CompTIA ITF+ Practice Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company? A. Concurrent license B. Site license C. Group use D. Single use

A

A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice? A. Write a company policy and procedure for escorting visitors. B. Train staff to identify Personally Identifiable Information (PII). C. Implement an Acceptable Use Policy. D. Install data monitoring solutions.

A

A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup? A. Settings/Devices B. Device Drivers C. Device Manager D. Devices and Printers

A

A senior manager of a regional office branch needs a payroll report of all staff, to calculate next year's budget. Which program is NOT useful for that? A. Project management software B. Database software C. Spreadsheet software D. Accounting software

A

A systems administrator is installing a new wireless access point (AP). During installation, the administrator should make sure to complete which of the following? A. Change the default password. B. Store a hardcopy of a complex password of at least 12 characters. C. Enable all services on the wireless AP. D. Change the SSID to something that helps identify the administrator.

A

A systems engineer wants to control access to critical data. Which of the following describes a security concern regarding storing and transferring data without authorization? A. Integrity B. Social engineering C. Availability D. Confidentiality

A

A table contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What does this table need, to make sure that the Email field contains the symbols "@" and "."? A. A constraint B. A primary key C. A foreign key D. Data persistence

A

A user installs VirtualBox on a Linux OS (Operating System). Which class of hypervisor is it? A. Type II, because VirtualBox is a software application within a host operating system B. Type II, because Linux provides the resources for the virtual environment C. Type I, because VirtualBox manages the virtual machine environment D. Type I, because the Linux OS is installed directly on the computer

A

A web browser is an example of productivity software. What type of software is an email client? A. Collaboration software B. Productivity software C. Open source software D. Business software

A

A wireless network in a small home office generated poor signal quality. The signal improved when an old cordless phone stopped working. What problem did the cordless phone cause when it was active? A. Interference B. Bluetooth signal overlap C. Modulation D. Attenuation

A

An Employee object includes the following fields: Name, Address, Phone, Age, DateOfBirth, Salary. Which of the following is NOT a good example of a method in this object? A. CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program B. EstimateRaise, which calculates a percentage (input as a variable) of the Salary field C. PrintAddressLabel, which displays the values of the Name and Address fields D. UpdateAge, which subtracts DateOfBirth from today's date and updates the Age field with that value

A

An attacker used hosts compromised with bot malware to launch a coordinated attack against a web service to overload it. Which of the following is the active attack threatening web service availability to your users? A. Denial of Service (DoS) B. Replay C. Destruction D. Impersonation

A

An office computer needs a new keyboard and mouse. Before ordering them, the assistant should check which ports are available, to decide which style to purchase. Which port is NOT part of the consideration? A. HDMI B. Bluetooth C. USB D. PS/2

A

An older digital camera without wireless networking support is malfunctioning, so the photos need to be backed up to the computer. Which port on the computer can the camera owner use? A. USB B. HDMI C. Black 3.5mm jack D. Pink 3.5mm jack

A

Besides Video Graphics Array (VGA), what graphic device interface supports analog equipment? A. DVI-I B. DVI-D C. DisplayPort D. HDMI

A

CompTIA's troubleshooting model includes having to establish a theory of probable cause. What is one of the components of this step? A. Question the obvious. B. Question the Internet. C. Question users. D. Question the theory.

A

Convert the binary number 1000000 into decimal notation. A. 64 B. 32 C. 40 D. 128

A

How is business software different from productivity software? A. Business software is for a particular process, and productivity software is for general office functions. B. Business software is for business owners, and productivity software is for employees. C. Business software is for managers and executives, and productivity software is for general office staff. D. Business software is for conducting business meetings, and productivity software is for increasing productivity.

A

In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set? A. The number of rows B. The number of columns C. The number of tables D. The number of fields

A

The information layer of data analytics requires software to perform which function? A. Data correlation B. Data storage C. Data collection D. Meaningful reporting

A

What could a network administrator implement to allow employees to securely connect remotely to the corporate network? A. A Virtual Private Network (VPN) B. A password manager C. A password reset mechanism D. Reusing passwords across sites

A

What does a PC (personal computer) need more of to open more programs simultaneously and work on large files more efficiently? A. RAM B. CPU C. HDD D. SSD

A

What does a database dump contain? A. SQL statements which can recreate all tables B. A hard disk with an exact copy of the database C. A flat file with full contents of all tables D. A formatted report of the contents of all tables

A

What does bps measure? A. Throughput rate B. Display resolution C. HDD performance D. Processing speed

A

What does this pseudocode declare? declare MinutesPerHour as Number = 60 A. A constant B. A variable C. An array D. A primary key

A

What is the advantage of DAS (Direct Attached Storage) over NAS (Network Attached Storage)? A. DAS is less expensive. B. DAS provides more flexibility to the user. C. DAS is more convenient when using multiple devices. D. DAS is easier to upgrade.

A

What is the best reason to use a flat file instead of a database? A. To exchange information between systems B. To support a wide variety of data C. For more efficient processing of a large amount of information D. To divide the data update tasks among many users

A

What is the difference between the address length of IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6)? A. IPv4 addresses are 32 bits, and IPv6 addresses are 128 bits. B. IPv4 addresses are 32 bits, and IPv6 addresses are 64 bits. C. IPv4 addresses are 4 bits, and IPv6 addresses are 8 bits. D. IPv4 addresses are 4 bits, and IPv6 addresses are 6 bits.

