CompTIA ITF+ Practice 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

Question 1:

Which of the following is a value that uniquely identifies a database record?

A. Foreign key
B. Public key
C. Primary key
D. Private key
Ans: C
Question 2:

Which of the following statements BEST describes binary?

A. A notational system used to represent ‘on’ or ‘off’ state


B. A notational system used to represent media access control
C. A notational system used to represent internet protocol
D. A notational system used to represent a storage unit of measurement

Ans: A
Question 3:

In which of the following situations should there be come expectation of privacy?

A. Posting a comment on a friends social media page


B. Submitting personal information on a school enrollment site
C. Posting a comment on a video sharing site
D. Sending email and picture to a close relative
Ans: B
Question 4:

A systems administrator uses a program that interacts directly with hardware to manage storage,
network, and virtual machines. This program is an example of:

A. A storage area network


B. An embedded OS
C. Network attached storage
D. A Type 1 hypervisor

Ans: D
Question 5:

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or
stolen?

A. Host-based firewall
B. Strong administrator
C. Anti-malware
D. Full disk encryption

Ans: D

Question 6:

Which of the following is a compiled language?

A. Perl
B. JScript
C. Java
D. PowerShell

Ans: C

Question 7:

A user is attempting to print a document to a wireless printer and receives an error stating the
operation could not be completed. Which of the following should the user do to correct this
issue?

A. Ensure both devices are connected to the LAN


B. Enable task scheduling
C. Rest the proxy setting to their default values
D. Review the fault tolerance configurations

Ans: A

Question 8:

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

A. Document the solution and case


B. Create a new theory of cause
C. Research the problem online
D. Implement preventive

Ans: A
Question 9:

A systems administrator wants to return results for a time range within a database. Which of the
following commands should the administrator use?

A. Select
B. Insert
C. Delete
D. Update

Ans: A

Question 10:

A user is getting an error message when trying to go to a website. A technician asks the user a
few questions to find out more about the issue. The technician opens a browser locally and
browses to the same site as the user. Which of the following troubleshooting steps is the
technician using by browsing to the same site?

A. Establish a plan of action


B. Gather information
C. Duplicate the problem
D. Find the root cause

Ans: C

Question 11:

A startup company has created a logo. The company wants to ensure no other entity can use the
logo for any purpose. Which of the following should the company use to BEST protect the logo?
(Select TWO).

A. Patent
B. Copyright
C. NDA
D. Trademark
E. EULA

Ans: B&D

Question 12:

A user is buying a laptop. The user will have a lot of personal and confidential information on
the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is
stolen.
Which of the following should be set up to accomplish this?

A. Encryption
B. Compression
C. Permissions
D. Auditing

Ans: A

Question 13:

A developer is creating specific step-by-step instructions/procedures and conditional statements


that will be used by a computer program to solve problems. Which of the following is being
developed?

A. Algorithm
B. Software
C. Pseudcode
D. Flowchart

Ans: A

Question 14:

Which of the following language types would a web developer MOST likely use to create a
website?

A. Interpreted
B. Query
C. Compiled
D. Assembly

Ans: A

Question 15:

Which of the following is an example of multifactor authentication?

A. Password and passphrase


B. Fingerprint and retina scan
C. Hardware token and smartphone
D. Smart card and PIN

Ans: D
Question 16:

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and
operates on the 2.4GHz band. Which of the following should the technician select?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Ans: B

Question 17:

Which of the following operating systems do not require extensions on files to execute a
program? (Select TWO).

A. Windows 7
B. Windows 8
C. UNIX
D. Windows Server 2012
E. Android
F. Linux

Ans: C&F

Question 18:

For a disaster recovery exercise, a company wants to ensure customer data is recovered before
operational data. This is an example of:

A. Redundancy
B. Replication
C. Prioritization
D. Fault tolerance

Ans: C

Question 19:

Which of the following is MOST likely used to represent international text data?

A. ASCII
B. Octal
C. Hexadecimal
D. Unicode
Ans: D

Question 20:

Joe, a developer, is writing a program in which he needs to store a number that changes over the
duration of the program’s run.

Which of the following would Joe MOST likely use to accomplish this?

A. Loop
B. Variable
C. Constant
D. Function

Question 21:

Which of the following relational database constructs is used to ensure valid values are entered
for a column?

