ITF+ Test Prep
What type of cryptographic operation(s) are non-reversible? A. Key-pair B. Symmetric C. Asymmetric D. Hashing
A cryptographic hash is designed to make it impossible to recover the original data from the hash and ensure that no two pieces of information produce the same hash. It can be used to prove that a message has not been altered or to store information like passwords within a database.
Which method does a technician use to configure and improve a system's memory usage? A. Users do not configure any of the system memory setup because the OS handles all system memory activities. B. Use of virtual memory or a pagefile, where disk space is used to supplement system RAM.term-8 C. Use of general system memory, where a percentage of memory can be allocated to specific applications. D. Use of mass storage, where disks can be partitioned to separate OS files from user files.
A user can configure a page file if extra memory is needed.
Which of these is an access control? A. Destruction B. Accounting C. Integrity D. Snooping
Accounting is the process of tracking authorized and unauthorized usage of a resource or use of rights by a subject.
Which of the following enable you to create segments of code that you can reuse? A. Neither procedures nor functions. B. Procedures C. Functions D. Both procedures and functions.
Both procedures and functions enable you to create segments of code that you will reuse. The key difference, in programming terms, between a procedure and a function is that the latter can return a value to whatever called it, whereas a procedure cannot.
Which workstation operating system type is best used on a business network? A. Network Operating System (NOS) B. Mainframe OS C. Enterprise Client D. Home Client
Enterprise Client is a workstation operating system (OS) type, designed to work as a client in business networks.
You have asked a senior manager to authorize your plan of action for resolving a fault in a software application. What name is given to the process you are following? A. Verifying full system functionality B. Testing the theory C. Considering multiple approaches D. Escalating the problem
Escalating a problem is when you reach out to an experienced staff member for assistance and approval of your procedure or actions. When you can no longer work autonomously and have to ask for help, then you are escalating.
What key combination can you use to force the browser to ignore any locally cached files when refreshing a page? A. Ctrl++ B. Crtl+Alt+Del C. Ctrl+F5 D. Alt+F4
Ctrl+F5 instructs the browser to perform a refresh but to ignore the locally cached files.
Which of these is an Availability concern? A. Destruction B. Replay C. Snooping D. Impersonation
Destruction is the loss of a service or data through any number of reasons. You might lose a data center through a fire or a person spills coffee on a server.
What type of address identifies a network interface in the context of the local network segment only? A. A Media Access Control (MAC) address B. IP address C. DNS D. URL
Each host, or device, is identified by the address of its network interface by the MAC address, which is assigned to the network adapter at the factory.
What impact is presented when users reveal their passwords to technical support staff? A. It exposes the passwords to brute-force attacks from malicious hackers. B. It provides technical support staff with access to the user's personal files stored on the network. C. It exposes users to social engineering attacks that try to gather login credentials for malicious use. D. It prevents the user from needing to change a password following the password history component of the policy.
Any request for a password should be treated by users as suspicious. Social engineers often impersonate technical support staff to deceive users into revealing sensitive information. Best practice is to train users to never reveal their passwords to anyone.
Which of the following methods can be used to open the Computer Management console? A. Right-click the This PC object in File Explorer. B. Right-click the Start button. C. Right-click the Taskbar. D. Via the Settings app.
The shortcut menu for the Start button contains many configuration and administrative utilities, including the Computer Management console.
You are advising a colleague about best practices when troubleshooting. You have identified the following techniques to use to identify a problem: gather information, duplicate the problem, question users, identify symptoms, and approach multiple problems individually. If you are following CompTIA's troubleshooting model, what other piece of advice should you give? A. Test the theory to determine a cause B. Research the knowledge base or Internet C. Establish a theory of probable cause D. Determine if anything has changed
The technique missing from the scenario is to determine if anything has changed.
Which of these is a Business Continuity concern? A. Fault tolerance B. Data restoration C. Restoring access D. Prioritization
Business continuity implements fault tolerant systems that contain additional components to help avoid single points of failure so when a component fails users do not lose access to computer systems.
What is the advantage of a local network hosted application, in terms of data storage? A. If data is stored on the server and not on the local workstation, it will be available to the user if a network device fails. B. If data is stored on the server and not on the local workstation, it is easier to apply access controls and to back it up. C. If data is stored on the server and not on the local workstation, it will be available during power outages. D. If data is stored on a local network storage device and not on specific workstations, different users will not be able to access the information.
If data is stored on the server and not on the local workstation, it is easier to apply access controls and to back it up. Having user data consolidated on a server gives administrators the ability to run data backup routines, which are a safeguard in case of hardware failure. Access controls are also easier to implement when files are on the server.
Which non-discretionary access control type is based on the idea of security clearance levels? A. Role-based Access Control (RBAC) B. Discretionary Access Control (DAC) C. Mandatory Access Control (MAC) D. Rule-based access control
Mandatory Access Control is based on the idea of security clearance levels. Rather than defining access control lists on a resource, each object and each subject is granted a clearance level.
A user sends an email to another user. The email sender receives a delivery receipt from the receiving server. Which security-related concept validates that the email was successfully delivered? A. Authentication B. Accounting C. Authorization D. Non-repudiation
Non-repudiation, which is the principle that the user cannot deny having performed some action.
What type of software is an ODF file associated with? A. Video conferencing software B. Word processing software C. Email client software D. Database software
Open Document Format (ODF) files are associated with word processing applications. Word processing applications help users to write and edit documents.
When troubleshooting a computer for a specific issue, what information do you need when searching the internet for possible solutions? A. You should obtain the computer model in order to find solutions related to your specific computer. B. You should obtain the processor type in order to find solutions related to your specific computer. C. You should obtain the manufacturer name in order to find solutions related to your specific computer. D. You should obtain the serial number in order to find solutions related to your specific computer.
