CompTIA ITF+ Practice 1
CompTIA ITF+ Practice 1
CompTIA ITF+ Practice 1
A. Foreign key
B. Public key
C. Primary key
D. Private key
Ans: C
Question 2:
Ans: A
Question 3:
A systems administrator uses a program that interacts directly with hardware to manage storage,
network, and virtual machines. This program is an example of:
Ans: D
Question 5:
Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or
stolen?
A. Host-based firewall
B. Strong administrator
C. Anti-malware
D. Full disk encryption
Ans: D
Question 6:
A. Perl
B. JScript
C. Java
D. PowerShell
Ans: C
Question 7:
A user is attempting to print a document to a wireless printer and receives an error stating the
operation could not be completed. Which of the following should the user do to correct this
issue?
Ans: A
Question 8:
Which of the following actions is the FINAL step in the standard troubleshooting methodology?
Ans: A
Question 9:
A systems administrator wants to return results for a time range within a database. Which of the
following commands should the administrator use?
A. Select
B. Insert
C. Delete
D. Update
Ans: A
Question 10:
A user is getting an error message when trying to go to a website. A technician asks the user a
few questions to find out more about the issue. The technician opens a browser locally and
browses to the same site as the user. Which of the following troubleshooting steps is the
technician using by browsing to the same site?
Ans: C
Question 11:
A startup company has created a logo. The company wants to ensure no other entity can use the
logo for any purpose. Which of the following should the company use to BEST protect the logo?
(Select TWO).
A. Patent
B. Copyright
C. NDA
D. Trademark
E. EULA
Ans: B&D
Question 12:
A user is buying a laptop. The user will have a lot of personal and confidential information on
the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is
stolen.
Which of the following should be set up to accomplish this?
A. Encryption
B. Compression
C. Permissions
D. Auditing
Ans: A
Question 13:
A. Algorithm
B. Software
C. Pseudcode
D. Flowchart
Ans: A
Question 14:
Which of the following language types would a web developer MOST likely use to create a
website?
A. Interpreted
B. Query
C. Compiled
D. Assembly
Ans: A
Question 15:
Ans: D
Question 16:
A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and
operates on the 2.4GHz band. Which of the following should the technician select?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Ans: B
Question 17:
Which of the following operating systems do not require extensions on files to execute a
program? (Select TWO).
A. Windows 7
B. Windows 8
C. UNIX
D. Windows Server 2012
E. Android
F. Linux
Ans: C&F
Question 18:
For a disaster recovery exercise, a company wants to ensure customer data is recovered before
operational data. This is an example of:
A. Redundancy
B. Replication
C. Prioritization
D. Fault tolerance
Ans: C
Question 19:
Which of the following is MOST likely used to represent international text data?
A. ASCII
B. Octal
C. Hexadecimal
D. Unicode
Ans: D
Question 20:
Joe, a developer, is writing a program in which he needs to store a number that changes over the
duration of the program’s run.
Which of the following would Joe MOST likely use to accomplish this?
A. Loop
B. Variable
C. Constant
D. Function
Question 21:
Which of the following relational database constructs is used to ensure valid values are entered
for a column?
A. Schema
B. Permissions
C. Constraint
D. Column
Ans: C
Question 22:
An end user’s computer has been failing to open its word processing software. An IT technician
successfully solves the problem. Which of the following best describes the technician’s NEXT
step?
Ans: D
Question 23:
A regulation requires new applicants to provide a scan of their retinas in case of any future legal
questions regarding who applied for the position. Which of the following concepts is this an
example of?
A. Non-repudiation
B. Authentication
C. Integrity
D. Accounting
Ans: A
Question 24:
Ans: A
Question 25:
A small company wants to set up a server that is accessible from the company network as well as
the Internet. Which of the following is MOST important to determine before allowing employees
to access the server remotely?
Ans: B
Question 26:
A program needs to choose apples, oranges, or bananas based on an input. Which of the
following programming constructs is BEST to use?
A. Variable
B. If
C. Datatybe
D. Comment
Ans: B
Question 27:
Ans: C
Question 28:
A company executive wants to view company training videos from a DVD. Which of the
following components would accomplish this task?
A. Optical drive
B. Hard disk drive
C. Solid state drive
D. Flash drive
Ans: A
Question 29:
A technician is troubleshooting a problem. The technician tests the theory and determines the
theory is confirmed. Which of the following should be the technician’s NEXT step?