A. Schema
B. Permissions
C. Constraint
D. Column

Ans: C

Question 22:

An end user’s computer has been failing to open its word processing software. An IT technician
successfully solves the problem. Which of the following best describes the technician’s NEXT
step?

A. Restart the computer


B. Contact other users
C. Disconnect the peripheral
D. Document the findings

Ans: D

Question 23:

A regulation requires new applicants to provide a scan of their retinas in case of any future legal
questions regarding who applied for the position. Which of the following concepts is this an
example of?

A. Non-repudiation
B. Authentication
C. Integrity
D. Accounting

Ans: A

Question 24:

Which of the following is an advantage of installing an application to the cloud?

A. Data is not stored locally


B. Support is not required
C. Service is not required
D. Internet is not required

Ans: A

Question 25:

A small company wants to set up a server that is accessible from the company network as well as
the Internet. Which of the following is MOST important to determine before allowing employees
to access the server remotely?

A. The quality of the computer used to connect


B. A security method of allowing connections
C. The employees home ISP speeds
D. The geographical location of the employees

Ans: B

Question 26:

A program needs to choose apples, oranges, or bananas based on an input. Which of the
following programming constructs is BEST to use?

A. Variable
B. If
C. Datatybe
D. Comment

Ans: B

Question 27:

A UPS provides protection against:


A. Denial of service
B. Replay attack
C. Power outages
D. Wiretapping

Ans: C

Question 28:

A company executive wants to view company training videos from a DVD. Which of the
following components would accomplish this task?

A. Optical drive
B. Hard disk drive
C. Solid state drive
D. Flash drive

Ans: A

Question 29:

A technician is troubleshooting a problem. The technician tests the theory and determines the
theory is confirmed. Which of the following should be the technician’s NEXT step?

A. Implement the solution


B. Document lessons learned
C. Establish a plan of action
D. Verify full system functionality

Ans: C

Question 30:

Which of the following intellectual property concepts BEST represents a legally protected slogan
of a business?

A. Contract
B. Patent
C. Copyright
D. Trademark

Ans: D
Question 31:

Ann, the president of a company, has requested assistance with choosing the appropriate Internet
connectivity for her home. The home is in a remote location and has no connectivity to existing
infrastructure. Which of the following Internet service types should MOST likely be used?

A. Fiber
B. DSL
C. Cable
D. Satellite

Ans: D

Question 32:

A technician is called to replace a display for a workstation. Which of the following would
MOST likely be used to connect the display to the workstation?

A. USB
B. NFC
C. DSL
D. DVI

Ans: D

Question 33:

A database administrator finds that a table is not needed in a relational database. Which of the
following commands is used to completely remove the table and its data?

A. UPDATE
B. DELETE
C. ALTER
D. DROP

Ans: D

Question 34:

Which of the following network protocols will MOST likely be used when sending and receiving
Internet email? (Select TWO.)

A. SMTP
B. POP3
C. SNMP
D. DHCP
E. ICMP
F. SETP

Ans: A&B

Question 35:

A technician is installing a new wireless network and wants to secure the wireless network to
prevent unauthorized access. Which of the following protocols would be the MOST secure?

A. WPA
B. SSID
C. WEP
D. WPA2

Ans: D

Question 36:

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a
friend that his email and banking accounts are probably also compromised. Which of the
following has Joe MOST likely performed?

A. Password reuse
B. Snooping
C. Social engineering
D. Phishing

Ans: A

Question 37:

A user wants to use a laptop outside the house and still remain connected to the Internet. Which
of the following would be the BEST choice to accomplish this task?

A. Thunderbolt cable
B. Bluetooth module
C. Infrared port
D. WLAN card

Ans: D

Question 38:

Which of the following would MOST likely prevent malware sent as compromised file via email
from infecting a person’s computer?
A. Email previewing
B. Patching
C. Clear browsing
D. Kill process

Ans: B

Question 39:

The IT department has established a new password policy for employees. Specifically, the policy
reads:

Passwords must not contain common dictionary words

Passwords must contain at least one special character.

Passwords must be different from the las six passwords used.

Passwords must use at least one capital letter or number.

Which of the following practices are being employed? (Select TWO).

A. Password lockout
B. Password complexity
C. Password expiration
D. Password history
E. Password length
F. Password age

Ans: B&D

Question 40:

Which of the following is a wireless communication that requires devices to be within 6in of
each other to transfer information?

