ITF+ Practice

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the proper example of a string definition?

"It is polite to say \ "Thank you\""

What is a true statement about interpreters and interpreted programming language?

An interpreter converts the program into machine code at runtime

Which of these is a plain text file a website creates when you visit it?

Cookie

Which of these is a Business Continuity concern?

Fault tolerance

Which of the following best represents the way data moves through a computer system?

Input, processing, output, and storage.

A user runs Microsoft Edge on a Windows 10 desktop. For more secure browsing, the user tries to disable scripting, but cannot deactivate it. What should the user do?

Install a script blocker add-on

A program is a sequence of what?

Instructions

What is the purpose of BIOS?

It is the firmware that drives the bootstrapping process.

Select the one UNTRUE statement in regard to an expansion bus.

It's also referred to as the Front Side Bus (FSB) or the local bus

What file system features uses a change log?

Journaling

What is an example of an output device?

Loudspeaker

Which of these is an Integrity concern?

Man-in-the-middle

Which of these is a typical device hardening policy?

Patching

Which of the following is NOT true about critical data when configuring file backups?

Replication allows critical data backup, which protects from accidental deletion of a record

Which of the following encrypts data in motion?

Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

Which of the following types of authentication, if compromised, could potentially impact multiple services?

Single sign-on

Which of these is a Confidentiality concern, as defined in the "CIA Triad"?

Snooping

When a general language performs scripting, what does it call on as part of the code?

System commands

What is the main purpose of the Power-On Self-Test (POST)?

The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows.

Which option is an example of an authentication lockout policy?

The device locks for a set period

Why would a programmer create a function instead of a procedure?

The process which calls the function needs to receive back a return value

What kind of computer firmware provides support for mouse operation at boot?

UEFI

Which of the following measures their data transfer capacity in Mbps (megabits per second)?

Wireless networks

Which type of OS (Operating System) allows a user to uninstall Windows XP and replace it with Linux?

Workstation OS

What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?

800

Which 802.11 wireless standard can use both 2.4 GHz (Gigahertz) and 5 GHz frequency bands?

802.11n

Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?

<h7>

What is true regarding a 32-bit vs. a 64-bit CPU (Central Processing Unit)?

A 64-bit CPU can run a 32-bit OS

An attacker successfully connects to an open wireless access point, and proceeds to monitor and capture the plain text traffic on the network. Which of the following integrity concerns does this describe?

A Man-in-the-Middle (MitM) attack

What could a network administrator implement to allow employees to securely connect remotely to the corporate network?

A Virtual Private Network (VPN)

What is the difference between a password and a passphrase?

A passphrase is longer than a password, and easier to remember

What is available in software installer packages to select specific feature sets or modules within the software package?

Advanced options

What functionality can turn off a mobile device's Wi-Fi without shutting off the device?

Airplane mode

What should a user do to protect sensitive information from malware, when working on a public worktation?

Clear the browser cache

Which of the following best describes their capacity in petabytes?

Cloud systems

Which backup storage type best helps mitigate against critical data loss in the risk of fire or theft?

Cloud-based storage backup

When does this pseudocode execute the print command? If i == 0 XOR i ! = 0 Then print "Yes" End If

Always

A web browser is an example of productivity software. What type of software is an email client?

Collaboration software

What type of software is Google Drive?

Collaboration software

What type of programming language has the fastest execution time?

Compiled

What's a true statement about compiled programming languages?

Compiled programming languages have to transform the code to an executable binary

Why is it important to protect computer data?

Computer data is an asset

A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?

Concurrent license

What is the Microsoft Edge web browser?

Application software

Which of the following is most likely an example of cross-platform software?

Application that runs on a Dell PC and a Samsung smartphone

Software programs that let users do useful things with their computer, such as create and edit documents are known as what?

Applications (or Apps)

Why is data persistence an important consideration when using a database with an application?

Applications need a way to prevent the loss of information after they terminate

If a worm propagates over a network, which of the following is the first action to take, to prevent further infection?