A

What is the easiest way to install a standard mouse, and configure it to use basic settings? A. Use Control Panel/Settings. B. Download online driver from the manufacturer. C. Get the disk with a special driver. D. Use the Mouse app on the smartphone.

A

What is the main purpose of NIC (Network Interface Card) expansion card? A. To provide additional NICs to servers on a wired business network B. To replace the outdated NIC on the motherboard C. To serve as a faster alternative to the onboard NIC D. To allow workstation computers to connect to the network

A

What port does an Ethernet network adapter use? A. RJ-45 B. RJ-11 C. USB-A D. USB-B

A

What problem is Windows' UAC (User Account Control) designed to solve? A. Elevated privileges B. Too many guest accounts C. Too many administrative accounts D. Inadequate account authentication

A

What should a user do before installing a driver from a third-party website? A. Search the web for references of the driver's legitimacy and reputation. B. Ensure the site is downloaded over an HTTP connection. C. Install patches or updates for the application to fix any coding problems. D. Ensure the driver software uses a digitally self-signed certificate.

A

What storage technology do SSDs (Solid State Drives) use? A. Flash memory B. Magnetic tape C. Optical drive D. Spinning disk

A

What type of access control and technology helps ensure non-repudiation, and tracks what users are doing on the network? A. Accounting; logs B. Least privilege C. Implicit deny D. Authorization access

A

What type of connector does Thunderbolt 3 use? A. USB-C B. DVI-D C. HDMI D. USB-B

A

What type of process is the Windows Task Scheduler? A. Service B. Batch file C. Cron job D. Application

A

What type of programming language has the fastest execution time? A. Compiled B. Scripting C. Scripted D. Markup

A

What type of software is Google Drive? A. Collaboration software B. Productivity software C. Business software D. Networking software

A

What's the difference between scripted and scripting languages? A. Scripting languages are for configuring an operating system. B. Scripted languages have to transform the code to an executable binary. C. Scripting languages have to transform the code to an executable binary. D. Scripted languages only run on one platform.

A

When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service? A. Password managers B. A short password history C. Reusing passwords across multiple sites D. The IT department resetting passwords

A

When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service? A. Password managers B. Reusing passwords across multiple sites C. A short password history D. The IT department resetting passwords

A

Which backup storage type best helps mitigate against critical data loss in the risk of fire or theft? A. Cloud-based storage backup B. System backup C. Locally attached storage D. Test restore

A

Which device is likely to use ARM (Advanced RISC Machine) CPU (Central Processing Unit)? A. Tablet B. Laptop C. IBM PC D. iMac

A

Which file system allows a file with the name "Encyclopedia:Volume 1.txt"? A. Ext4 B. NTFS C. FAT32 D. HFS+

A

Which numbers does this pseudocode display? declare i as Number = 10 Do While i > 0 If i < 7 Then i = i - 1 End If print i i = i - 1 Loop A. 10, 9, 8, 7, 5, 3, 1 B. 9, 8, 7, 6, 5, 4, 3, 2, 1, 0 C. 9, 7, 5, 3, 1 D. 10, 9, 8, 7, 6, 5, 4, 3, 2, 1

A

Which of the following does NOT encrypt web page data? A. Mobile device encryption B. Hypertext Transfer Protocol Secure (HTTPS) C. A transport encryption protocol D. Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

A

Which of the following is NOT part of IoT (Internet of Things) home automation? A. Insulin pump B. Door lock C. HVAC D. Sprinkler system

A

Which of the following measures their data transfer capacity in Mbps (megabits per second)? A. Wireless networks B. Data center telecommunications links C. Older computer peripheral interfaces D. Latest PC bus standards

A

Which of the following types of authentication, if compromised, could potentially impact multiple services? A. Single sign-on B. Multifactor authentication C. Single-factor authentication D. Two-factor authentication

A

Which of the following ways best defeats social engineering? A. Training end-users how to identify and report suspicious activity on the network or workstation B. Allowing access to network resources by using innocuous data C. By establishing enough trust with end-users so they will reveal secure information D. Making sure employees directly observe other users type passwords

A

Which of the following will NOT help prevent the attachment of portable personally owned devices, such as smartphones and Universal Serial Buses (USBs)? A. Requiring a fob B. Endpoint security C. Network access control D. Data loss prevention solutions

A

Which of these practices is unsecure as your security becomes dependent on other organizations' security measures? A. Reusing across sites B. Using passphrase with special characters C. Shortening password expiration D. Writing down password

A

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information? A. CCTV surveillance cameras installation B. IT security training C. Acceptable Use Policy D. Data monitoring

B

A complex software application collects requests from general users for certain sets of data through a form, connects to a Microsoft SQL (Structured Query Language) Server database with ODBC (Open Database Connectivity), submits the criteria for the data query, receives the results, and displays them to the users as a report on the screen. Which combination of database access methods best describes this process? A. Direct access and query builder B. User interface and programmatic access C. Programmatic access and report builder D. Manual access and utility access

B

A database administrator needs to extend a table with another column. What method contains the command to do that? A. DCL (Data Control Language) B. DDL (Data Definition Language) C. DML (Data Manipulation Language) D. XML (eXtensible Markup Language)

B

A database administrator needs to extend a table with another column. What method contains the command to do that? A. DML (Data Manipulation Language) B. DDL (Data Definition Language) C. DCL (Data Control Language) D. XML (eXtensible Markup Language)

B

A file contains information about the company's customers. The information includes Name, Address, Phone, and Email for each customer. What's the best way to convert this file into a database? A. Create a database called Customers, with tables called Name, Address, Phone, and Email. B. Create a table called Customers, with fields called Name, Address, Phone, and Email. C. Create a database called Customers, with fields called Name, Address, Phone, and Email. D. Create a table called Customers, with records called Name, Address, Phone, and Email.

