CompTIA ITF+ Practice Test 5
WLAN (Wireless Local Area Network) Card
A user wants to use a laptop outside the house and still remain connected to the internet. Which of the following would be the best choice to accomplish this task?
USB 3.1 Gen 2
A USB port marked in red is designed for which if the following standards?
Use your account information
A client is installing a subscription program and is panicking because there is no prompt for a serial number. Which of the following statements will solve the problem?
S/PDIF (Sony-Philips Digital Interface) Optical
A friend has lent you an audio cable for use with your older computer. He cautions you not to bend or crease the cable. What type of cable is it?
Group Records
A report can be built from a query. Which of the following can be done in a report but not in a query?
PowerShell
A scripting language that includes aliases that help users to reuse existing Windows and Unix/Linux shell scripts is _________?
Screen Saver is lock screen password
A user steps away from their computer frequently and is concerned about unauthorized users changing information while they're away. Which of the following would help prevent this?
Input
As you use a barcode reader to check in new products, you are performing ________
End User License Agreement (EULA)
Before installing a new program for your client, your client wants to know what types of installations are permitted. You tell your client to download and review what?
Enable Encryption & Install a Hardware Lock
Due to a recent string of thefts in your office, you need to harden your local system. What two actions are most appropriate for your situation?
FTTP (Fiber to the Premises)
Fiber Optic is being used as part of the distribution network for several types of Internet Connections. Which of the following goes directly to the service location (home or business) to provide the fastest service?
Multipartite
If a virus attacks the boot sector of your hard drive as well as files in the file system, what type of virus is it?
File transfer runs at port speed
If you connect a USB 3.0 flash drive to a USB 2.0 port, which of the following will happen?
Runs the following command twice
In Ruby, the statement 2.times do performs which of the following?
Tier 3
In a three-tier application architecture, which tier is used for data?
Disable the touchpad
Jacky complains the cursor on her laptop screen jumps around unexpectedly when she's typing. What can she do to solve the problem?
Autofill
Jacky discovers when she types her name into a field in a web browser, her whole name appears & her address. What is this due to?
Enter the same server name as the IMAP server
Jacky doesn't know the name of the SMTP server when setting up email on an iPad and only has 10 minutes. What advice do you give her?
Guest
Jacky gets a new workstation and is not part of a domain. What user accounts should she disable to increase security?
HTTPS://
Jacky is browsing the internet and wants to know if it's safe to enter her credit card information into a website. What do you tell her to look for?
Rootkit
Jacky just heard of a program that if installed on your computer gives the attacker administrator like access to your machine. What type of software is he talking about?
Excessive Pop-Ups, browser redirection, & search engine redirection.
Jacky thinks her computer is infected with adware. What 3 things should she look for?
Password Reuse
Jacky's Facebook gets compromised and she tells a friend her email and banking accounts are probably also compromised. Which of the following has Jacky most likely performed?
BASIC
Line numbers were a common feature of early versions of which of the following languages
Multifactor Authentication
Managers at your company have decided to implement stricter security policies. Which of the following login schemes will help them achieve this goal?
Payment Systems
Near Field Communication (NFC) is used for which of the following tasks?
Allow App Store Apps only
Several macOS devices in the office become infected with malware. After asking the users, you find out they installed software from unfamiliar sites. Which of the following settings can prevent this from happening?
ASCII Character Set
The cent sign character is not available in which of the following character sets?
Relation
The contents of the field Social in the table CustomerName and the contents of the field SSN on the table ShippingAddress are identical and unique. To be able to query data from tables, you need to set which of the following between these fields?
Web-Based
The documentation for a new device states that it has a default IP address of 192.168.1.1 this device uses which type of setup?
Output
The microphone/line-in jacks on a sound card are input devices. The speaker jacks are examples of _________ devices.
Database Engine
The same database app can support different amounts of data. Assuming that the storage available to the database app is large enough for any amount of data supported by the app, which of the following affects the amount?
Flat File
What is a NoSQL database also known as?
Screensaver Password
What option can you configure on your workstation to increase security when you leave your desk?
Processing
When the user edits a photo, this is an example of which of the following?
Input
When you connect a camera to a computer via a USB cable to transfer pictures to the computer, the USB port on the computer is an __________ device.
Either End
Which end of a USB Type C (USB-C) cable should be connected to the USB-C port on a computer?
