IBM | CompTIA ITF+ Certification Practice Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

If your computer begins to have difficulties after an installation or upgrade, what startup option can be used that only makes essential hardware and software available?

Safe Mode

What type of programming language uses an interpreter to translate commands and does not require a compiler?

Scripting language

What type of device connects or manages other computers on a network and can be hardware or software?

Server

Phishing is an example of what type of confidentiality concern?

Social Engineering

What nonrepudiation method is used to determine if someone was present in an unauthorized location by use of recordings?

Video

Which wireless security encryption standard, out of the following options, offers the best security strength?

WPA2

Your instructor has given you instructions to write a program that contains looping. The one condition is you must check the condition at the beginning of the loop. From the options below which is your best choice?

While loop

What type of productivity software allows you to write, modify or format text, do markup and proofing, and print?

Word processing software

What term refers to a group of computers used to perform work and is typically connected to a local area network for printing?

Workstations

What type of multi-factor authentication can be used to determine a user's identity with the recognition of a fingerprint or retinal scan?

Biometrics

In regards to bandwidth, what is the smallest unit of measurement for data transfer?

Bits per second

What allows electronic devices like cell phones and computers to exchange data over short distances using radio waves?

Bluetooth

What type of logic component would be best suited for choosing options based on one or more variables?

Branching

An active heat sink is normally attached to what in a computer?

CPU

When installing and configuring a new router what action should be taken with the router's default password to keep a network secure? 1 point

Change the default password on the router to something only you know

You are helping a friend by reviewing a website they created about adopting animals. You find an error on one of the webpages and your friend updates the website. You refresh the webpage but do not see any updates to the site. What would be your best option?

Clear the cache

What type of disaster recovery site has no power, would need equipment for IT functions, and takes the longest time to deploy during a disaster?

Cold Site

What type of programming language converts the source code into an executable file?

Compiler

From the list below, what is an anti-virus/malware protection best practice?

Configure daily updates

What is one advantage of cable internet?

Considered as an "Always-On" connection

During program execution what is the term that describes a value that cannot change?

Constant

When assessing the possible security improvements, you want to find the best solution at the lowest cost. What can be performed to estimate the strength and weakness of each approach to find the best method at the lower cost?

Cost-Benefit Analysis (CBA)

Your new job requires you to login to multiple sites. From the list below, what would be the best course of action?

Create complex passwords for each site and use a password manager

In a data-driven business decision, what process is used to determine the type of data that will be captured for collection so it can be analyzed and possibly stored for future reference?

Data Capture and Collection

Question 34 What SQL command removes one or more existing records from a table?

Delete

What method is used to crack passwords by using a list of common words and running them in various combinations?

Dictionary Attack

In regards to database access, what method is suitable for accessing a database that is stored on a local area network and only has a few users?

Direct/Manual Access

Google docs is what type of collaboration software?

Document Sharing Software

When using macOS, what is the first step for an initial hard drive setup?

Find disk utility for managing internal and external drives

What type of cable carries digital video signals, including audio, video, and control and is also known as IEEE-1394?

Firewire

What type of number contains up to seven digits, and has at least one decimal place?

Float

What is a block of computer code that performs a task and can be called and reused repeatedly?

Function

You own a business with 10 employees and want to purchase a license for software to enable all 10 employees to use the software at the same time on their machines. What type of license would that be?

Group Use /Site License

For the handling of confidential information at a corporation, which of the following would not be an advisable procedure to use?

Have employees connect their personal devices to the network

What type of backup is performed when the database is running?

Hot Backup

What identifies the device's host network and the location of the device on the host network?

IP Address

You receive a support call from a customer. What is the first step that you should take using the troubleshooting methodology?

Identify the problem

There are four settings that can be used for proxy servers. From the options below, what setting is used with a web browser?

xx ssl FTP

What is responsible for locating the drive that has the operating system and runs programs that initialize essential parts of the computer?

BIOS

What provides a database output that is formatted and summarized?