B

A home office with 3 networks uses devices, which include 2 desktops, 4 laptops, 5 smartphones, 3 tablets, and a wireless printer. What device switches the communications between the wired and wireless networks in this office? A. Router B. Access point C. Modem D. Switch

B

A manager requests to see the information on all of the company's customers, listed by geographical regions, with the totals of purchases made by each customer. What is the best tool to produce this list? A. Input form B. Report C. Query D. Flat file

B

A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure? A. The enclosure converts a 2.5" portable drive into the 3.5" desktop standard. B. The enclosure provides ports to connect the drive to the computer. C. The enclosure converts the external hard drive into internal. D. The enclosure protects the fragile drive from water damage.

B

A user installs a software application for free, and it displays a 30-day countdown until the user must register it and receive additional features. What type of license is this? A. Open source B. Shareware C. Freeware D. Subscription model

B

A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this? A. Programs and Features B. Driver Manager C. Device Manager D. Command Prompt

B

A user wants the easiest and most secure way to prevent websites from discovering the IP (Internet Protocol) address of the computer. What should the user do? A. Go into private browsing mode. B. Use a Virtual Private Network. C. Switch to incognito mode. D. Use an SSL proxy.

B

A workstation experiences slowdowns while running Microsoft Word. The program does not respond to attempts to close it, therefore the user executes the Task Manager utility to quit the program. What does this fall under? A. Device management B. Process management C. Service management D. Disk management

B

An essential part of troubleshooting is to establish a plan of action to eliminate the root cause without destabilizing some other part of the system. What needs to be in the plan of action? A. Cost analysis of resolving the problem vs. ignoring it B. Steps required to implement the solution C. Recommendations for a workaround D. Details outlining every occurrence of the problem

B

An office building is using a Wi-Fi access point. The computer used to configure the access point's device options is located on the other side of the building. What does a technician need to make it work? A. Move the computer closer to the access point B. IP address of the web configuration page C. Move the access point closer to the computer D. A longer cable to connect the computer to the access point

B

Arrange the following values in increasing speed (slowest to fastest): A. Kbps, Gbps, Mbps, Tbps B. Kbps, Mbps, Gbps, Tbps C. Mbps, Gbps, Tbps, Kbps D. Tbps, Gbps, Mbps, Kbps

B

How can a user belong to a group account and inherit security permissions in a workgroup? A. Adding the user's account as a guest account B. Through privileges allocated to the groups C. Using additional group accounts associated with a domain D. By directly assigning the user to security policies

B

How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express? A. 26 B. 128 C. 10 D. 256

B

If a system goes down, which of these will NOT help recover from data loss due to a natural disaster? A. Replication between data centers B. Implementing a Redundant Array of Independent Disks (RAID) C. Restoring the data from file backups D. Syncing the data

B

In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set? A. The number of fields B. The number of rows C. The number of columns D. The number of tables

B

In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level? A. Field B. Table C. Application D. Record

B

Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID? A. NIC B. NFC C. NID D. NAS

B

The accountant of a small company uses a database application to maintain the list of vendors, their services, and their invoices to the company. The application uses Microsoft Access for the database layer, with the front-end interface layer in Visual Basic, to work with the data and to generate custom reports. What is the application architecture of this system, which resides on the accountant's desktop computer? A. N-tier B. One-tier C. Two-tier D. Three-tier

B

The direct database access method is the best method to run which SQL (Structured Query Language) command? A. INSERT B. GRANT C. UPDATE D. SELECT

B

The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take? A. Escalate the problem. B. View log files. C. Suggest workarounds. D. Use a product Knowledge Base.

B

What are the properties of a file "Books/CoverPhoto.js"? A. It's an image file named "CoverPhoto.js" in folder "Books". B. It's an executable file named "CoverPhoto.js" in folder "Books". C. It's a document file named "Books/CoverPhoto.js". D. It's an image file named "Books/CoverPhoto.js".

B

What do the instructions in this pseudocode do? declare Animal(9) as String For i = 0 to 9 If i > 5 Then Animal(i) = "dog" Else Animal(i) = "cat" End If Next A. Set the first 5 elements of the array Animal to "dog", and the rest to "cat". B. Set the first 6 elements of the array Animal to "cat", and the rest to "dog". C. Set the first 5 elements of the array Animal to "cat", and the rest to "dog". D. Set the first 6 elements of the array Animal to "dog", and the rest to "cat".

B

What does 5 GB (GigaBytes) memory mean in the context of the Microsoft Windows operating system? A. 5000 MB B. 5120 MB C. 5210 MB D. 5000000 KB

B

What does the motherboard determine about a desktop computer? A. Price B. Upgrade potential C. Width and height D. Lifespan

B

What does this pseudocode do? declare i as Number = 0 Do While i <= 100 i = i + 1 print i i = i - 1 Loop A. Displays number "1" 100 times B. Produces an infinite loop C. Displays numbers from 0 to 99 D. Displays numbers from 1 to 100

B

What is NOT one of the features of an application virtualization software such as Citrix XenApp, which installs on a network server instead of individual workstations? A. The data files are easier to back up. B. Users can use the application without a network connection. C. The application can be used on multiple operating systems without being developed as a cross-platform application. D. The data can be made more secure.

