CompTIA ITF+ Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When considering backup media, which of the following holds the MOST data?

BD-R has the highest disc capacity 128gb

Which of the following is considered an optical storage medium?

Blu-ray

Which of the following software package types is designed to accept input from multiple users?

Collaborative - software or groupware is application software designed to help people involved in a common task to achieve their goals.

Which of the following software types allows for the creation of a single file composed of multiple subfiles, while at the same time reducing the overall size of the combined elements?

Compression - is the method to make files smaller by reducing the number of bits (1's and 0's) used to store the information.

Yan has gathered together all of the CDs in his mother's collection - she has more than he imagined! He has identifi ed the data fi elds he needs in his database table and the best data type for each piece of data, so he is ready to create the database tables. Yan plans to set up the table using proper ANSI SQL syntax and wants to brush up on the details before he begins.Which SQL command is used to add a new table?

Create table

The extension .rtf is an example of which of the following file types?

Document - rtf(Richtexformat)

A user had to replace the hard drive in a computer. The user would like to install the games that came with the computer but were not installed as part of the initial OS setup wizard. The user can install the games by performing which of the following?

Enable installed OS Features

A user is setting up an older wireless access point that has only WEP for encryption. Which of the following additional steps will help to secure the network?

FIlter the MACAddress / disable SSID broadcast

George is accessing a database using a JDBC connection. Which of the following terms best describes the type of access he is using?

Field • A field is a location in a record in which a particular type of data is stored. • A column is an attribute for a row or record. • A row is a record within a table. • A table is a database object consisting of rows and columns. • A record is a data structure that is a collection of field

What are two methods that can be used to evaluate the condition of a loop at the start of each iteration? (Each correct answer presents a complete solution. Choose two. )

For & while - constructs check at the start of each iteration.

Which of the following are secure network protocols?

HTTPS. FTPS - is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security

Which of the following BEST describes the pros and cons of a home wired network?

High Throughout, Low mobility, High availability. Low latency, High security

A user has downloaded an application file with the .dmg file extension. Which of the following operating systems can be used with this file by default?

Mac OS - A file with the DMG file extension is an Apple Disk Image fil

Which of the following operating systems is MOST likely to be found on a desktop where its primary functions include professional video and audio editing?

Mac OSX

Which of the following is required to have a multimedia conversation with someone across the Internet? (Select THREE).

Microphone, webcam, and network connection

A user with an outdated operating system is consistently browsing sensitive websites such as banking, email, and corporate intranets. The Internet browser of choice is one that has already lost patch support and is not updated anymore. Which of the following actions will remedy this situation?

Move to an alternate browser

Which of the following could be described as both an input and output device?

Multi-function printer

Where can a user find the latest updates, upgrades, or firmware for an electronic device that the vendor supports?

OEM website - Original Equipment Manufacturer

A user has purchased some new software from a vendor and wants to install it on all of the Windows computers in the house. Which of the following will help the user accomplish the task and ensure compliance with the software vendor?

Purchase a multi-user license

Which software development approach prebuilts components to quickly facilitate design?

Rapid App development

The component that holds information for a single entry in a table is called a

Row

Which of the following components provides the FASTEST medium for hosting and storing an operating system?

SSD

Which of the following has the lowest latency?

SSD - Latency is the amount of time a message takes to traverse a system. In a computer network, it is an expression of how much time it takes for a packet of data to get from one designated point to another

Which of the following is a requirement to connect a smartphone to a wireless network?

SSID - service set identifier

Which of the following protocols is used to secure communications between sender and receiver?

SSL - (Secure Sockets Layer) is security technology for establishing an encrypted link between a web server and a browse

A security plan identifies which users can do what action(s) to data in the database

Software development kit is typically a set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform

On which database structure does an insert statement operate?

Table

What happens if a WHERE statement is not included with the DELETE statement?

The data from the table is deleted - for example: DELETE FROM ==> deletes rows in a table

Which of the following is the BEST reason to backup data?

To ensure Data Availability

What are three valid data manipulation language (DML) commands?

UPDATE, DELETE, & INSERT

Which of the following alternative technologies allows a computer to run multiple operating systems without partitioning the hard drive?

Virtualization - refers to the act of creating a virtual version of something, including virtual computer hardware platforms, storage devices, and computer network resources.

Which of the following technologies would allow a user to run multiple operating systems at the same time on a single computer?

Virtualization software

Which of the following technologies allows people to communicate all over the world inexpensively?

VoIP - Voice over Internet Protocol, is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet.