Disconnect the network link

A Bluetooth device is set up by "pairing" or "bonging" the device with the computer. To do this, the devices need to be put into what mode?

Discoverable

What is the last step in CompTIA's troubleshooting model?

Document lessons learned, actions, and outcomes

Which of the following types of collaboration software is least sensitive to latency?

Document sharing

A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?

Driver Manager

The first step in the troubleshooting process is to identify the problem. What are some of the components of this step?

Duplicate the problem; determine if anything has chagned.

An attacker taps into a wired network to intercept unencrypted wireless transmissions. Which of the following is a type of confidentiality concern that describes this activity?

Eavesdropping

With which method could an attacker use sniffing?

Eavesdropping

What problem is Window's UAC (User Account Control) designed to solve?

Elevated privileges

Which of the following is least likely to pose a substantial risks to an organization, such as a system intrusion?

Employees using permitted software and services as outlined in the handbook

After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data?

Ensure the integrity of the data

Which workstation operating system type is best used on a business network?

Enterprise Client

What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?

Kinetics

What does the term "hybrid laptop" mean?

Laptop that can be used like a tablet

What is an authorization policy that would help a system administrator grant rights to users to perform their job and no more?

Least privilege

What is the principle that grants users the rights necessary to perform their job and no more?

Least privilege

A user's Windows 8 laptop has the latest version of the Safari browser. The user tries to use a web application and receives a message that the browser does not support all features. What is the best course of action?

Install the browser which is fully supported by the application

Which of the following is NOT part of IoT (Internet of Things) home automation?

Insulin pump

A systems engineer wants to control access to critical data. Which of the following describes a security concern regarding storing and transferring data without authorization?

Integrity

Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?

Integrity

A wireless network in a small home office generated poor signal quality. The signal improved when an old cordless phone stopped working. What problem did the cordless phone cause when it was active?

Interference

Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?

Internet

What is the purpose of a NIC card?

It allows the computer to connect to network.

How is open source code used by developers?

It is code used by developers that they have the rights to modify without requiring permission to meet their project needs.

How is data stored on a hard disk drive?

It is encoded magnetically on a platter that spins

What are the properties of a file "Books/CoverPhoto.js"?

It's an executable file named "CoverPhoto.js" in folder "Books".

In terms of file systems, what benefits does exFAT provide over FAT and NTFS?

It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead

Arrange the following values in increasing speed (slowest to fastest):

Kbps, Mbps, Gbps, Tbps

What is the physical address of a network interface called?

MAC address

A programmer's task is to analyze a colleague's pseudocode and make it better. What will the programmer try to do?

Make it more compact and efficient

What type of language consists primarily of a series of nested tags?

Markup

What's a true statement about markup languages?

Markup languages are not programming languages

Which of the following is NOT considered to be a measurement of file size?

MicroByte

Which of the following computer components does an "all-in-one" workstation contain within the monitor case?

Microphone

Which is NOT an example of a Relational Database Management Systems (RDBMS)?

Microsoft Office Excel

What's the difference between scripted and scripting languages?

Scripting languages are for configuring an operating system

What should a user do before installing a driver from a third-party website?

Search the web for references of the driver's legitimacy and reputation

In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?

Security assurance

Data encryption, firewalls, and backups are examples of what?

Security controls

Which statement holds true about a desktop/workstation when comparing it to a server?

Servers use the same type of components as a desktop

What type of process is the Windows Task Scheduler?

Service

What do the instruction in this pseudocode do? declare Animal(9) as String For i = 0 to 9 If i > 5 Then Animal(i) = "dog" Else Animal(i) = "cat" End If Next

Set the first 6 elements of the array Animal to "cat", and the rest to "dog".

A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?

Settings/Devices

A user installs a software application for free, and it displays a 30-day countdown until the user must register it and receive additional features. What type of license is this?

Shareware

Which of these is NOT a form of malware?

