CompTIA ITF+ Prep Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What sort of device could you use to expand the storage capacity of a smartphone? A) A flash memory card B) An extra battery C) An SSD D) A SIM card

A) A flash memory card

How is a Windows library different from a folder? A) A library acts as a virtual folder by displaying the contents of multiple folders, which could be located on different drives. B) A library is the user's private folder containing subfolders for different types of files like documents, music, and pictures. C) A folder acts as a virtual library by displaying the contents of multiple libraries, which could be located on different drives. D) A library and a folder are virtually the same thing.

A) A library acts as a virtual folder by displaying the contents of multiple folders, which could be located on different drives.

How does a search engine work? A) A search engine usually works by compiling a database of information about web pages. B) A search engine usually works by searching a web cache in real-time to get the most current results. C) A search engine accesses a collection of web pages and downloads them to your computer for viewing. D) A search engine usually works by compiling a group of web pages and bookmarking them in your local cache for quick access.

A) A search engine usually works by compiling a database of information about web pages.

When considering application interaction, an example of programmatic access can be best defined as what? A) A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database. B) Administrators might use an administrative tool, such as phpMyAdmin, to connect and sign in to an RDBMS C) An application might use a database "in the background" without the user really being aware of its presence. D) Providing a GUI for users to select actions to perform on the database, which then converts those selections to the SQL statements that will be executed.

A) A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database.

What is the main difference between virus and worm malware? A) A virus has to infect a file whereas a worm propagates in memory and over computer networks. B) A virus propagates in memory and over computer networks whereas a worm has to infect a file. C) A virus uses sequences of code that insert themselves into an executable whereas a worm uses document macros. D) A virus uses a macro programming language to automate tasks where as a worm executes when the application is executed.

A) A virus has to infect a file whereas a worm propagates in memory and over computer networks.

Which version or edition of Windows can be used to share files with other users? A) Any version or edition B) Enterprise versions only C) Versions and editions after Windows 7 D) Any non-server edition

A) Any version or edition

What is the purpose of BIOS? A) It is the firmware that drives the bootstrapping process. B) It is the software that allocates memory to applications. C) It is the hardware used to transfer data from the CPU to other components on the motherboard. D) It is the instruction set of the CPU that decodes each instruction and decides whether to execute it or send it on.

A) It is the firmware that drives the bootstrapping process.

In Windows, do letter-labeled "drives" correspond exactly to physical disks? A) Not in the case of hard disks, which can be configured with multiple partitions, each of which can be assigned a drive letter. B) Only in the case of hard disks, which are usually allocated letter "c." C) Not in the case of optical drives, which can be configured with multiple partitions, each of which can be assigned a drive letter. D) Only in the case of hard disks, which are usually allocated the letter "a."

A) Not in the case of hard disks, which can be configured with multiple partitions, each of which can be assigned a drive letter.

What function of a scanner would you use if you want to convert a letter that someone has mailed to you into a computer-editable document? A) Optical Character Recognition (OCR). B) TWAIN C) Windows Image Acquisition (WIA) D) Portable Document Format (PDF) or Joint Photographic Experts Group (JPEG)

A) Optical Character Recognition (OCR).

You have just bought a new computer but want to use the older version of Windows that came with your previous computer. Windows was provided as an OEM license. Can you use this license key to install the software on your new PC? A) Original Equipment Manufacturer (OEM) licenses can only be used on the brand and model it was initially installed on. B) Original Equipment Manufacturer (OEM) licenses can be transferred between different computers, just not at the same time. C) Original Equipment Manufacturers (OEM) licenses are only used in Enterprise environments, prohibiting use on a new computer. D) Original Equipment Manufacturer (OEM) licenses are authorized for use on multiple computer systems at the same time, enabling use on the new computer.

A) Original Equipment Manufacturer (OEM) licenses can only be used on the brand and model it was initially installed on.

What is TRUE about legal protection for a novel software algorithm? A) Patent provides the best protection as it can enforce ownership even if someone tries to write the algorithm in a slightly different way. B) Trademark provides the best protection as it can enforce ownership to protect the unique elements of a software algorithm. C) You can only copyright the name, not the software algorithm itself. The copyright will make you the sole owner of that brand. D) You can't legally protect a novel software algorithm. It will be owned by the original publisher of the software that you used to create it.

A) Patent provides the best protection as it can enforce ownership even if someone tries to write the algorithm in a slightly different way.

