CompTIA ITF+ Practice Test 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

WLAN (Wireless Local Area Network) Card

A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the best choice to accomplish this task?

USB 3.1 Gen 2

A USB port marked in red is designed for which if the following standards?

Use your account information

A client is installing a subscription program and is panicking because there is no prompt for a serial number. Which of the following statements will solve the problem?

S/PDIF (Sony-Philips Digital Interface) Optical

A friend has lent you an audio cable for use with your older computer. He cautions you not to bend or crease the cable. What type of cable is it?

Group Records

A report can be built from a query. Which of the following can be done in a report but not in a query?

PowerShell

A scripting language that includes aliases that help users to reuse existing Windows and Unix/Linux shell scripts is _________?

Screen Saver is lock screen password

A user steps away from their computer frequently and is concerned about unauthorized users changing information while they're away. Which of the following would help prevent this?

Input

As you use a barcode reader to check in new products, you are performing ________

End User License Agreement (EULA)

Before installing a new program for your client, your client wants to know what types of installations are permitted. You tell your client to download and review what?

Enable Encryption & Install a Hardware Lock

Due to a recent string of thefts in your office, you need to harden your local system. What two actions are most appropriate for your situation?

FTTP (Fiber to the Premises)

Fiber Optic is being used as part of the distribution network for several types of Internet Connections. Which of the following goes directly to the service location (home or business) to provide the fastest service?

Multipartite

If a virus attacks the boot sector of your hard drive as well as files in the file system, what type of virus is it?

File transfer runs at port speed

If you connect a USB 3.0 flash drive to a USB 2.0 port, which of the following will happen?

Runs the following command twice

In Ruby, the statement 2.times do performs which of the following?

Tier 3

In a three-tier application architecture, which tier is used for data?

Disable the touchpad

Jacky complains the cursor on her laptop screen jumps around unexpectedly when she's typing. What can she do to solve the problem?

Autofill

Jacky discovers when she types her name into a field in a web browser, her whole name appears & her address. What is this due to?

Enter the same server name as the IMAP server

Jacky doesn't know the name of the SMTP server when setting up email on an iPad and only has 10 minutes. What advice do you give her?

Guest

Jacky gets a new workstation and is not part of a domain. What user accounts should she disable to increase security?

HTTPS://

Jacky is browsing the internet and wants to know if it's safe to enter her credit card information into a website. What do you tell her to look for?

Rootkit

Jacky just heard of a program that if installed on your computer gives the attacker administrator like access to your machine. What type of software is he talking about?

Excessive Pop-Ups, browser redirection, & search engine redirection.

Jacky thinks her computer is infected with adware. What 3 things should she look for?

Password Reuse

Jacky's Facebook gets compromised and she tells a friend her email and banking accounts are probably also compromised. Which of the following has Jacky most likely performed?

BASIC

Line numbers were a common feature of early versions of which of the following languages

Multifactor Authentication

Managers at your company have decided to implement stricter security policies. Which of the following login schemes will help them achieve this goal?

Payment Systems

Near Field Communication (NFC) is used for which of the following tasks?

Allow App Store Apps only

Several macOS devices in the office become infected with malware. After asking the users, you find out they installed software from unfamiliar sites. Which of the following settings can prevent this from happening?

ASCII Character Set

The cent sign character is not available in which of the following character sets?

Relation

The contents of the field Social in the table CustomerName and the contents of the field SSN on the table ShippingAddress are identical and unique. To be able to query data from tables, you need to set which of the following between these fields?

Web-Based

The documentation for a new device states that it has a default IP address of 192.168.1.1 this device uses which type of setup?

Output

The microphone/line-in jacks on a sound card are input devices. The speaker jacks are examples of _________ devices.

Database Engine

The same database app can support different amounts of data. Assuming that the storage available to the database app is large enough for any amount of data supported by the app, which of the following affects the amount?

Flat File

What is a NoSQL database also known as?

Screensaver Password

What option can you configure on your workstation to increase security when you leave your desk?

Processing

When the user edits a photo, this is an example of which of the following?

Input

When you connect a camera to a computer via a USB cable to transfer pictures to the computer, the USB port on the computer is an __________ device.

Either End

Which end of a USB Type C (USB-C) cable should be connected to the USB-C port on a computer?

Turns off all wireless connections

Which of the following accurately describes what Airplane mode does on an iPhone?

Closing untrusted source warnings

Which of the following actions is not considered a web-browsing best practice?