Software

An access point is set up in a small home office. What is the best setting for the SSID (Service Set ID)?

Something unique to the network but without personal information

An essential part of troubleshooting is to establish a plan of action to eliminate the root cause without destabilizing some other part of the system. What needs to be in the plan of action?

Steps required to implement the solution

A package-delivery service is working with address information, which contains a house number and a street name. What is the best data type to use for the house number?

String

In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level?

Table

Which device is likely to use ARM (Advanced RISC Machine) CPU (Central Processing Unit)?

Tablet

For enterprise networks with very large amounts of data to backup, which is the best to implement?

Tape drives

What is the purpose of Task Scheduler?

Task Scheduler is used to schedule tasks to run at a specific time.

What are the two interfaces used for configuring input devices?

The Settings app and Control Panel

A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?

The enclosure provides ports to connect the drive to the computer

What is an advantage of the float data type compared to the integer data type?

The float data type is not limited to whole numbers

What three elements are required for a computer to perform useful tasks?

The hardware, software, and the computer's user.

Which best defines throughput rate of a device at any given time?

The measurement of data transferred between computers over a network.

What are the two important components that can be increased to improve video?

The number of pixels and the refresh speed

In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?

The number of rows

How does Plug-and-Play Installation work?

When a user connects a new device, Windows identifies it and attempts to install a new device driver.

A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?

Write a company policy and procedure for escorting visitors

When troubleshooting a computer for a specific issue, what information do you need when searching the internet for possible solutions?

You should obtain the computer model in order to find solutions related to your specific computer.

Which of the following declarations represents a 2-dimensional array?

declare Animal(9,9) as String

A computer program contains a boolean variable. What are the stored values of this variable?

0,1

How much storage does a character data type use?

1 byte

Which numbers does this pseudocode display? declare i as Number = 10 Do While i > 0 If i < 7 Then i = i - 1 End If print i i = i - 1 Loop

10, 9, 8, 7, 5, 3, 1

What is the fastest downlink speed that the typical cable Internet service providers offer to their customers?

100 Mbps

Which of the following represents the largest amount of storage capacity?

10000 TB

Convert the decimal number 35 into binary notation.

100011

How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?

128

Which of the following does NOT follow accepted MAC (Media Access Control) address format?

192:168:0.10/100

Convert the hexadecimal number 16 into decimal notation

22

What is the maximum transfer rate for the Firewire standard which uses 6-pin "alpha" connectors and cabling?

400 Mbps

What does 5 GB (GigaBytes) memory mean in the context of the Microsoft Windows operating system?

5120 MB

Convert the binary number 1000000 into decimal notation

64

A laptop built a year ago is likely to have which CPU (Central Processing Unit)?

64-bit

What does this pseudocode declare? declare MinutesPerHour as Number = 60

A constant

A table contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What does the table need, to make sure that the Email field contains the symbols "@" and "."?

A constraint

Which of the following best describes containers and identifiers?

A container is a type of identifier

Which of the following poses a higher risk to ensuring business continuity?

A converged network

Which is an example of a Human Interface Device (HID)?

A customer uses a keyboard to enter a username and password into a shopping application.

What is true about firewalls?

A firewall provides a way to restrict access to a computer or network

An employer fires an end-user for hijacking another employee's user account. Which of the following does NOT provide non-repudiation to the employer?

A guest user account

Select the best example of using dual monitors with multiple windows in Extended mode:

A programmer writes HTML code on one monitor and tests the web page changes in a browser on the other monitor

How does a search engine work?

A search engine usually works by compiling a database of information about web pages

When considering application interaction, an example of programmatic access can be best defined as what?

A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database

Which of the following authentication factors is an example of something you have?

A software token

Which of the following is the best example of variety of data in a database?

A table with a string, number, and date fields

When using web search engines, why should privacy considerations affect a user's decisions?

A user's web searches can reveal very valuable information

What's a true statement about variables?

A variable can have any data type that the programming language supports

Which of these is a NOT a "generation" of cellular Internet services?