Ans: C
Question 30:
Which of the following intellectual property concepts BEST represents a legally protected slogan
of a business?
A. Contract
B. Patent
C. Copyright
D. Trademark
Ans: D
Question 31:
Ann, the president of a company, has requested assistance with choosing the appropriate Internet
connectivity for her home. The home is in a remote location and has no connectivity to existing
infrastructure. Which of the following Internet service types should MOST likely be used?
A. Fiber
B. DSL
C. Cable
D. Satellite
Ans: D
Question 32:
A technician is called to replace a display for a workstation. Which of the following would
MOST likely be used to connect the display to the workstation?
A. USB
B. NFC
C. DSL
D. DVI
Ans: D
Question 33:
A database administrator finds that a table is not needed in a relational database. Which of the
following commands is used to completely remove the table and its data?
A. UPDATE
B. DELETE
C. ALTER
D. DROP
Ans: D
Question 34:
Which of the following network protocols will MOST likely be used when sending and receiving
Internet email? (Select TWO.)
A. SMTP
B. POP3
C. SNMP
D. DHCP
E. ICMP
F. SETP
Ans: A&B
Question 35:
A technician is installing a new wireless network and wants to secure the wireless network to
prevent unauthorized access. Which of the following protocols would be the MOST secure?
A. WPA
B. SSID
C. WEP
D. WPA2
Ans: D
Question 36:
Joe, a user, finds out his password for a social media site has been compromised. Joe tells a
friend that his email and banking accounts are probably also compromised. Which of the
following has Joe MOST likely performed?
A. Password reuse
B. Snooping
C. Social engineering
D. Phishing
Ans: A
Question 37:
A user wants to use a laptop outside the house and still remain connected to the Internet. Which
of the following would be the BEST choice to accomplish this task?
A. Thunderbolt cable
B. Bluetooth module
C. Infrared port
D. WLAN card
Ans: D
Question 38:
Which of the following would MOST likely prevent malware sent as compromised file via email
from infecting a person’s computer?
A. Email previewing
B. Patching
C. Clear browsing
D. Kill process
Ans: B
Question 39:
The IT department has established a new password policy for employees. Specifically, the policy
reads:
A. Password lockout
B. Password complexity
C. Password expiration
D. Password history
E. Password length
F. Password age
Ans: B&D
Question 40:
Which of the following is a wireless communication that requires devices to be within 6in of
each other to transfer information?
A. Infrared
B. NFC
C. Bluetooth
D. WiFi
Ans: B
Question 41:
If the Breakfast program ran on Sunday, which of the following would be the output?
A. Oatmeal
B. Bacon and eggs
C. Waffles
D. Pancakes
Ans: C
Question 42:
A desktop administrator just connected a printer to a workstation, but the workstation does not
recognize the printer. Which of the following does the workstation MOST likely need for the
printer to function?
A. Permission
B. Ink cartridge
C. USB cable
D. Driver
Ans: D
Question 43:
Question 44:
Ans: D
Question 45:
Which of the following software license models allows a developer to modify the original code
and release its own version of the application?
A. Proprietary software
B. Commercial software
C. Open source software
D. Cross-platform software
Ans: C
Question 46:
A. Replay attack
B. Denial of service
C. Service outage
D. Dumpster diving
Ans: D
Question 47:
A. .msi
B. .tar
C. .img
D. .mp4
Ans: D
Question 48:
Which of the following file formats contain other files within them? (Select TWO).
A. Tiff
B. Dmg
C. Png
D. Mp3
E. Iso
F. Flac
Ans: B&E
Question 49:
Ans: D
Question 50:
Which of the following is a reason that a user might upgrade a video card driver? (Select TWO).
Ans. C&D
Question 1:
When trying to activate the operating system, a user receives a notice that the software is not
genuine. Which of the following security threats has occurred?
A. Social engineering
B. Phishing
C. Virus attack
D. License theft
Ans: D
Question 2:
A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the
following operating system types is required?
A. 8-bit
B. 16-bit
C. 32.bit
D. 64-bit
Ans: D
Question 3:
Which of the following operating systems is MOST likely to be found on a desktop where its
primary functions include professional video and audio editing?
A. Chrome OS
B. Windows 7 home
C. Mac OS X
D. IOS
Ans: C
Question 4:
Which of the following is MOST likely required during installation in order to legally install
software?
