Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Computing Technology Industry Association (CompTIA)
Exam 9: CompTIA IT Fundamentals
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 301
Multiple Choice
Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)
Question 302
Multiple Choice
Which of the following operating systems do not require extensions on files to execute a program? (Select TWO) .
Question 303
Multiple Choice
A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?
Question 304
Multiple Choice
A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?
Question 305
Multiple Choice
A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?
Question 306
Multiple Choice
Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?
Question 307
Multiple Choice
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO) .
Question 308
Multiple Choice
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?
Question 309
Multiple Choice
In which of the following situations should there be come expectation of privacy?
Question 310
Multiple Choice
A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?
Question 311
Multiple Choice
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
Question 312
Multiple Choice
Which of the following is an example of multifactor authentication?
Question 313
Multiple Choice
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?
Question 314
Multiple Choice
Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?
Question 315
Multiple Choice
For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:
Question 316
Multiple Choice
Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?
Question 317
Multiple Choice
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?