Report

You are a network administrator and want to define access rights by specific roles within a company. What is this type of access called?

Role-based

What are the common data types used for numbers?

-Integers -Floats

Which of the following has to be a condition for a device driver to work?

-The driver supports 32-bit operation for a 32-bit CPU or 64-bit operation for a 64-bit CPU -The driver is compatible with the hardware -The driver is the correct type for the operating system

Binary is a number expressed in the base-____ numeral system.

2

A byte consists of how many bits?

8 bits

What can support up to four data streams and is the current minimum standard for equipment with Wi-Fi capabilities?

802.11n

What do you use to decrypt a smartphone or tablet when you want to use it?

A PIN or Passcode

You are thinking about adopting a dog and want to create a Boolean search that matches two criteria: dog breed, activity level. Which Boolean operator would be used between the two terms to return your desired results?

AND

What is a 7-bit character set that is 128 characters including the upper & lowercase English alphabet, the numbers 0-9, and punctuation marks?

ASCII

A user has contacted you with multiple issues for their computer system. What would be the best course of action to take using the troubleshooting methodology?

Approach each problem individually

What is a data structure that contains a group of data elements of the same data type?

Arrays

What connects computers over a relatively short distance, allowing users to share data, files, and resources?

LAN

After receiving a new pair of speakers you open the box to see they attach to the desktop computer through a 3.5mm analog headphone jack. When examining the back of the computer you see a section that is color coded for different types of connections. Which color is best suited for output to the speakers?

Lime Green

What type of installation is a program that does not need internet access to run and is located on the C: drive of a Windows OS computer?

Locally Installed

What type of storage allows for multiple machines to share storage over a network and allows the centralization of data?

NAS

What is a hardware component that allows a dedicated and full time connection to a network?

NIC

Which type of file system has support for large hard disk drives and journaling, file compression and encryption, and uses permissions to control access to files or folders?

NTFS

You have connected a keyboard to your computer, what must be done next in order for the keyboard to begin working?

Nothing else is required as the keyboard is plug and play and it will be automatically recognized by the computer and begin working

What type of application architecture model stores all of the required elements on a single server?

One-tier Model

What type of software license allows the users to modify the code or make changes to the program?

Open Source License

What email encryption works by exchanging digital certificates between users?

OpenPGP

What type of local storage drive uses lasers to read and write data?

Optical Drive

What function writes data to memory acting on instructions from the operating system and software?

Processing

What type of programming language would you use to request and retrieve data from a database?

Query language

Which RAID level is not used for redundant storage, and treats two or more drives as a single unit?

RAID 0

What computer memory is short term, can be read and changed in any order, and is considered a volatile memory?

RAM

What type of wireless connection is also known as a fixed wireless service?

Radio Frequency

What type of database consists of a schema, tables, fields, and constraints?

Relational database

You are given the task to write pseudocode for a program that reads a file with the numbers 1 through 10 and prints each out to the console. From the options below, what would be your best choice?

Start, open file, read number, write number, if not at end of file then continue to next number, else close file, end

You have a set of data that includes names, phone numbers, and addresses stored in an Excel sheet. What term best describes this data?

Structured Data

You are using a Windows operating system and a newly installed program will not close. What command line keyword is used to end the program?

Taskkill

What SQL constraint prevents duplicate values from being stored in a specific column?

UNIQUE

A high school holds a vote for student council president. The vote tally is documented on a spreadsheet on the school network. An individual locates the spreadsheet and changes the vote tally for a different candidate, changing the outcome. What type of integrity concern would this be?

Unauthorized Information Alteration

Your children who are in elementary school use the family computer to do homework. You are concerned that your children will view content on the internet that is inappropriate. What is the best option to handle this situation?

Use parental control software to create whitelists and blacklists for appropriate and inappropriate content


संबंधित स्टडी सेट्स

Laboratory and Field Experiments

View Set

4th Grade English Vocabulary Words

View Set