B

What is a clean uninstall of a program? A. Restarting the computer after performing the uninstall B. Removing files and settings manually C. Using the uninstall option from the program's folder D. Closing all applications prior to performing the uninstall

B

What is a proper example of a string definition? A. "We\'re so happy to see you!' B. "It is polite to say \"Thank you\"" C. "The sales person said to the customer: "Have a nice day!" and smiled." D. 'It's going to be a great day.'

B

What is a true statement about permissions in a database which uses SQL (Structured Query Language)? A. Only the owner of a database object can grant permission over that object to other users. B. The owner of a database object has complete control over that object. C. The account that creates a database object is the permanent owner of that object. D. An account with permission to access records in a table can access all columns in the table.

B

What is an example of using a locally installed application without network access? A. Using the Intuit Quicken banking application to pay bills B. Using Microsoft Word to write a letter C. Using Apple iTunes to listen to a podcast D. Using Microsoft Outlook to check email

B

What is available in software installer packages to select specific feature sets or modules within the software package? A. Advanced installation B. Advanced options C. Additional features D. Add-ons and plugins

B

What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)? A. 6400 B. 800 C. 100 D. 1600

B

What is the difference between DropBox and OneDrive? A. DropBox can be operated with a smartphone app. B. OneDrive is built into the Windows OS. C. DropBox is built into the Windows OS. D. OneDrive is a cloud-based storage solution.

B

What is the end result of the iterative process of establishing and testing a theory while troubleshooting? A. Ensure that the problem is never repeated. B. Establish a root cause for the problem. C. Resolve the problem.

B

What is the fastest downlink speed that the typical cable Internet service providers offer to their customers? A. 1.2 Gbps B. 100 Mbps C. 24 Mbps D. 52 Mbps

B

What is the main cause of memory leaks? A. Outdated software B. Programming errors C. Damaged memory chips D. Operating system upgrades

B

What kind of computer firmware provides support for mouse operation at boot? A. BIOS B. UEFI C. CMOS D. DOS

B

What should a company that's trying to promote its goods and services have on its name and/or logo to protect it from imitators? A. Copyright B. Trademark C. Patent D. Firewall

B

What type of language consists primarily of a series of nested tags? A. Scripted B. Markup C. Query D. Scripting

B

What type of language has working with datasets as its primary purpose? A. Compiled B. Query C. Assembly D. Markup

B

What uses the same physical interface as MiniDP (mini DisplayPort format)? A. Micro HDMI B. Thunderbolt C. DisplayPort D. Mini HDMI

B

What's a true statement about compiled programming languages? A. Compiled programming languages only work on one platform. B. Compiled programming languages have to transform the code to an executable binary. C. Compiled programming languages are not as efficient at runtime as interpreted languages. D. Compiled programming languages are not human-readable.

B

When does this pseudocode execute the print command? If i == 0 AND i != 0 Then print "Yes" End If A. When i is not equal to 0 B. Never C. When i is equal to 0 D. Always

B

Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks? A. Transport B. Internet C. Network interface D. Application

B

Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode? A. USB 3.1 B. USB 3.0 C. USB 2.0 D. USB 1.1

B

Which Unicode character encoding standard do most websites use? A. UTF-7 B. UTF-8 C. UTF-16 D. UTF-32

B

Which feature of IoT (Internet of Things) for motor vehicles uses a component of IoT home automation? A. Sat-nav B. In-vehicle entertainment C. Black box D. Parking assist

B

Which is a true statement about a GPU (Graphics Processing Unit)? A. GPU uses analog signals. B. GPU works with the CPU to handle complex high-resolution images. C. GPU must be on its own graphics card. D. Computers used primarily for gaming require a GPU in place of a CPU.

B

Which of the following SQL (Structured Query Language) commands can run with just one parameter? A. CREATE INDEX B. CREATE DATABASE C. CREATE TABLE D. CREATE VIEW

B

Which of the following best describes their capacity in petabytes? A. Hard disk drives B. Cloud systems C. Storage networks D. Tape drives

B

Which of the following declarations represents a 2-dimensional array? A. declare Animal(2) as String B. declare Animal(9,9) as String C. declare Animal(2,2,2) as String D. declare Animal(1) as String

B

Which of the following helps to authenticate the user requesting a password reset over the telephone? A. Biometric recognition B. Personally Identifiable Information (PII) C. A hardware token D. An IP address

B

Which of the following is an example of an optical drive? A. DDR B. DVD C. SSD D. HDD

B

Which of the following is least likely to pose a substantial risks to an organization, such as a system intrusion? A. Employees using personally owned devices in the workplace B. Employees using permitted software and services as outlined in the handbook C. Employees using social networking D. Employees file sharing on P2P networks

B

Which of the following represents the largest amount of storage capacity? A. 3000000 GB B. 10000 TB C. 2500000000 MB D. 5 PB

B

Which of the following types of collaboration software is least sensitive to latency? A. Video conferencing B. Document sharing C. Instant messaging D. Screen sharing

B

Which of the following uses MHz (Megahertz) to measure their speed? A. Bluetooth B. Older PC bus interfaces C. Wireless technologies D. Modern computer processors

B

Who can view the contents of a text file located in the public profile? A. The owner of the file can always access that file. B. Only users who are granted permission to view the file can access it. C. Any user has access to files in the public profile. D. Administrator has full access to all files in all folders.