ARP

A home office with 3 networks uses devices, which include 2 desktops, 4 laptops, 5 smartphones, 3 tablets, and a wireless printer. What device switches the communication between the wired and wireless networks in this office?

Access point

Which of these is an access control?

Accounting

What type of access control and technology helps ensure non-repudiation, and tracks what users are doing on the network?

Accounting; logs

A website visitor realizes that an important notification is not showing because the browser has a pop-up blocker. What's the best thing to do?

Add an exception for this website

A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field?

As a property of the Customer object

How does an object store its attributes?

As private variables

How do the CPU (Central Processing Unit) and storage devices in a computer process data?

As zeros and ones

What type of language is the most difficult to follow?

Assembly

What do we call loss of strength of a wireless signal?

Attenuation

What is the basic unit of computer data?

Bit

Which of the following enable you to create segments of code that you can reuse?

Both procedures and functions.

If a password is short and non-complex, what type of attack can it be vulnerable to?

Brute force

What type of software is project management software?

Business software

How is business software different from productivity software?

Business software is for a particular process, and productivity software is for general office functions

You created a folder called MyFiles under the root in a Windows file system. How would that folder be identified?

C:\MyFiles

What is an advantage of using CLI (Command Line Interface) instead of GUI (Graphical User Interface)?

CLI takes up less system resources to run

Which of the following SQL (Structured Query Language) commands can run with just one parameter?

CREATE DATABASE

Of the following, which language is typically used with markup language?

CSS (Cascading Style Sheets)

An Employee object includes the following fields: Name Address Phone Age DateOfBirth Salary Which of the following is NOT a good example of a method in this object?

CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program

Which wireless Internet service does a computer use when it connects by tethering?

Cellular radio

A system administrator is installing a new wireless access point (AP). During installation, the administrator should make sure to complete which of the following?

Change the default password

Which best defines Access Control on a computing device?

Controlling who has the ability to use the device, or information stored on the device.

What is a key difference between copyright and a patent?

Copyright protection happens automatically, but a patent must be applied for and registered

A relational database has a table, Customers, which contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to keep track of customer's purchases in this database?

Create 2 new tables: Products and Purchases

A table contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to set up a primary key for this table?

Create a new field called Id

A file contains information about the company's customers. The information includes Name, Address, Phone, and Email for each customer. What's the best way to convert this file into a database?

Create a table called Customers, with fields called Name, Address, Phone, and Email

When does a new creation become "copyrighted"?

Creations are copyrighted immediately upon creation.

What is the advantage of DAS (Direct Attached Storage) over NAS (Network Attached Storage)?

DAS is less expensive

A database administrator needs to extend a table with another column. What method contains the commands to do that?

DDL (Data Definition Language)

A web application needs to make changes to the contents of a table in a database, in response to a user's input. What method contains the command to do that?

DML (Data Manipulation Language)

A database administrator is looking to remove a table from a database using Data Definition Language (DDL) commands. Which of the following would achieve only this result?

DROP

Which of the following SQL (Structured Query Language) is NOT a DML (Data Manipulation Language) command?

DROP

What is the advantage of using DSL (Digital Subscriber Line) over fiber optic in a SOHO (Small Office Home Office)?

DSL is more easily available to individual homes

Which of the following is an example of an optical drive?

DVD

Besides Video Graphics Array (VGA), what graphic device interface supports analog equipment?

DVI-I

Which type of data uses whole disk encryption?

Data at rest

The information layer of data analytics requires software to perform which function?

Data correlation

What is an example of "processing" in a computer system?

Data is written to memory and manipulated by the CPU

Why is RAM an example of a volatile storage device?

Data stored in RAM is only stored as long as there is a power source sending constant power to the chip.

Why is it important to write data to a storage device, such as a hard disk?

Data stored in system memory is only preserved while the computer is powered on.