Input, process, output, storage

Which of the following are the basic computing operations?

Multifunctional Device

Which of the following devices is an input/output device?

Boot Sector

Which of the following is a typical location for a rootkit?

Near Field Communication (NFC)

Which of the following is a wireless communication that requires devices to be within 6 inches of each other to transfer information?

Coordinate Software Applications

Which of the following is not a function of an operating system?

Unicode contains all ASCII characters

Which of the following is true abiut the remationship between ASCII and Unicode?

JavaScript

Which of the following languages is commonly used for web development?

Installing a new operating system with antivirus on the infected computer

Which of the following methods is not recommended for fixing a computer infected with malware?

Software bundles with unwanted applications

Which of the following problems can be prevented by using a direct download link from a software aggregator website?

#0000FF

Which of the following represents a pure blue color in text?

Some motherboards include video outputs

Which of the following statements is correct about the motherboard?

Port Clusters Enable Multiple USB Devices To Be Connected To A Computer

Which of the following statements is correct about the port cluster?

Patching

Which of the following would most likely prevent malware sent as a compromised file via email from infecting a persons computer?

DisplayPort & HDMI

Which pair of cables carry both digital audio and digital video signals?

Software Firewall

Which type of software will help protect your computer from malicious network traffic?

Near Field Communication (NFC) & Bluetooth

While on a 6 hour layover at the airport, what should you disable on your phone as a device hardening measure?

Wiretapping

While speaking to a friend about a surprise party in a standard phone, you hear a faint click. Later someone is talking about the surprise party. What is the most likely reason?

On-Site

You are considering backup storage options. Which of the following is not a good option in the case of robbery, fire, earthquake, or civil disturbances?

Custom Installation

You are installing a program and need to change the normal location for the program and change what features are installed. You are performing which of the following?

Row Locking

You are making an update to the Quantity Ordered field for one item of an inventory database while another user is making an update to the In Stock field for a different item in the same database, at the same time. If this database supports locking, which type of locking is it using?

GPU (graphics processing unit)

You are viewing a 3D rendering on a projector. Which of the following components performed the rendering?

Ask which cable service the customer has

You are working at an electronics store and a customer asks for a cable modem that supports DOCSIS (Data Over Cable Service Interface Specification). Which of the following should be your response?

Snooping

You discover a key-logger program on your computer. What type of attack is this?

They logged on with your username and password

You enable file encryption on your local computer. While your were on vacation, a coworker gets on your computer and shares important files with other users. How did they do this?

RJ-45 & FireWire

You have 2 Mac computers running OS X, and you want to connect them into a network. Which two types of connectors can help you accomplish this?

Buy a second software license

You have a program with a single-use software license for computers or virtual machines and need to install it on a computer and a VM. Which of the following should you do to take care of your client and follow the license agreement?

One-time purchase

You have started to use a computer that is running an application that is three versions behind the current version. It was purchased and installed five years ago. What type of a license is it using?

Use a DVI-HDMI cable

You need to connect a display to your laptop so you can extend the desktop. The laptop has an HDMI port and a VGA port, but the display only has a DVI-D port. Which of the following will solve the problem?

Google Play

You need to find a new productivity app for your android based tablet. Where should you look?

Spear Phishing

You receive an email claiming to be from the IT security director that asks you to provide the server password. This could be an example of __________ ?

Change default passwords and don't reuse old passwords

You're asked to give training on network security. For your section on password management, which 2 options should you recommend to users?

Your adobe account information

You're installing Adobe Creative Cloud, which is provided as a subscription. Which of the following would you enter to validate your installation?

There are 15 app updates available

Your client is using an iOS device. The App Store button has the number 15 on it. What does that mean?

It violates the End User License Agreement (EULA)

Your client wants to share a printer on a Windows 10 computer with 25 other users. You inform him this is not permitted because of which of the following?

Database

Your clients staff is having a difficult time in correctly entering names and addresses into a spreadsheet for use and mailing. Which of the following types of software would make this easier?

Eavesdropping

Your organizations security director has ordered that all webcams and microphones be covered or disconnected when not in use. Which of the following threats will this help prevent?


Ensembles d'études connexes

Gastrointestinal Disorders (prep U additional)

View Set

Pathogenesis, Disease, and Epidemiology

View Set

BPH, Prostate cancer, TURP/CBI, Erectile Dysfunction

View Set

Fluid and Electrolytes, Acid-Base

View Set

Lewis Ch. 22 - Assessment of Integumentary System

View Set