B

Why do companies pay for a software license subscription plan instead of a less expensive one-time purchase? A. One-time purchases are for only one computer installation. B. One-time purchases do not include full-feature upgrades. C. One-time purchases do not include customer support. D. One-time purchases provide a limited-time use of the software.

B

Why would a locally installed application store data files in a user folder and not the application folder? A. To separate the data layer from the application layer B. To prevent users from modifying application folders C. To be able to uninstall the application without deleting the data files D. For faster backups of the data files

B

A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field? A. As an array of variables across all programs B. As an attribute of the Customer object C. As a property of the Customer object D. As its own object

C

A computer program contains a boolean variable. What are the stored values of this variable? A. FALSE, TRUE B. "false", "true" C. 0, 1 D. "F", "T"

C

A programmer's task is to analyze a colleague's pseudocode and make it better. What will the programmer try to do? A. Make it run faster. B. Make it human-readable. C. Make it more compact and efficient. D. Make it compile across all platforms.

C

A table in a relational database receives imported data from a text document. In what format does the table store the new data? A. In an unstructured way B. In a semi-structured way C. In a structured way D. As key/value pairs

C

An access point is set up in a small home office. What is the best setting for the SSID (Service Set ID)? A. Something that cannot be cracked by password-guessing software B. The default name set up by the vendor of the device C. Something unique to the network but without personal information D. The address where the access point is located

C

An attacker taps into a wired network to intercept unencrypted wireless transmissions. Which of the following is a type of confidentiality concern that describes this activity? A. Social engineering B. Impersonation C. Eavesdropping D. Snooping

C

Convert the hexadecimal number 16 into decimal notation. A. 16 B. F C. 22 D. 10

C

Data encryption, firewalls, and backups are examples of what? A. Data capture B. Intellectual property C. Security controls D. Data breach

C

For enterprise networks with very large amounts of data to backup, which is best to implement? A. Use of personally owned devices B. Peer-to-Peer (P2P) network C. Tape drives D. Cloud storage only

C

If a password is short and non-complex, what type of attack can it be vulnerable to? A. Malware B. Distributed Denial of Service (DDoS) C. Brute force D. Man-in-the-Middle (MitM)

C

If a worm propagates over a network, which of the following is the first action to take, to prevent further infection? A. Enable on-access scanning. B. Use antivirus software to try to remove the infection. C. Disconnect the network link. D. Escalate the problem to a support professional.

C

If one part of the network fails, what should the networking team do to keep the rest of the network operational? A. Focus on the integrity of the data. B. Be convincing or establish trust. C. Implement network cabling to allow for multiple paths between servers. D. Implement solutions to prevent masquerading.

C

If the password policy for a company requires a user to authenticate with a smart card certification as well as with a PIN, what is this type of authentication? A. A software token B. Single-factor authentication C. Multifactor D. Single sign-on (SSO)

C

What does a programmer use to visualize a program sequence? A. Batch file B. Pseudocode C. Flow chart D. Object attribute

C

What does bps measure? A. Display resolution B. Processing speed C. Throughput rate D. HDD performance

C

What does the term "hybrid laptop" mean? A. Laptop that can be used like a desktop B. Laptop that can be used like a phone C. Laptop that can be used like a tablet D. Laptop that can be used like a gaming console

C

What indicates that a website has a highly trusted certificate? A. Green address bar with no icon B. Padlock icon in front of address bar C. Green padlock icon in front of address bar D. URL starting with "https"

C

What is a key difference between copyright and a patent? A. Copyright is valid for a limited time only, but a patent is granted on a permanent basis. B. Patents are granted automatically, but a copyright must be applied for and registered. C. Copyright protection happens automatically, but a patent must be applied for and registered. D. Patents are registered for a limited time only, but copyright protection is permanent.

C

What is an advantage of using a CLI (Command Line Interface) instead of GUI (Graphical User Interface)? A. With CLI, it is easier to multitask when working on different things at once. B. Non-technical users can learn how to use CLI faster than GUI. C. CLI takes up less system resources to run. D. More people use CLI, so there is more help available.

C

What is an example of an output device? A. Keyboard B. Optical disc C. Loudspeaker D. Digital camera

C

What is the Microsoft Edge web browser? A. Operating system B. Command-line interface C. Application software D. System utility

C

What is the advantage of using DSL (Digital Subscriber Line) over fiber optic in a SOHO (Small Office Home Office)? A. DSL cables perform better over long distances. B. DSL supports faster uplink speeds. C. DSL is more easily available to individual homes. D. DSL supports faster downlink speeds.

C

What is the basic unit of computer data? A. MB B. Byte C. Bit D. KB

C

What is the maximum transfer rate for the Firewire standard which uses 6-pin "alpha" connectors and cabling? A. 1 Gbps B. 800 Mbps C. 400 Mbps D. 600 Mbps

C

What is the second step in CompTIA's troubleshooting model? A. Establish a plan of action to resolve the problem. B. Establish a theory of probable cause. C. Research knowledge base/Internet, if applicable. D. Identify symptoms.

C

What should a user do to protect sensitive information from malware, when working on a public workstation? A. Enable a pop-up blocker. B. Set up a firewall. C. Clear the browser cache. D. Disable cookies.