A. Infrared
B. NFC
C. Bluetooth
D. WiFi

Ans: B
Question 41:

Given the following pseudocode:

If the Breakfast program ran on Sunday, which of the following would be the output?

A. Oatmeal
B. Bacon and eggs
C. Waffles
D. Pancakes

Ans: C

Question 42:

A desktop administrator just connected a printer to a workstation, but the workstation does not
recognize the printer. Which of the following does the workstation MOST likely need for the
printer to function?

A. Permission
B. Ink cartridge
C. USB cable
D. Driver

Ans: D

Question 43:

Which of the following BEST describes a kilobyte?

A. A kilobyte is a measurement of storage (e.g., 100KB).


B. A kilobyte is a measurement of throughput (e.g., 100Kbps).
C. A kilobyte is a measurement of power (e.g., 100KW).
D. A kilobyte is a measurement of processor speed (e.g., 2.4 KHz).
Ans: A

Question 44:

Which of the following are the basic computing operations?

A. Input, process, output, and feedback


B. Input, output, storage, and feedback
C. Input, process, and output
D. Input, process, output, and storage

Ans: D

Question 45:

Which of the following software license models allows a developer to modify the original code
and release its own version of the application?

A. Proprietary software
B. Commercial software
C. Open source software
D. Cross-platform software

Ans: C

Question 46:

Which of the following security concerns is a threat to confidentiality?

A. Replay attack
B. Denial of service
C. Service outage
D. Dumpster diving

Ans: D

Question 47:

Which of the following extensions identifies a video file?

A. .msi
B. .tar
C. .img
D. .mp4

Ans: D
Question 48:

Which of the following file formats contain other files within them? (Select TWO).

A. Tiff
B. Dmg
C. Png
D. Mp3
E. Iso
F. Flac

Ans: B&E

Question 49:

Which of the following is performed during Wi-Fi setup on a mobile device?

A. Configuration Bluetooth pairing setting


B. Configuring email settings
C. Configuring screen lock setting
D. Configuring SSID settings

Ans: D

Question 50:

Which of the following is a reason that a user might upgrade a video card driver? (Select TWO).

A. To decrease the screen resolution


B. To access monitor standby mode
C. To fix an error massage
D. To use additional features
E. To adjust the brightness/contrast

Ans. C&D
Question 1:

When trying to activate the operating system, a user receives a notice that the software is not
genuine. Which of the following security threats has occurred?

A. Social engineering
B. Phishing
C. Virus attack
D. License theft
Ans: D
Question 2:

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the
following operating system types is required?

A. 8-bit
B. 16-bit
C. 32.bit
D. 64-bit

Ans: D

Question 3:

Which of the following operating systems is MOST likely to be found on a desktop where its
primary functions include professional video and audio editing?

A. Chrome OS
B. Windows 7 home
C. Mac OS X
D. IOS

Ans: C

Question 4:

Which of the following is MOST likely required during installation in order to legally install
software?

A. Automatic updates
B. Service level agreement
C. License key
D. Antivirus software

Ans: D
Question 5:

Which of the following alternative technologies allows a computer to run multiple operating
systems without partitioning the hard drive?

A. Web applications
B. Dual boot
C. Telepresence
D. Virtualization

Ans: D

Question 6:

Which of the following software types allows for the creation of a single file composed of
multiple subfiles, while at the same time reducing the overall size of the combined elements?

A. Database
B. Document sharing
C. Compression
D. Maintenance

Ans: C

Question 7:

Which of the following storage media is intended for single-use backups?

A. Hard drive
B. CD-ROM/DVD-ROM
C. Flash drive
D. Tape

Ans: B

Question 8:

Joe, a technician, is asked to prevent users from playing games on corporate computers. Which
of the following is the BEST way to accomplish this?

A. Move the game files to a network share


B. Remove the games using the OS utility
C. Require all users to sign a company zero-tolerance gaming document
D. Rename the games folder to ‘Do Not Use”

Ans: B
Question 9:

A peripheral device manufacturer has corrected a security flaw in its software and released a
patch. Which of the following is the QUICKEST method to correct this flaw?

A. Replace the device


B. Power cycle the device
C. Reconnect the device
D. Update the device drivers

Ans: D

Question 10:

A user places a new desktop computer, monitor, and printer on the desk. Which of the following
is the NEXT step in completing the setup of the computer?

