Last Updated on July 5, 2021 by Admin 2

FC0-U51 : CompTIA IT Fundamentals : Part 09

  1. Ann, a user, is browsing shopping websites on the Internet when she receives a pop-up message on her screen indicating a virus has been detected by the antivirus software. Which of the following actions should be performed NEXT?

    • Ignore the message because it is likely adware.
    • Run a scan on the entire local drive.
    • Clear temporary files and folders.
    • Minimize the alert and continue browsing the Internet.
  2. A technician needs to troubleshoot a user’s computer. The user leaves personal credentials written on a piece of paper for the technician. Which of the following principles has the user violated?

    • Password confidentiality
    • Password complexity
    • Password reuse
    • Password expiration
  3. Joe, a user, has many applications on his computer and is trying to use software management best practices. Which of the following should he consider?

    • Install a desktop cleanup application.
    • Uninstall unneeded applications.
    • Load each application one at a time.
    • Manage the use of internal memory.
  4. A user’s government identification number, birth date, and current address are considered which of the following?

    • IMAP
    • HTTP
    • PII
    • HTTPS
  5. A user, Ann, calls the manufacturer of a software product she purchased, but is denied assistance because the product is no longer supported. Which of the following options is a BEST next choice?

    • P2P software sharing service
    • Original instruction manual
    • Online user forum
    • PC manufacturer’s website
  6. Which of the following software types BEST facilitates collaboration?

    • Personal information manager
    • Video editing software
    • Instant messaging software
    • CAD software
  7. To increase security, which of the following is the BEST feature to disable on a mobile device when not in use?

    • Wireless
    • GPS
    • Network
    • NFC
  8. Which of the following data connectivity options is the BEST to use when both high availability and reliability are required?

    • WiFi
    • Bluetooth
    • Cellular
    • Wired
  9. A technician has added an external hard drive to a personal computer. The hard drive is powered on, but the computer does not see the new hard disk. Which of the following is the FIRST thing the technician should check?

    • The power cable
    • The OS version for compatibility
    • The hard drive firmware revision
    • The data cable
  10. Which of the following is the MOST secure password?

  11. A user is updating a website. Which of the following protocols will provide the MOST security when uploading the files?

    • FTPS
    • FTP
    • SMTP
    • HTTP
    • SNMP
  12. A website locks a user’s account after three unsuccessful login attempts. This precaution prevents which of the following?

    • Shoulder surfing
    • Phishing
    • Spam
    • Password cracking
  13. Which of the following commands is used to view the contents of a file?

    • Save
    • Open
    • Copy
    • Move
  14. Which of the following media has the highest possible availability?

    • Wired
    • WiFi
    • Cellular
    • Bluetooth
  15. Which of the following extension types are associated with document files? (Select THREE).

    • .txt
    • .odf
    • .msi
    • .rtf
    • .mp3
    • .tar
    • .jpg
  16. A home user wants to share files between two different computers. The user wants the files to be available to either computer, regardless of whether either computer is turned on. Which of the following is the BEST storage method?

    • USB storage
    • Internal storage
    • Direct attached storage
    • Network attached storage
  17. Which of the following is the component responsible for interconnectivity of internal system devices?

    • System case
    • Power supply
    • Motherboard
    • Expansion card
  18. Which of the following storage methods provides the HIGHEST redundancy and availability?

    • Cloud-based storage
    • Storage Area Network
    • Locally attached storage
    • Network Attached Storage
  19. Which of the following is a benefit of setting up a computer to receive automatic updates from the OS vendor?

    • Arranges the hard drive files in order
    • Restores missing files that were lost or deleted
    • Keeps the software current and applies security patches
    • Provides the latest virus definitions to keep the computer safe
  20. Which of the following application types is MOST often used for doing a mail merge?

    • PDF software
    • Word processor
    • Presentation software
    • Personal information manager