C

What type of database uses a schema? A. Document B. Semi-structured C. Relational D. Key/value pair

C

When does this pseudocode execute the print command? If i == 0 XOR i != 0 Then print "Yes" End If A. Never B. When i is equal to 0 C. Always D. When i is not equal to 0

C

When using web search engines, why should privacy considerations affect a user's decisions? A. A user's web searches prevent companies from using targeted advertisements. B. A user's private data can appear in web searches. C. A user's web searches can reveal very valuable information. D. A user's web history skews sales and marketing trends amongst consumers

C

Which file system feature uses a change log? A. Encryption B. Compression C. Journaling D. Permissions

C

Which notation is a more efficient method to express large numbers? A. Decimal B. Octal C. Hexadecimal D. Binary

C

Which of the following SQL (Structured Query Language) commands is NOT a DML (Data Manipulation Language) command? A. INSERT B. DELETE C. DROP D. SELECT

C

Which of the following computer components does an "all-in-one" workstation contain within the monitor case? A. Mouse B. Keyboard C. Microphone D. Scanner

C

Which of the following encrypts data in motion? A. Folder-level encryption B. Database encryption C. Secure Sockets Layer (SSL)/Transport Layer Security (TLS) D. Whole Disk encryption

C

Which of the following exposes a user to a Man-in-the-Middle (MitM) attack? A. Cipher text B. A cryptographic hash C. Plain text D. Encryption

C

Which of the following poses a higher risk to ensuring business continuity? A. Service and data replication B. Syncing data between servers C. A converged network D. Real-time synchronization

C

Which statement holds true about a desktop/workstation when comparing it to a server? A. Desktop components are more reliable. B. Desktop components are more powerful. C. Servers use the same type of components as a desktop. D. Server components cost less than those of a desktop.

C

Which type of OS (Operating System) allows a user to uninstall Windows XP and replace it with Linux? A. Mobile device OS B. Server OS C. Workstation OS D. Embedded OS

C

Why are USB (Universal Serial Bus) thumb drives non-volatile? A. They are very small and light. B. They are easy to connect to the computer. C. They retain data without power. D. They can be inserted and removed while the computer is powered on.

C

Why do laptops use a heat spreader instead of heatsinks in their cooling system? A. Heatsinks are filled with liquid and not conducive to laptop mobility. B. Heatsinks require a lot of extra electricity to run. C. Heatsinks are bulky objects with a lot of height. D. Heatsinks are too expensive and reserved for high-end systems.

C

Why is data persistence an important consideration when using a database with an application? A. Applications need a way to view data in a variety of formats. B. Applications need a way to limit users' access to some of the data. C. Applications need a way to prevent the loss of information after they terminate. D. Applications need a way to communicate with a database.

C

Why is it important to protect computer data? A. Computer data is difficult to collect. B. Computer data is not intended to be shared. C. Computer data is an asset. D. Computer data is confidential.

C

Why is it important to write data to a storage device, such as a hard disk? A. Data is available for processing only when it's on a storage device. B. Data on a storage device uses less space than when it's in system memory. C. Data stored in system memory is only preserved while the computer is powered on. D. Data stored in system memory cannot be shown to the user.

C

A Bluetooth device is set up by "pairing" or "bonding" the device with the computer. To do this, the devices need to be put into what mode? A. Public B. Work C. Wireless D. Discoverable

D

A company operates in 2 offices. Both offices are located in the same town, with about 100 employees in each building. What type of network does it need to connect all of its employees, LAN (Local Area Network), or WAN (Wide Area Network)? A. LAN, because the offices are local to each other. B. LAN, because the company owns the equipment and cabling required to set it up. C. WAN, because LAN is unable to accomodate more than a few computers. D. WAN, because there are multiple locations.

D

A new scanner is purchased for the office, and the technician is using a disk with driver software instead of Plug-and-Play. What is the most likely reason? A. The computer is running Windows 7, which does not have Plug-and-Play. B. The technician does not have enough expertise to use Plug-and-Play. C. The scanner is wireless and therefore does not qualify for Plug-and-Play. D. Plug-and-Play installation did not work for this scanner model.

D

A package-delivery service is working with address information, which contains a house number and a street name. What is the best data type to use for the house number? A. Float B. Integer C. Char D. String

D

A program is a sequence of what? A. Functions B. Flowcharts C. Attributes D. Instructions

D

A relational database has a table, Customers, which contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to keep track of customers' purchases in this database? A. Create a new table, Purchases, with fields "Customer", "Date", "Description" and "Amount". B. Create a new table, Purchases, with fields "PurchaseDate", "PurchaseDescription" and "PurchaseAmount". C. Extend the Customers table with new fields "PurchaseDate", "PurchaseDescription" and "PurchaseAmount". D. Create 2 new tables: Products and Purchases.

D

A table contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to set up a primary key for this table? A. Use the Email field as the primary key. B. Use the Phone field as the primary key. C. Use the combination of the First Name and Last Name fields as the primary key. D. Create a new field called Id.

D

A user needs to back up a 6 GB (GigaByte) video file from a Windows desktop to a new 64 GB flash drive. An error message warns that the file cannot copy over to the flash drive, due to file size limitations. What does the user need to do? A. Increase the size of the flash drive's partition. B. Reformat the flash drive into FAT32. C. Reformat the flash drive into HFS. D. Reformat the flash drive into NTFS.

D

A user runs Microsoft Edge on a Windows 10 desktop. For more secure browsing, the user tries to disable scripting, but cannot deactivate it. What should the user do? A. Switch to a different operating system. B. Continue browsing with enabled scripting. C. Refrain from using Microsoft Edge. D. Install a script blocker add-on.