A. Install updates
B. Turn on the computer
C. Connect all cables to the computer
D. Configure antivirus software

Ans: C

Question 11:

Which of the following malware infections is responsible for locking data on a system in an
attempt to make the user pay a fee to unlock it?

A. Adware
B. Ransomware
C. Spyware
D. Trojan

Ans: B

Question 62:

A user set up a new computer and implemented cable management with very little slack on all
cabling. However, the workstation is shutting off intermittently. Which of the following issues is
MOST likely occurring?

A. The new surge protector used is not rated to handle the manufacturers workstation
B. The cable ties are loose and need to be adjusted
C. The computer may not have gone through its traditional burn-in period yet
D. The power cable could be too taut and is losing connection in the socket
Ans: D

Question 13:

A user is at the office and has a cellular phone that previously functioned properly. The phone is
powered on with a fully charged battery. However, the phone does not have connectivity. Which
of the following describes the problem?

A. Phone is disconnected from Wi-Fi


B. Provider is conducting system testing
C. MAC address is bad
D. Phone is in airplane mode

Ans: D

Question 14:

Which of the following operating systems is very lightweight and relies heavily on Internet
applications?

A. Chrome OS
B. Windows
C. Linux
D. Blackberry OS

Ans: A

Question 15:

Which of the following is a common characteristic of open source software?

A. Update cycles are dictated by the manufacturer


B. Modifications to core functionalities are made by the manufacturer
C. Can only run on certain manufacturer
D. Can be fully modified by the user
Ans: D
Question 16

Which of the following operating systems is available for free and can be modified by anyone?

A. Windows
B. Linux
C. Mac OS
D. Chrome OS
Ans: B
Question 17:

Which of the following software package types is designed to accept input from multiple users?

A. Utility
B. Operating system
C. Specialized
D. Collaborative
Ans: D
Question 68:

Which of the following computer ports can be used for storage, video output, and peripherals?

A. HDIM
B. USB
C. VGA
D. eSATA
Ans: B
Question 19:

Joe, a technician, has discovered that his SOHO router does not include features that are listed on
the manufacturer’s website. Which of the following would allow Joe to enable these missing
features?

A. Update the firmware


B. Enable WPA2
C. Change the SSID
D. Reset the router
Ans: A
Question 20:

A user has purchased some new software from a vendor and wants to install it on all of the
Windows computers in the house. Which of the following will help the user accomplish the task
and ensure compliance with the software vendor?

A. Copy and paste the program between computers


B. Purchase a multi-user license
C. Purchase a single-user license
D. Use remote desktop to share the program between computers
Ans: B
Question 21:

Which of the following file types is considered executable?

A. .zip
B. .app
C. .iso
D. .pdf
Ans: B
Question 22:

A user learns of an operating system vulnerability that would allow a hacker to access the
computer. The user would like to keep the operating system up to date to prevent such
vulnerabilities from occurring. Which of the following should the user configure?

A. Additional OS features
B. Automatic updates
C. Software firewall
D. Anti-malware firewall
Ans: B
Question 23

Which of the following is the BEST example of productivity software?

A. Word processing software


B. Entertainment software
C. Image editing software
D. Anti-malware software
Ans: A
Question 24:

Which of the following technologies allows people to communicate all over the world
inexpensively?

A. Virtualization
B. SSID
C. Kinetics
D. VoIP
Ans: D
Question 25:

Which of the following is a requirement to connect a smartphone to a wireless network?

A. SSID
B. SATA
C. SMTP
D. Gzip
Ans: A
Question 26

Which of the following is primarily a confidentiality concern?

A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering
Ans: A
Question 27

A software developer develops a software program and writes a document with step-by-step
instructions on how to use the software. The developer wants to ensure no other person or
company will publish this document for public use. Which of the following should the developer
use to BEST protect the document?

A. Patent
B. Trademark
C. Watermark
D. Copyright
Ans: D
Question 28

Which of the following database concepts would MOST likely use a CSV file?

A. Data querying
B. Data reports
C. Data importing
D. Data persistence
Ans: C
Question 29:
A help desk technician encounters an issue and wants to find out if a colleague has encountered
the same issue before. Which of the following should the technician do FIRST?

A. Check Knowledge Base


B. Search local logs
C. Research possible theories
D. Question users
Ans: A
Question 30:

Which of the following BEST describes the practice of providing user credentials when logging
on to the network?

A. Output
B. Storage
C. Input
D. Processing
Ans: C

You might also like