications would a user employ to write a business letter?

    • Spreadsheet software
    • Word processor
    • Desktop publishing
    • Presentation software
  17. Which of the following devices transmits and receives printed images over a telephone line?

    • Monitor
    • Fax
    • Scanner
    • Webcam
  18. Which of the following video connections provides the highest resolution?

    • USB
    • S-video
    • HDMI
    • VGA
  19. A user receives an email containing a link. When they hover the mouse over the link, the actual URL does not match the text in the body of the email and appears to be a string of random characters. Which of the following is the BEST course of action?

    • Forward the email to a friend to ask for advice.
    • Reply to the sender asking for confirmation that it is safe to open.
    • Delete the email without clicking on the link.
    • Click the link because malware protection software is installed on the computer.
  20. Which of the following is the BEST reason to change a wireless router’s default SSID?

    • To make it easier to identify in a location with several routers.
    • To make the network feel more personal.
    • To make it more difficult to join.
    • To make the network secure.