An attacker used hosts compromised with bot malware to launch a coordinated attack against a web service to overload it. Which of the following is the active attack threatening web service availability to your users?

Denial of Service (DoS)

Which of these is NOT a social engineering attack?

Denial-of-service

Which of these is an Availability concern?

Destruction

In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?

Details

What is used to prove a program was created by a trustworthy software publisher?

Digital certificate

What is a downside to digital products?

Digital products are easy to copy and steal

A guest at a friend's home needs to use the friend's computer for a few hours to browse the Internet and send out some emails/ The browser has many extensions and plug-ins which slow down page loading. What should the guest do with the add-ons?

Disable

Which feature of IoT (Internet of Tings) for motor vehicles uses a component of IoT home automation?

In-vehicle entertainment

Which best defines ergonomics?

Ergonomics is the study of factors affecting the performance of people at work.

What is the end result of the iterative process of establishing and testing a theory while troubleshooting?

Establish a root cause for the problem

Which file system allows a file with the name "Encyclopedia:Volume 1.txt"?

Ext4

Which of these is a protocol used to upload and download files between clients and servers?

FTP

Which term refers to technologies that help ensure data is available in the event of hardware failure?

Fault tolerance

Which of the following encrypts data at rest?

File-level encryption

You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?

Find and install the driver. Check first to see if it has been included with the printer. Otherwise, check the Windows Update website. If it isn't there, check the vendor's website.

USB and thumb drives are examples of which type of storage device?

Flash memory

What storage technology do SSDs (Solid State Drives) use?

Flash memory

What does a programmer use to visualize a program sequence?

Flow chart

What is the term for the processing speed of 1 billion cycles per second?

GHz

Which is a true statement about a GPU (Graphics Processing Unit)?

GPU works with the CPU to handle complex high-resolution images

The direct database access method is the best method to run which SQL (Structured Query Language) command?

GRANT

What is an example of a cloud hosted application?

Google mail

What indicates that a website has a highly trusted certificate?

Green padlock icon in front of address bar

Mobile devices detect the device's movement by using accelerometers and what other device?

Gyroscopes

An office computer needs a new keyboard and mouse. Before ordering them, the assistant should check which ports are available, to decide which style to purchase. Which port is NOT part of the consideration?

HDMI

Which rptocol supports interactive mechanisms GET and POST?

HTTP

Why do laptops use a heat spreader instead of heatsinks in their cooling system?

Heatsinks are bulky objects with a lot of height

Which notation is a more efficient method to express large numbers?

Hexadecimal

The system administrator just found out that a user has been using the same password for the last two years. Which of the following password best practices should the system administrator enforce?

History/expiration

What are the four functions which represent most of the ways that data moves through a computer system?

Input, output, processing, and storage

Which of these is a protocol to allow a mail client to download message from a mail server?

IMAP

An office building is using a Wi-Fi access point. The computer uses to configure the access point's device options is located on the other side of the building. What does a technician need to make it work?

IP address of the web configuration page

What is the difference between the address length of IPV4 (Internet Protocol version 4) and IPV6 (Internet Protocol version 6)?

IPV4 addresses are 32 bits, and IPV6 addresses are 128 bits

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling confidential information?

IT security training

An employee makes unauthorized copies of customer Social Security numbers, saves them in an unencrypted spreadsheet, and transfers them to the employee's personal email account. The employee then opens new credit card accounts with this information and uses the cards to buy personal items. Which of the following did NOT occur?

Identity checks

An attacker captures password packets to figure out a user's password to gain access to a host on a corporate network, and masquerades as that user. Which of the following is a threat to integrity that describes this attack?

Impersonation

If a system goes down, which of these will NOT help recover from data loss due to a natural disaster?

Implementing a Redundant Array of Independent Disks (RAID)

A table in a relational database receives imported data from a text document. In what format does the table store the new data?

In a structured way

Which of the following does NOT encrypt web page data?

Mobile device encryption

If the password policy for a company requires a user to authenticate with a smart card certification as well as with a PIN, what is this type of authentication?