A. Automatic updates
B. Service level agreement
C. License key
D. Antivirus software
Ans: D
Question 5:
Which of the following alternative technologies allows a computer to run multiple operating
systems without partitioning the hard drive?
A. Web applications
B. Dual boot
C. Telepresence
D. Virtualization
Ans: D
Question 6:
Which of the following software types allows for the creation of a single file composed of
multiple subfiles, while at the same time reducing the overall size of the combined elements?
A. Database
B. Document sharing
C. Compression
D. Maintenance
Ans: C
Question 7:
A. Hard drive
B. CD-ROM/DVD-ROM
C. Flash drive
D. Tape
Ans: B
Question 8:
Joe, a technician, is asked to prevent users from playing games on corporate computers. Which
of the following is the BEST way to accomplish this?
Ans: B
Question 9:
A peripheral device manufacturer has corrected a security flaw in its software and released a
patch. Which of the following is the QUICKEST method to correct this flaw?
Ans: D
Question 10:
A user places a new desktop computer, monitor, and printer on the desk. Which of the following
is the NEXT step in completing the setup of the computer?
A. Install updates
B. Turn on the computer
C. Connect all cables to the computer
D. Configure antivirus software
Ans: C
Question 11:
Which of the following malware infections is responsible for locking data on a system in an
attempt to make the user pay a fee to unlock it?
A. Adware
B. Ransomware
C. Spyware
D. Trojan
Ans: B
Question 62:
A user set up a new computer and implemented cable management with very little slack on all
cabling. However, the workstation is shutting off intermittently. Which of the following issues is
MOST likely occurring?
A. The new surge protector used is not rated to handle the manufacturers workstation
B. The cable ties are loose and need to be adjusted
C. The computer may not have gone through its traditional burn-in period yet
D. The power cable could be too taut and is losing connection in the socket
Ans: D
Question 13:
A user is at the office and has a cellular phone that previously functioned properly. The phone is
powered on with a fully charged battery. However, the phone does not have connectivity. Which
of the following describes the problem?
Ans: D
Question 14:
Which of the following operating systems is very lightweight and relies heavily on Internet
applications?
A. Chrome OS
B. Windows
C. Linux
D. Blackberry OS
Ans: A
Question 15:
Which of the following operating systems is available for free and can be modified by anyone?
A. Windows
B. Linux
C. Mac OS
D. Chrome OS
Ans: B
Question 17:
Which of the following software package types is designed to accept input from multiple users?
A. Utility
B. Operating system
C. Specialized
D. Collaborative
Ans: D
Question 68:
Which of the following computer ports can be used for storage, video output, and peripherals?
A. HDIM
B. USB
C. VGA
D. eSATA
Ans: B
Question 19:
Joe, a technician, has discovered that his SOHO router does not include features that are listed on
the manufacturer’s website. Which of the following would allow Joe to enable these missing
features?
A user has purchased some new software from a vendor and wants to install it on all of the
Windows computers in the house. Which of the following will help the user accomplish the task
and ensure compliance with the software vendor?
A. .zip
B. .app
C. .iso
D. .pdf
Ans: B
Question 22:
A user learns of an operating system vulnerability that would allow a hacker to access the
computer. The user would like to keep the operating system up to date to prevent such
vulnerabilities from occurring. Which of the following should the user configure?
A. Additional OS features
B. Automatic updates
C. Software firewall
D. Anti-malware firewall
Ans: B
Question 23
Which of the following technologies allows people to communicate all over the world
inexpensively?
A. Virtualization
B. SSID
C. Kinetics
D. VoIP
Ans: D
Question 25:
A. SSID
B. SATA
C. SMTP
D. Gzip
Ans: A
Question 26
A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering
Ans: A
Question 27
A software developer develops a software program and writes a document with step-by-step
instructions on how to use the software. The developer wants to ensure no other person or
company will publish this document for public use. Which of the following should the developer
use to BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright
Ans: D
Question 28
Which of the following database concepts would MOST likely use a CSV file?
A. Data querying
B. Data reports
C. Data importing
D. Data persistence
Ans: C
Question 29:
A help desk technician encounters an issue and wants to find out if a colleague has encountered
the same issue before. Which of the following should the technician do FIRST?
Which of the following BEST describes the practice of providing user credentials when logging
on to the network?
A. Output
B. Storage
C. Input
D. Processing
Ans: C