A database contains two tables named Customer and Order. You execute the following statement: DELETE FROM Order WHERE CustomerID = 209 What is the result?

all customers for customer ID209 are deleted from the order table

A user learns of an operating system vulnerability that would allow a hacker to access the computer. The user would like to keep the operating system up to date to prevent such vulnerabilities from occurring. Which of the following should the user configure?

automatic updates

An attacker cracks a user's password for all social media, email, and bank accounts. The user needs to change the passwords for all these accounts. Which of the following should the user do in the future to prevent this from happening?

avoid credential reuse

A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled?

bluetooth and NFC

Yuhong Li's son, Yan, is taking a programming course in school and he asked her advice on selecting a project for class. Yuhong suggests that Yan create a program to help organize her CD collection that she has accumulated over the years. Yan likes the idea. He can create a database table to store all of data related to his mother's collection and use C# or Visual Basic to create a user interface to search, add, and delete information from the table. Yan knows that defi ning the table fi elds is very important and selecting the right data type for each fi eld is critical. What data type should Yan use to store the CD label name?

char or variable char - Character stores A-Z or 0-9—any digit or letter that math functions will not be applied to.

A technician wants to minimize the risk of having third parties track previously visited web pages. Which of the following should be performed in the Internet browsers settings?

clear history & remove cookies

Which of the following connectors consists of three separate plugs for video?

component - video is a video signal that has been split into two or more component channels.

Which of the following is performed during WiFi setup on a mobile device?

configuring SSID settings - SSID is the name for a Wi-Fi network.

How does a console-based application differ from a Windows Forms application?

console based applications don't display a graphical interface

When setting up a new workstation, which of the following should be configured during the initial OS setup wizard?

date & time settings

Which of the following backup strategies only copies files that have changed since the last full backup?

differential backup - only files that have been changed since the last full_backup are copied.

A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?

disable autofill functionality within the web browser

A users laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another users laptop. How could the user have prevented this breach?

disable file print sharing

Which of the following file formats contain other files within them?

dmg / iso

A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

drop - the SQL DROP command is used to remove an object from the database

Which of the following computer connector types was designed specifically for allowing high-speed external hard drive transfers?

eSATA

Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?

enabling full disc encryption

A technician is setting up a computer that was shipped. After everything is plugged in, the computer will not turn on. Which of the following should the technician do FIRST to identify the issue?

ensure the power supply is set at the correct voltage

Your application must pull data from a database that resides on a separate server. Which action must you perform before your application can retrieve the data?

establish a connection to the database by using the appropriate data provider

You would include a HAVING clause in a query to

filter the results after grouping

A technician wants to keep a router up to date. Which of the following MUST be updated regularly?

firmware

Which type of constraint is used to enforce referential integrity?

foreign key constraint - joins a table to another table by referencing its primary key

Yan has gathered together all of the CDs in his mother's collection - she has more than he imagined! He has identifi ed the data fi elds he needs in his database table and the best data type for each piece of data, so he is ready to create the database tables. Yan plans to set up the table using proper ANSI SQL syntax and wants to brush up on the details before he begins.Proper ANSI SQL syntax refers to a set of rules that:

govern the structure and content of statements - ANSI SQL syntax is the grammar and rules governing the structure and content of statements.

Ann, a user, is doing her daily job on her company laptop at a coffee shop. She opens an Internet browser and tries to go to her home page. Instead, she is sent to an unfamiliar website. She clears all temporary files and deletes the history, but this continues to occur. Which of the following is the cause of the problem?

her computer is infected with adware and is redirecting her browser to another site

A technician has been tasked with changing the settings for a used SOHO router, but does not have the administrator password because the previous owner changed it. Which of the following actions will resolve this issue?

hold the reset button

A user needs to download tax documents from a financial website. Which of the following is the website MOST likely to use for transmission of the tax document to the users browser?

https (HyperText Transfer Protocol Secure) is an extension of the Hypertext Transfer Protocol. It is used for secure communication over a computer network

Which of the following is an advantage of using cloud-based collaborative applications and storage, rather than local applications and storage?

increased accessibility to files - World Wide accessibility: This is the main advantage of online data storage. You can access your data anywhere in the world

When connecting a printer to a network, which of the following is needed to complete the process?

ip address & subnet mask

While browsing the Internet, a user receives a warning regarding the display of mixed content. The address bar includes https, and the lock symbol is showing. Which of the following does this warning indicate about the website?

it contains both secure and non secure parts

When trying to activate the operating system, a user receives a notice that the software is not genuine. Which of the following security threats has occurred?

license theft

Which of the following is a potential advantage of outsourcing?

limited additional workload on existing staff

In the application life cycle, the revision of an application after it has been deployed is referred to as:

maintenance

A users operating system is set to automatically update as updates are released. However, last weeks updates failed to download. Which of the following should the user do FIRST to install the updates?