Which of the following would NOT be defined as an input device? A) Printer B) Keyboard C) Mouse D) Biometric Scanner

A) Printer

What three things define an object? A) Properties, attributes, and methods B) Branches, loops, and operators. C) Data, information, and insights D) Stored value, class, and interface

A) Properties, attributes, and methods

In the area of workplace surveillance, what is monitoring data communications and employee's behavior called? A) Security assurance B) Monitoring data C) Physical monitoring D) Eavesdropping / wiretapping

A) Security assurance

You have made a backup of system data using a removable hard disk. Time and security are of great importance. What should you do next? A) Store the disk in a secure, off-site location. B) Delete the original, since the backup is current. C) Complete the restore procedure. D) Make a copy of the disk on the cloud.

A) Store the disk in a secure, off-site location.

Which admin tool or screen would you use to configure a Windows computer to join a domain? A) The System applet in Control Panel B) Administrative Tools in Control Panel C) Select Settings and choose Remote Desktop D) Select Settings and then Network and Internet

A) The System applet in Control Panel

What do you need to know to connect to a device that is configured over the network? A) Typically, the Internet Protocol (IP) address of its management page or the device's hostname B) Typically, the Media Access Control (MAC) address of the device you want to connect to C) Typically, the physical location of the computer D) Typically, the port in the wall where the network cable is plugged into

A) Typically, the Internet Protocol (IP) address of its management page or the device's hostname

How can you modify your File Explorer options to allow you to view hidden files? A) Use the View tab under the File Explorer Options applet. B) Modify the properties of the File Explorer window by clicking on the Properties button. C) Select the hidden files in the File Explorer window, right-click, and select view. D) Use the Change Security and Maintenance Settings in the Control Panel.

A) Use the View tab under the File Explorer Options applet.

Select the best example of using dual monitors with multiple windows in Extended mode: A) A sales rep uses a PowerPoint presentation at a meeting, with the keyboard, mouse, and one monitor facing him, and the second monitor facing a group of customers. B) A programmer writes HTML code on one monitor and tests the web page changes in a browser on the other monitor. C) An accountant uses both monitors side-by-side to stretch out one Excel spreadsheet so that it can be displayed in its entirety. D) A football coach attaches a second, larger monitor to a laptop, so that the PC screen image can display on the larger monitor instead.

B) A programmer writes HTML code on one monitor and tests the web page changes in a browser on the other monitor.

What device is used to connect computers together in an Ethernet network? A) An access point B) A switch C) Internet router D) Internet modem

B) A switch

How does a one-time password work? A) The existing password is sent to a user after having requested a password change on a website. B) A unique password is generated using an algorithm known to both a device (fob) and the authenticating server. C) A temporary password is sent to a user via email after requesting a password reset. D) A user must enter a hardware token, like a smart card, and enter a password or PIN.

B) A unique password is generated using an algorithm known to both a device (fob) and the authenticating server.

Which of these is an access control? A) Destruction B) Accounting C) Integrity D) Snooping

B) Accounting

Of the following, which language is typically used with markup language? A) C++ B) CSS C) C# D) COBOL

B) CSS

How could you access a network folder called DATA on a network server called TOWER1 using the Explorer address bar? A) It is not possible to access a network folder from the address bar. B) Enter the Universal Naming Convention (UNC) path. C) Enter the web address. D) Enter the IP address.

B) Enter the Universal Naming Convention (UNC) path.

What is the advantage of a local network hosted application, in terms of data storage? A) If data is stored on the server and not on the local workstation, it will be available to the user if a network device fails. B) If data is stored on the server and not on the local workstation, it is easier to apply access controls and to back it up. C) If data is stored on the server and not on the local workstation, it will be available during power outages. D) If data is stored on a local network storage device and not on the local workstation, many different users will be able to access the information.

B) If data is stored on the server and not on the local workstation, it is easier to apply access controls and to back it up.

What is the purpose of a NIC card? A) It increases the speed of video streaming. B) It allows the computer to connect to network. C) It sends video signals to a display device. D) It provides extra ports for peripherals.

B) It allows the computer to connect to network.

In terms of file systems, what benefits does exFAT provide over FAT and NTFS? A) It has a larger maximum file size than its predecessors and can store file sizes up to 2TB. B) It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead. C) It introduces a 64-bit addressing scheme, which allows for larger partitions than its predecessors. D) It provides some additional attributes not provided before—for example, file-level security permissions.

