IT fundamentals

Which of the following is used for temporary storage of program data that is cleared when the computer is turned off?

System Memory

Which of the following methods of patching allows for vendor controlled updates, reduced user interaction, and increased security of the operating system or application?

Automatic updates

Which of the following security threats would the use of cable locks reduce?

Hardware theft

Which of the following is a reason why password complexity is a best practice?

It makes passwords harder to crack.

A user receives an email containing a link. When they hover the mouse over the link, the actual URL does not match the text in the body of the email and appears to be a string of random characters. Which of the following is the BEST course of action?

Delete the email without clicking on the link.

Which of the following components serves as temporary storage for computer operations?

Random access memory

The extension .rtf is an example of which of the following file types?

Document

Which of the following is a common way to prevent physical theft of a laptop or workstation?

Cable and lock device securely attached to a solid object.

After installing a new software application, a user notices that the application launches in demo mode. Which of the following needs to be done to fully activate the software package?

Enter a product or license key.

A user's laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another user's laptop. How could the user have prevented this breach?

Disable file and print sharing on the laptop.

A user's government identification number, birth date, and current address are considered which of the following?

PII

Which of the following is the function of a CPU?

Performs data computation

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

License theft

A user is configuring a SOHO wireless router. The user should change the router's default administrator password for which of the following reasons?

To prevent unauthorized configuration changes

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the following operating system types is required?

64-bit

Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

Network attached storage appliance

Which of the following is the component responsible for interconnectivity of internal system devices?

Motherboard

Which of the following software types protects a desktop from malicious attacks?

Anti Virus

Which of the following internal computer components is used to connect video, audio, and network cards?

Motherboard

Which of the following is MOST important to ensure a computer temperature is maintained within normal limits?

Ensuring sufficient airflow

An employee is using a desk phone that is connected only via a network cable. Which of the following technologies is the phone using?

VoIP

Which of the following file types is used to consolidate a group of files?

rar

Which of the following permissions is required to run a .bat file?

Execute

Which of the following will allow the easiest and fastest way to share a single file between two modern smartphones without joining the same WiFi network?

Bluetooth

An end-user has 16GB of RAM installed on a computer system. Which of the following describes why the OS only uses a maximum of 4GB of RAM?

The operating system is 32-bit.

Which of the following allows for the FASTEST printer connections?

USB

Which of the following is an advantage of using a 64-bit operating system?

Ability to utilize a larger amount of RAM