manually download the updates

A user wants to update a driver for additional features. Where would the user find a current version of the driver from an official source?

manufactures website

By default, which of the following types of operating systems can automatically detect a users location while the user is traveling in a bus?

mobile

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?

mothers maiden name

Which of the following are considered input devices for a computer?

mouse / microphone

What is not a rule for the primary key?

must be numeric - A primary key serves as the unique identifier of a specific row and uniquely defines a relationship within a database, and this one can be numeric, alphanumeric, or any type

Joe, a user, needs to store a large amount of data, but does not have enough space on his local computer. Which of the following are the BEST options for him to use? (Select TWO).

network attached storage & external hard drive

Several users want to share a common folder with high availability. Which of the following devices is BEST to use for this requirement?

network attached storage appliance - NAS appliances help businesses protect corporate data, enable file-sharing among employees and remote connectivity

This question requires that you evaluate the underlined text to determine if it is correct. To improve performance, a SQL SELECT statement should use indexes. Select the correct answer if the underlined text does not make the statement correct. Select "No change is needed'' if the underlined text makes the statement correct.

no change is needed

Which of the following is a safety feature of cloud-based backups?

offsite storage data - Offsite storage requires storing important data on a remote server, usually via the Internet

A user installing a printer can connect it to which of the following ports? (Select FOUR).

parallel, USB, Firewire, Serial

A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number listed on the bank account. Which of the following BEST describes the security threat taking place?

phishing

A user is at the office and has a cellular phone that previously functioned properly. The phone is powered on with a fully charged battery. However, the phone does not have connectivity. Which of the following describes the problem?

phone is in airplane mode

Two classes named Circle and Square inherit from the Shape class. Circle and Square both inherit Area from the Shape class, but each computes Area differently. Which term is used to describe this object-oriented concept?

polymorphism

Java is an example of

procedure oriented programming language

In database context, Which strategy is not related to an internal security plan?

provide backups and operational continuity

Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection?

public workstation was infected and passed the virus to the flash drive

When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?

remove or disable unnecessary features

Ann, a user, wishes to free space in her documents folder. Which of the following is the BEST characteristic to sort by in order to ensure that the most space is freed by deleting the least amount of files?

size

A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?

social engineering

Which of the following software development processes is best for large and complicated projects?

spiral - it is meant to reduce the early risks in the project. As per the process going by, the developers initiate on a smaller level and explore the included risks in it.

A technician sets up a new computer system and connects the keyboard and mouse to the PS/2 ports. When the computer boots, the BIOS gives a keyboard and mouse error. Both devices are connected. Which of the following is the solution?

swap the mouse/keyboard to the other ps/2 ports

A laptop owner, Ann, can no longer see web pages when she opens her browser, and she can only see her search bars and plug-ins. Which of the following is the MOST likely source of this issue?

the downloaded toolbars are filling the browser screen

An RoHS label on hardware indicates which of the following?

the hardware needs to be properly disposed - RoHS (Restriction of Hazardous Substances)

You need to track organization members. For each organization member, you need to keep track of the member's unique membership number, name and address, membership expiration date, and the payment date and amount for each dues payment received from the member. A table in your database would represent:

the members of the organization

What would be one reason to routinely back up your database?

to be able to restore the database to a functioning state after hardware or server failure

Which of the following is a reason that a user might upgrade a video card driver? (Select TWO).

to fix and error message / to use additional features

Which of the following is NOT a use for software development prototyping?

to identify requirements

A user is configuring a SOHO wireless router. The user should change the routers default administrator password for which of the following reasons?

to prevent unauthorized configuration changes

What is the purpose of including a COLLATE clause in a column definition?

to specify sorting rules that are different than those used for the other columns in the table

Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure the unit from any confirmed exploits?

update the units firmware

Which of the following are examples of keyboard connectors?

usb & ps/2

Question 71: Incorrect To reduce the risk of installing unapproved or possibly malicious apps on a smartphone, a user should:

utilize the vender-provided app store

In which situation do you need to perform a restore on a database?

when data becomes corrupted

You are creating an application that presents users with a graphical interface in which they can enter data. The application must run on computers that do not have network connectivity. Which type of application should you choose?

windows forms


Ensembles d'études connexes

Abraham Maslow: Hierarchy of Needs

View Set

PSC 130: Final Practice Question Study Guide

View Set

Pure Competition in the Long Run

View Set

R305: Chapter 17 Practice Questions

View Set

Emergency Care and Transportation of the Sick and Injured D2L Quiz Chapter 29

View Set