B) It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead.

You need to configure settings for an input device. What should be your first step? A) Configure the wireless adapter to connect to the new input device. B) Open the Settings app or Control Panel. C) Go to the Printers and Scanners tab in system setting. D) Open the Settings add or remove programs.

B) Open the Settings app or Control Panel.

You need a development environment with a library of database functions. What type of interface are you using? A) Direct/Manual Access B) Programmatic access C) Query/Report Builder D) Utility Access

B) Programmatic access

You want to restrict access to a computer on your network to a single internet host running a particular application. What two things do you need to configure in your firewall's access control list? A) The SSID and the IP address B) The IP address of the host and the port number of the application C) The SSID and the application name D) The IP address of the host and the application name

B) The IP address of the host and the port number of the application

What is the main means by which anti-virus software identifies infected files? A) Using heuristics to detect suspicious behavior B) Using definitions or signatures of known virus code C) Using signatures of zero-day exploits D) Using AutoRun to execute files of unknown provenance

B) Using definitions or signatures of known virus code

In order to obtain support on a currently installed application, the software vendor wants to know the application's product ID. How would you locate this information? A) Look in the Warranty information packet. B) Usually via the Help > About menu. C) Open the System Settings menu. D) Search manufacturer's website.

B) Usually via the Help > About menu.

What type of software is an ODF file associated with? A) Video conferencing software B) Word processing software C) Email client software D) Database software

B) Word processing software

What is a packet made up of? A) A packet is the destination address of a unit of data being transmitted over the network. B) A packet is the data inside the wrapper used for each data unit transmitted over the network. C) A packet consists of a number of fields contained within a header section plus a payload. D) A packet consists of a payload wrapped around a header section.

C) A packet consists of a number of fields contained within a header section plus a payload.

A user has two USB drives connected to her PC. She complains that when she copies large files to both drives at the same time, it seems to take much longer. Why might this be? A) Writing to USB drives can only occur one at a time. B) The flash drive partitions haven't been formatted. C) Bandwidth on the USB bus is shared between all devices. D) She has the cables swapped backwards.

C) Bandwidth on the USB bus is shared between all devices.

What key combination can you use to force the browser to ignore any locally cached files when refreshing a page? A) Ctrl++ B) Crtl+Alt+Del C) Ctrl+F5 D) Alt+F4

C) Ctrl+F5

What are the three main areas where redundancy should be provisioned? A) Circuits, power generators, Uninterruptible Power Supplies (UPSs) B) RAID 1, RAID 5, and RAID 10 C) Data, network links, and power D) Authentication, authorization, and accounting

C) Data, network links, and power

Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage? A) Accessibility B) Confidentiality C) Integrity D) Availability

C) Integrity

Give two examples of semi-structured data stores. A) Relational databases and text files B) Key/value pair database and PowerPoint presentations C) Key/value pair databases and markup language document stores. D) Word documents and PowerPoint presentations

C) Key/value pair databases and markup language document stores.

What type of print technology uses toner? A) Inkjet B) Thermal transfer C) Laser D) Impact

C) Laser

Which non-discretionary access control type is based on the idea of security clearance levels? A) Role-based Access Control (RBAC) B) Discretionary Access Control (DAC) C) Mandatory Access Control (MAC) D) Rule-based access control

C) Mandatory Access Control (MAC)

You want to purchase a computer with a fast graphics interface. What type of expansion slot should you look for? A) Motherboard SIMM slots—this type of slot has 30-pin slots typically used in laptops while the 64-pin and 72-pin slots were found on desktop motherboards. B) SDRAM and DDR—this type of slot is common for desktop computers (if you use a laptop, you need to look for a SODIMM) each having various types and speeds. C) PCIe x16—this is a type of PCI Express slot that uses 16 'lanes'. Each lane can transfer 250 MBps (or 500 MBps for PCIe 2 and 1 GBps for v3). D) Connect solid-state graphics to the high-speed SATA slots and mechanical disk drives to the lower-speed slots.

C) PCIe x16—this is a type of PCI Express slot that uses 16 'lanes'. Each lane can transfer 250 MBps (or 500 MBps for PCIe 2 and 1 GBps for v3).