D

A user's Windows 8 laptop has the latest version of the Safari browser. The user tries to use a web application and receives a message that the browser does not support all features. What is the best course of action? A. Upgrade to the Windows 10 operating system to see if it works there. B. Find a different web application that performs the same functions. C. Wait until the next version of Safari comes out, in the hope that it will be fully supported. D. Install the browser which is fully supported by the application.

D

A web application contains a form, which users fill out. What is the most likely use for this form? A. To import data from a flat file into a database B. To create a flat file for each user C. To create a database D. To manually input data into a database

D

A web application needs to make changes to the contents of a table in a database, in response to a user's input. What method contains the command to do that? A. XML (eXtensible Markup Language) B. DDL (Data Definition Language) C. DCL (Data Control Language) D. DML (Data Manipulation Language)

D

A website visitor realizes that an important notification is not showing because the browser has a pop-up blocker. What's the best thing to do? A. Avoid visiting this website. B. Disable the pop-up blocker. C. Use a different browser. D. Add an exception for this website.

D

After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data? A. Add more data. B. Restrict the number of users who access the data. C. Verify user's access to data is working normally. D. Ensure the integrity of the data.

D

An attacker captures password packets to figure out a user's password to gain access to a host on a corporate network, and masquerades as that user. Which of the following is a threat to integrity that describes this attack? A. Social engineering B. Snooping C. Wiretapping D. Impersonation

D

An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe? A. Hardware failure B. Power outage C. A Man-in-the-Middle (MitM) D. A Denial of Service (DoS)

D

An attacker successfully connects to an open wireless access point, and proceeds to monitor and capture the plain text traffic on the network. Which of the following integrity concerns does this describe? A. A Denial of Service (DoS) attack B. A replay attack C. An impersonation attack D. A Man-in-the-Middle (MitM) attack

D

An employee makes unauthorized copies of customer Social Security numbers, saves them in an unencrypted spreadsheet, and transfers them to the employee's personal email account. The employee then opens new credit card accounts with this information and uses the cards to buy personal items. Which of the following did NOT occur? A. Mishandling Personally Identifiable Information (PII) B. Identity fraud C. Identity theft D. Identity checks

D

An employer fires an end-user for hijacking another employee's user account. Which of the following does NOT provide non-repudiation to the employer? A. A signature B. A receipt C. Video surveillance D. A guest user account

D

Convert the decimal number 35 into binary notation. A. 11111 B. 100101 C. 1000001 D. 100011

D

How do the CPU (Central Processing Unit) and storage devices in a computer process data? A. As characters and strings B. As bits and bytes C. As integers and decimals D. As zeros and ones

D

How does an object store its attributes? A. As public variables B. As comments C. As a vector D. As private variables

D

How much storage does a character data type use? A. 1 bit B. 8 bytes C. 4 bytes D. 1 byte

D

The first step in the troubleshooting process is to identify the problem. What are some of the components of this step? A. Question users; document findings. B. Research symptoms; consider multiple approaches. C. Approach multiple problems individually; divide and conquer. D. Duplicate the problem; determine if anything has changed.

D

The systems administrator just found out that a user has been using the same password for the last two years. Which of the following password best practices should the systems administrator enforce? A. Memorability B. Maintain confidentiality C. Reuse across sites D. History/expiration

D

What are the four functions which represent most of the ways that data moves through a computer system? A. Addition, subtraction, division, multiplication B. Automation, replication, optimization, recovery C. Typing, editing, copying, printing D. Input, output, processing, storage

D

What is a downside to digital products? A. Digital products have high distribution costs. B. Digital products are limited to software and computer games. C. Digital products are of low quality. D. Digital products are easy to copy and steal.

D

What is a true statement about interpreters and interpreted programming languages? A. Interpreted programming languages only run on one platform. B. An interpreter converts machine code into a human-readable format. C. Interpreted programming languages can run on any platform. D. An interpreter converts the program into machine code at runtime.

D

What is an advantage of a relational database over a key/value pair database? A. Relational databases support more data types. B. Relational databases use less memory to store the data. C. Relational databases have a less complex design structure. D. Relational databases have query languages to retrieve data.

D

What is an advantage of the float data type compared to the integer data type? A. The float data type requires less processing time for arithmetic operations. B. The float data type consumes less storage. C. The float data type is a more natural way of expressing numbers in computing systems. D. The float data type is not limited to whole numbers.

D

What is an authorization policy that would help a systems administrator grant rights to users to perform their job and no more? A. Non-repudiation B. Reviewing logging events C. Requiring digital signatures D. Least privilege

D

What is an example of "processing" in a computer system? A. Data is displayed on the monitor and printed out on paper. B. Data is entered by the user through a scanner. C. Data is written to hard disk for later retrieval. D. Data is written to memory and manipulated by the CPU.

D

What is the correct SQL (Structured Query Language) command to read information from a table? A. RETRIEVE B. VIEW C. EXTRACT D. SELECT

D

What is the difference between WPA (Wi-Fi Protected Access) and WPA2 wireless encryption standards? A. WPA2 uses Temporal key integrity protocol. B. WPA2 uses Rivest cipher. C. WPA2 uses captive portals. D. WPA2 uses Advanced Encryption Standard.

D

What is the difference between a password and a passphrase? A. A passphrase is shorter than a password, but more difficult to remember. B. A passphrase is longer than a password, but more difficult to remember. C. A passphrase is shorter than a password, but easier to remember. D. A passphrase is longer than a password, and easier to remember.