You should obtain the computer serial number in order to find solutions related to your specific computer. Every computer is unique in its own way. Manufacturers such as Dell and HP provide specific support results based on system serial numbers.
What protocol is usually used to provide logical addressing on networks? A. Address Resolution Protocol (ARP) B. Internet Protocol (IP) C. Internet Control Message Protocol (ICMP) D. Transmission Control Protocol (TCP)
Internet Protocol (IP), part of the Internet Layer, is the main protocol in the TCP/IP suite. It is responsible for logical addressing and the routing of packets between hosts and networks.
What is an interpreted programming language? A. Interpreted languages represent machine code in human-readable text and are typically specific to a particular hardware architecture. B. Interpreted languages do not need to be compiled and are designed to retrieve specific records from a data set. C. Interpreted languages do not need to be compiled because the code gets converted to machine code at runtime. D. Interpreted languages organize data through structured nested tags and are rendered by a web browser.
Interpreted languages do not need to be compiled. They convert the code to machine code during runtime. Python, Perl, and JavaScript are all popular forms of interpreted programming languages.
What type of printer uses a fuser? A. Laser printer B. Color bubblejet printer C. A 3D printer D. Impact printer
Laser printers are the type of printers that use fusers. Essentially, the laser heats up the toner and then transfers and bonds the toner to the paper using heat and pressure.
Which method does a technician use to configure and improve a system's memory usage? A. Users do not configure any of the system memory setup because the OS handles all system memory activities. B. Use of virtual memory or a pagefile, where disk space is used to supplement system RAM. C. Use of general system memory, where a percentage of memory can be allocated to specific applications. D. Use of mass storage, where disks can be partitioned to separate OS files from user files.
Pagefile is also known as the swap file, or virtual memory file. It's a file that Windows uses as Virtual Memory. Virtual Memory is disk space Windows uses when it runs out of physical memory, or RAM.
You need a development environment with a library of database functions. What type of interface are you using? A. Direct/Manual Access B. Programmatic access C. Query/Report Builder D. Utility Access
Programmatic access is where a software application can interact with the database either using SQL commands or using SQL commands stored as procedures in the database. Most programming languages include libraries to provide default code for connecting to a database and executing queries.
In the area of workplace surveillance, what is monitoring data communications and employee's behavior called? A. Security assurance B. Monitoring data C. Physical monitoring D. Eavesdropping/wiretapping
Security assurance is monitoring data communications and employee's behavior to ensure that they do not divulge confidential information or compromise the security of the organization.
Why is prioritization a critical task for disaster recovery? A. Integrity of the data will need to be checked before access is re-enabled. B. Services may have dependencies that make restoring them in the wrong order futile. C. System demand will need to be monitored after rebuilding to verify stability. D. Network cabling should be designed to allow for multiple paths between the various servers.
Services may have dependencies that make restoring them in the wrong order futile. Also, disasters lead to scarce resources so the most critical services must be given priority. These should be identified before the disaster occurs so that staff working to recover systems are properly guided.
What system policy ensures that users do not receive rights unless granted explicitly? A. Least privilege B. Implicit deny C. Allow all D. Deny all
Users should only be granted the minimum sufficient permissions, Implicit deny means that unless there is a rule specifying that access should be granted (explicit authorization), any request for access should be denied.
What type of programming concept allows for a variable size container? A. A procedure B. An array C. A vector D. A function
Vectors can grow or shrink in size as elements are added or removed.
Which of these is a typical device hardening policy? A. Disabling passwords B. Patching C. Using default passwords D. Using virus software
Patching means upgrading OS files, driver software, and firmware to keep from exploitation by malware. It is important to keep computers and other devices configured with up to date patches and firmware.
Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. What should you do next? A. Prevent the browser from installing the plug-in and change your passwords due to phishing. B. Allow the browser to install the plug-in as it can be uninstalled later. C. Run an antivirus scan because you have an active malware infection. D. Check whether your friend actually sent the link in good faith first.
This is a classic phishing attack and your friend's computer could be infected with a virus or Trojan. Check whether your friend sent the link in good faith first. Most likely, your friend does not know that email with the link was sent.
Why would you virtualize an environment? A. To increase hardware redundancy across multiple physical workstations. B. To use hardware and software resources effectively, as well as potentially to save time and money. C. To allow remote access through a virtual private network (VPN) for users. D. To implement cloud storage on a system.
To use hardware and software resources effectively, as well as potentially to save time and money. Virtualization means that multiple operating systems can be installed and run simultaneously on a single computer. A virtual platform requires at least three components: computer(s), a hypervisor (or Virtual Machine Monitor [VMM]), and guest operating systems (or Virtual Machines [VM]).
If you use an open network, what email configuration setting should you configure? A. Enable Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption to protect the account password B. Enable anti-malware software to protect from viruses C. Disable active content types like flash and Java to protect the web browser D. Enable a script blocker to prevent scripts from running
When using an open network, any data that you transmit could be intercepted by anyone else connected to the network and the person who owns it. To protect an email account password, enable Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption.
How does a one-time password work? A. The existing password is sent to a user after having requested a password change on a website. B. A unique password is generated using an algorithm known to both a device (fob) and the authenticating server. C. A temporary password is sent to a user via email after requesting a password reset. D. A user must enter a hardware token, like a smart card, and enter a password or PIN.
With one-time passwords, the password is generated by an asymmetric encryption algorithm. This means that the authenticating server can determine that the number was generated by a particular device (fob) at a particular time. When used with a PIN, it also proves that the password was input by a particular user.