Multifactor

Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?

NFC

Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing?

Network redundancy

When does this pseudocode execute the print command? If i== 0 AND i ! = 0 Then print "Yes" End If

Never

Why is scalability an important consideration when choosing to use a database instead of a flat file?

Nonscalable systems increase their costs at the same rate as the number of users that they support

In the context of programming languages such as JAVA, what does the acronym OOP best represent?

Object-Oriented Programming (OOP)

Where does the Central Processing Unit (CPU) live in a computer?

On the motherboard

The accountant of a small company uses a database application to maintain the list of vendors, their services, and their invoices to the company. The application uses Microsoft Access for the database layer, with the front-end interface layer in Visual Basic, to work with the data and to generate custom reports. What is the application architecture of this system, which resides on the accountant's desktop computer?

One-tier

Why do companies pay for a software license subscription plan instead of a less expensive one-time purchase?

One-time purchases do not include full-feature upgrades

What is the difference between DropBox and OneDrive?

OneDrive is built into the Windows OS

What's a true statement about the assembly language?

Only specialists use assembly code

Why would a business choose satellite service instead of DSL (Digital Subscriber Line)?

Satellite systems provide bigger areas of coverage

When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service?

Password managers

What do we call an online network where instead of a central server; each client contributes resources to the network?

Peer-to-Peer

Which of the following helps to authenticate the user requesting a password reset over the telephone?

Personally Identifiable Information (PII)

Which of the following exposes to a Man-in-the-Middle (MitM) attack?

Plain text

A new scanner is purchased for the office, and the technician is using a disk with driver software instead of Plug-and-Play. What is the most likely reason?

Plug-and-Play installation did not work for this scanner model

Which of these is the name for a type of an add-on for a web browser?

Plug-in

Which of these is NOT a form of a multitouch gesture?

Poke

Which of the following would NOT be defined as an input device?

Printer

Which of these is a Disaster Recovery concern?

Prioritization

A workstation experiences slowdowns while running Microsoft Word. The program does not respond to attempts to close it, therefore the user executes the Task Manager utility to quit the program. What does this fall under?

Process management

What does this pseudocode do? declare i as Number = 0 Do While i <= 100 i = i + 1 print i i = i - 1 Loop

Produces an infinite loop

What type of software is Microsoft Office?

Productivity software

What is the main cause of memory leaks?

Programming errors

A senior manager of a regional office branch needs a payroll report of all staff, to calculate next year's budget. Which program is NOT useful for that?

Project management software

In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?

Queries

What type of language has working with datasets as its primary purpose?

Query

What's a true statement about query languages?

Query language code does not need to be compiled

CompTIA's troubleshooting model includes having to establish a theory of probably cause. What is one of the components of this step?

Question the obvious

Which Redundant Array of Independent Disks (RAID) has only striping with parity?

RAID 5

What does a PC (personal computer) need more of to open more programs simultaneously and work on large files more efficiently?

RAM

Select the one UNTRUE statement in regard to system memory.

RAM is random access memory and is non-volatile storage.

What port does an Ethernet network adapter use?

RJ-45

A user needs to backup a 6 GB (GigaByte) video file from a Windows desktop to a new 64 GB flash drive. An error message warns that the file cannot copy over to the flash drive, due to file size limitations. What does the user need to do?

Reformat the flash drive into NTFS

What type of database uses a schema?

Relational

What is an advantage of a relational database over a key/value pair database?

Relational databases have query languages to retrieve data

What is a clean uninstall

Removing files and settings manually

A manager requests to see the information on all of the company's customers, listed by geographical regions, with the totals of purchases made by each customer. What is the best tool to produce this list?

Report

Which of the following will NOT help prevent the attachment of portable personally owned devices, such as smartphones and Universal Serial Buses (USBs)?

Requiring a fob

What is the second step in CompTIA's troubleshooting model?

Research knowledge base/Internet, if applicable

Which of these practices is unsecure as your security becomes dependent on other organization's security measures?