D

What is the last step in CompTIA's troubleshooting model? A. Implement preventive measures. B. Establish a plan of action to resolve the problem. C. Verify full system functionality. D. Document lessons learned, actions, and outcomes.

D

What is the term for the processing speed of 1 billion cycles per second? A. Bps B. GBps C. MHz D. GHz

D

What type of software is Microsoft Office? A. Collaboration software B. Business software C. Project management software D. Productivity software

D

What type of software is project management software? A. Productivity software B. Networking software C. Collaboration software D. Business software

D

What's a true statement about markup languages? A. Markup languages are only used to program web pages. B. Markup languages are not human-readable. C. Markup languages can only be used on one platform. D. Markup languages are not programming languages.

D

What's a true statement about query languages? A. Query language code is the most complex code. B. Query language code is not human-readable. C. Query languages can only be used on one platform. D. Query language code does not need to be compiled.

D

What's a true statement about the assembly language? A. Each assembly language can run on any platform. B. Assembly code is not human-readable. C. Assembly languages are not programming languages. D. Only specialists use assembly code.

D

What's a true statement about variables? A. A variable contains a value that must change during the execution of the program. B. A program has to declare all variables before using them. C. Each procedure must assign an initial value, when declaring variables. D. A variable can have any data type that the programming language supports.

D

When a general language performs scripting, what does it call on as part of the code? A. Query statements B. Machine code C. Markup instructions D. System commands

D

When using web search engines, why should privacy considerations affect a user's decisions? A. A user's web history skews sales and marketing trends amongst consumers B. A user's private data can appear in web searches. C. A user's web searches prevent companies from using targeted advertisements. D. A user's web searches can reveal very valuable information.

D

Which 802.11 wireless standard can use both 2.4 GHz (Gigahertz) and 5 GHz frequency bands? A. 802.11a B. 802.11ac C. 802.11g D. 802.11n

D

Which document contains the information about how the software vendor will use any data that the software gathers and processes? A. Software usage best practices B. Software instructions C. Software installation best practices D. Software agreement

D

Which numbers does this pseudocode display? declare i as Number = 10 Do While i > 0 If i < 7 Then i = i - 1 End If print i i = i - 1 Loop A. 9, 8, 7, 6, 5, 4, 3, 2, 1, 0 B. 9, 7, 5, 3, 1 C. 10, 9, 8, 7, 6, 5, 4, 3, 2, 1 D. 10, 9, 8, 7, 5, 3, 1

D

Which of the following authentication factors is an example of something you have? A. A fingerprint pattern B. A password C. A geographic location D. A software token

D

Which of the following best describes containers and identifiers? A. A container is a set of constants. B. An identifier is a type of container. C. Identifiers have attributes, properties, and methods. D. A container is a type of identifier.

D

Which of the following encrypts data at rest? A. Hypertext Transfer Protocol Secure (HTTPS) B. Secure Sockets Layer (SSL)/Transport Layer Security (TLS) C. A transport encryption protocol D. File-level encryption

D

Which of the following helps protect against dangerous unsolicited email file attachment threats? A. Removing unwanted/unnecessary software B. Disabling unused features C. Locking the computer with a physical lock D. Using anti-malware

D

Which of the following is NOT true about critical data when configuring file backups? A. Critical data does not always store in files within a user or shared folder. B. Critical data can store within a settings file located within a database. C. Critical data might include Personally Identifiable Information (PII). D. Replication allows critical data backup, which protects from accidental deletion of a record.

D

Which of the following is the best example of variety of data in a database? A. A table with a tinyint, integer, float, and decimal fields B. A string field with data in multiple languages C. A number field with values from -999,999,999,999 to 999,999,999,999 D. A table with a string, number, and date fields

D

Which of the following is the most likely example of cross-platform software? A. Application that runs from the Chrome browser on a Dell PC and Safari browser on an iMac B. Application that runs on a Samsung tablet and a Motorola smartphone C. Application that runs on a Dell PC and a Samsung laptop D. Application that runs on a Dell PC and a Samsung smartphone

D

Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing? A. Redundant Array of Independent Disks (RAID) B. Fault tolerance C. Contingency plan D. Network redundancy

D

Which protocol supports interactive mechanisms GET and POST? A. IMAP B. SMTP C. POP3 D. HTTP

D

Which term refers to technologies that help ensure data is available in the event of hardware failure? A. Data capture B. Access control system C. Data exfiltration D. Fault tolerance

D

Which type of data uses whole disk encryption? A. A web page via Hypertext Transfer Protocol Secure (HTTPS) B. Data transmitted over a network C. An email D. Data at rest

D

Which wireless Internet service does a computer use when it connects by tethering? A. Satellite B. Wi-Fi C. Radio frequency D. Cellular radio

D

Why would a business choose satellite service instead of DSL (Digital Subscriber Line)? A. Satellite service requires no special installation. B. Satellite connection is more reliable. C. Satellite service requires no special installation. D. Satellite systems provide bigger areas of coverage.

D

Why would a programmer create a function instead of a procedure? A. Procedures do not exist in some programming languages. B. Functions compile more efficiently. C. The function needs to include a nested loop, which does not work in a procedure. D. The process which calls the function needs to receive back a return value.

D


Set pelajaran terkait

LS1 Week 8 Assessment and Management of Problem Related to Make Reproductive Process

View Set

C211 wgu Microeconomic Principles (Mankiw Chapters 4 & 5)

View Set

Social Psychology Exam 2: Bystander Intervention

View Set