Turns off all wireless connections
Which of the following accurately describes what Airplane mode does on an iPhone?
Closing untrusted source warnings
Which of the following actions is not considered a web-browsing best practice?
Input, process, output, storage
Which of the following are the basic computing operations?
Multifunctional Device
Which of the following devices is an input/output device?
Boot Sector
Which of the following is a typical location for a rootkit?
Near Field Communication (NFC)
Which of the following is a wireless communication that requires devices to be within 6 inches of each other to transfer information?
Coordinate Software Applications
Which of the following is not a function of an operating system?
Unicode contains all ASCII characters
Which of the following is true abiut the remationship between ASCII and Unicode?
JavaScript
Which of the following languages is commonly used for web development?
Installing a new operating system with antivirus on the infected computer
Which of the following methods is not recommended for fixing a computer infected with malware?
Software bundles with unwanted applications
Which of the following problems can be prevented by using a direct download link from a software aggregator website?
#0000FF
Which of the following represents a pure blue color in text?
Some motherboards include video outputs
Which of the following statements is correct about the motherboard?
Port Clusters Enable Multiple USB Devices To Be Connected To A Computer
Which of the following statements is correct about the port cluster?
Patching
Which of the following would most likely prevent malware sent as a compromised file via email from infecting a persons computer?
DisplayPort & HDMI
Which pair of cables carry both digital audio and digital video signals?
Software Firewall
Which type of software will help protect your computer from malicious network traffic?
Near Field Communication (NFC) & Bluetooth
While on a 6 hour layover at the airport, what should you disable on your phone as a device hardening measure?
Wiretapping
While speaking to a friend about a surprise party in a standard phone, you hear a faint click. Later someone is talking about the surprise party. What is the most likely reason?
On-Site
You are considering backup storage options. Which of the following is not a good option in the case of robbery, fire, earthquake, or civil disturbances?
Custom Installation
You are installing a program and need to change the normal location for the program and change what features are installed. You are performing which of the following?
Row Locking
You are making an update to the Quantity Ordered field for one item of an inventory database while another user is making an update to the In Stock field for a different item in the same database, at the same time. If this database supports locking, which type of locking is it using?
GPU (graphics processing unit)
You are viewing a 3D rendering on a projector. Which of the following components performed the rendering?
Ask which cable service the customer has
You are working at an electronics store and a customer asks for a cable modem that supports DOCSIS (Data Over Cable Service Interface Specification). Which of the following should be your response?
Snooping
You discover a key-logger program on your computer. What type of attack is this?
They logged on with your username and password
You enable file encryption on your local computer. While your were on vacation, a coworker gets on your computer and shares important files with other users. How did they do this?
RJ-45 & FireWire
You have 2 Mac computers running OS X, and you want to connect them into a network. Which two types of connectors can help you accomplish this?
Buy a second software license
You have a program with a single-use software license for computers or virtual machines and need to install it on a computer and a VM. Which of the following should you do to take care of your client and follow the license agreement?
One-time purchase
You have started to use a computer that is running an application that is three versions behind the current version. It was purchased and installed five years ago. What type of a license is it using?
Use a DVI-HDMI cable
You need to connect a display to your laptop so you can extend the desktop. The laptop has an HDMI port and a VGA port, but the display only has a DVI-D port. Which of the following will solve the problem?
Google Play
You need to find a new productivity app for your android based tablet. Where should you look?
Spear Phishing
You receive an email claiming to be from the IT security director that asks you to provide the server password. This could be an example of __________ ?
Change default passwords and don't reuse old passwords
You're asked to give training on network security. For your section on password management, which 2 options should you recommend to users?
Your adobe account information
You're installing Adobe Creative Cloud, which is provided as a subscription. Which of the following would you enter to validate your installation?
There are 15 app updates available
Your client is using an iOS device. The App Store button has the number 15 on it. What does that mean?
It violates the End User License Agreement (EULA)
Your client wants to share a printer on a Windows 10 computer with 25 other users. You inform him this is not permitted because of which of the following?
Database
Your clients staff is having a difficult time in correctly entering names and addresses into a spreadsheet for use and mailing. Which of the following types of software would make this easier?
Eavesdropping
Your organizations security director has ordered that all webcams and microphones be covered or disconnected when not in use. Which of the following threats will this help prevent?