Which Redundant Array of Independent Disks (RAID) has only striping with parity? A) RAID 1 B) RAID 10 C) RAID 5 D) RAID 6

C) RAID 5

Which best defines throughput rate of a device at any given time? A) The measurement of voltage being input into the power supply. B) The measurement of information stored on an external hard drive. C) The measurement of data transferred between computers over a network. D) The maximum amount of data allowed to be transferred over a network.

C) The measurement of data transferred between computers over a network.

How might malware hosted on a website be able to infect your computer simply by your browsing the site? A) By exploiting a human vulnerability related to deception B) By exploiting outdated hardware installed in the computer chassis C) By exploiting an improperly configured firewall D) By exploiting a vulnerability in software installed on your computer

D) By exploiting a vulnerability in software installed on your computer

Which protocol allows people to use names/labels, rather than numeric addresses, to address network resources? A) URL B) IP address C) MAC address D) Domain Name System (DNS)

D) Domain Name System (DNS)

Which email protocol(s) are used to download messages from a mail server? A) Either Internet Message Access Protocol (IMAP) or Simple Mail Transfer Protocol (SMTP) B) Either Post Office Protocol (POP) or Mail Exchanger (MX) C) Either Mail Exchanger (MX) or Internet Message Access Protocol (IMAP) D) Either Post Office Protocol (POP) or Internet Message Access Protocol (IMAP)

D) Either Post Office Protocol (POP) or Internet Message Access Protocol (IMAP)

What type of component provides a passive cooling solution? A) An insulation blanket B) A cooling fan C) A liquid cooling system D) A heatsink

D) A heatsink

Which of these is a NOT a "generation" of cellular Internet services? A) EV-DO B) GPRS/EDGE C) HSPA+ D) ARP

D) ARP

What type of disk has the greatest capacity? A) DVD that is dual layer and single sided B) DVD that is dual layer and double sided C) DVD that is single layer and single sided D) Blu-ray that is a single layer

D) Blu-ray that is a single layer

What function of an operating system is performed by the "shell"? A) Interface between a host computer and a guest operating system. B) Interface between the applications and the hardware. C) Interface between the hardware and the firmware. D) Interface between the user and the computer.

D) Interface between the user and the computer.

In considering availability concerns, what use might a lockable faceplate on a server-class computer be? A) It may prevent a natural disaster from damaging the hardware and corrupting the data. B) It may prevent the computer or server from overheating and shutting down. C) It may prevent a hacker from obtaining remote unauthorized network access. D) It may prevent the user from switching the machine on/off or accessing removable drives and ports.

D) It may prevent the user from switching the machine on/off or accessing removable drives and ports.

What provides sound functionality in a personal computer? A) Sound functions in modern PCs will send your audio directly to an external radio for processing. B) Sound functions must be provided by a plug-in sound card. C) Sound functions are provided by a plug-in card with external speakers. D) Sound functions are often provided by the motherboard chipset.

D) Sound functions are often provided by the motherboard chipset.

What is the registry and how does it distinguish Windows and Linux? A) The registry sets tasks to run at a particular time. Linux uses the cron utility to run tasks at a particular time. B) The registry is a utility that allows the user to shut down processes. Linux uses a command-line tool to kill a process. C) The registry is a snap-in to check which services are running and to start and stop each service. Linux does not use snap-ins. D) The registry is a database of configuration settings supporting the Windows OS. Linux uses individual text files to store settings.

D) The registry is a database of configuration settings supporting the Windows OS. Linux uses individual text files to store settings.

How does Plug-and-Play Installation work? A) A plug-and-play device can be plugged in and used immediately without requiring a device driver. B) When a new device is plugged in, a script plays to instruct the user on the process of installing a device driver. C) When a new device is plugged in, the user inserts/plays a CD on which drivers and instructions are provided. D) When a user connects a new device, Windows identifies it and attempts to install a new device driver.

D) When a user connects a new device, Windows identifies it and attempts to install a new device driver.

Your computer locks up (freezes) periodically and feels hot to the touch. Could these things be related? A) No, two different problems likely exist that need troubleshooting. B) Yes, overheating often occurs when the computer is locked up. C) No, temperature of your computer does not affect computer operation. D) Yes, many lockup problems are caused by overheating.

D) Yes, many lockup problems are caused by overheating.


संबंधित स्टडी सेट्स

Health Care Information Systems (Exam 1)

View Set

Gardner's Art Through the Ages ch. 32/35

View Set

PSYC 305: Statistics for Experimental Design

View Set

ch.17 Otorhinolaryngologic procedures study guide

View Set