Reusing across sites

What is the correct SQL (Structured Query Language) command to read information from a table?

SELECT

What does a database dump contain?

SQL statements which can recreate all tables

What is a true statement about permissions in a database which uses SQL (Structured Query Language)?

The owner of the database object has complete control over that object

What is the difference between a software product key and a product ID?

The product key activates the software, and the product ID is for technical support

What would be considered a downside to producing digital products?

They are easy to copy and steal.

Why are USB (Universal Serial Bus) thumb drives non-volatile?

They retain data without power

How can a user belong to a group account and inherit security permissions in a workgroup?

Through privileges allocated to the groups

What uses the same physical interface as MiniDP (mini DisplayPort format)?

Thunderbolt

Which of the following is Task Manager commonly used for?

To end an unresponsive process that cannot be closed from the application window itself

What is the best reason to use a flat file instead of a database?

To exchange information between systems

A web application contains a form, which users fill out. What is the most likely use for this form?

To manually input data into a database

Why would a locally installed application store data files in a user folder and not the application folder?

To prevent users from modifying application folders

What is the main purpose of NIC (Network Interface Card) expansion card?

To provide additional NICs to servers on a wired business network

Why would you virtualize an environment?

To use hardware and software resources effectively, as well as potentially to save time and money.

What should a company that's trying to promote its goods and services have on its name and/or logo to protect it from imitators?

Trademark

Which of the following ways best defeats social engineering?

Training end-users how to identify and report suspicious activity on the network or workstation

Which best describes an Information Technology (IT) system?

When a system processes, stores, and transfers information.

A user installs VirtualBox on a Linux OS (operating System). Which class of hypervisor is it?

Type II, because VirtualBox is a software application within a host operating system

An older digital camera without wireless networking support is malfunctioning, so the photos need to be backed up to the computer. Which port on the computer can the camera owner use?

USB

Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?

USB 3.0

What type of connector does Thunderbolt 3 use?

USB-C

Which Unicode character encoding standard do most websites use?

UTF-8

What does the motherboard determine about a desktop computer?

Upgrade potential

What is the easiest way to install a standard mouse, and configure it to use basic settings?f

Use Control Panel/Settings

A user wants the easiest and most secure way to prevent websites from discovering the IP (Internet Protocol) address of the computer. What should the user do?

Use a Virtual Private Network

How can you modify your File Explorer options to allow you to view hidden files?

Use the View tab under the File Explorer Options applet

A complex software application collects requests from general users for certain sets of data through a form, connects to a Microsoft SQL (Structured Query Language) Server database with ODBC (Open Database Connectivity), submits the criteria for the data query, receives the results, and displays them to the users as a report on the screen. Which combination of database access methods best describes this process?

User interface and programmatic access

What is NOT one of the features of an application virtualization software such as Citrix XenApp, which installs on a network server instead of individual workstations?

Users can use the application without a network connection

What is an example of using a locally installed application without network access?

Using Microsoft Word to write a letter

Which of the following helps protect against dangerous unsolicited email file attachment threats?

Using anti-malware

Which of the following is NOT considered a best practice for installing software?

Verify the software was created in the country which you live in.

The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take?

View log files

A company operates in 2 offices. Both offices are located in the same town, with about 100 employees in each building. What type of network does it need to connect all of its employees, LAN (Local Area network), or WAN (Wide Area Network)?

WAN, because there are multiple locations

What is the difference between WPA (Wi-Fi Protected Access) and WPA2 wireless encryption standards?

WPA2 uses Advanced Encryption Standard

Which of the following is an example of a compressed file format?

zip


Conjuntos de estudio relacionados

Quiz: Sales Contracts, Products Liability, Credit and BankruptcyAssignment

View Set

Elements of short Stories / 8th grade

View Set

Всё, что вы хотели знать о функциях в Python

View Set

Sectional Exam 6 - Head & Spine Trauma

View Set