Practice Test ITF+
Jack has commissioned a new logo for his company. He wants to legally designate it as the company's intellectual property. What does he need to apply for?
A registered trademark
Amadou is writing a program that references data in a fixed-size collection by each element's index value. What programming structure should they use?
Array
Wesley is accessing an online database via his web browser. In this situation, what function is the database serving?
Backend
John uses a password management application that requires him to sign into it with a master password once a day. That means he must remember that master password, or all his other passwords will be inaccessible. What is the best way for him to remember it?
Create a master password that consists of a pattern of numbers, letters, and symbols he knows well but are not related to his life.
IT support technician Jose has formulated a plan of action for repairing Beth's computer. Before he proceeds, what should he do?
Explain the plan to Beth and get her consent to implement it.
What type of software can you install on a client PC to block network requests to access software ports?
Firewall
Bart is editing the Windows Registry, which stores keys and values. Which type of database is he working with?
Hierarchical
Brooke needs to write a section of code that assigns letter grades to students based on their numeric score on a test from 1 to 100. Which logical structure would work best for this task?
If-then-else statement
Giselle's small office could benefit from a file server so employees could share files, but she doesn't want the expense of a full-fledged server. What could she do that would be a less-expensive alternative but would still enable all employees to access the latest versions of the shared files any time?
Install a NAS device.
Pat wants to use the password manager in her operating system, which is macOS. What utility should she use?
Keychain
Which of these is a drawback to desktop PCs?
Lack of portability
Todd is shopping for a computer. He needs to be able to run desktop apps such as Microsoft Office, but he also needs to take his computer to and from work each day. Which type of computer should he get?
Laptop
What kind of computer uses an SO-DIMM?
Laptop
Beth wants a color printer that has a low cost per page for the consumable supplies it uses. What type should she shop for?
Laser
Which of these is one of the key functions that all operating systems have in common?
Memory management
What type of device would connect to a port with three rows of five holes in it and a D-shaped metal band around its perimeter?
Monitor
What type of database does not require data to be in a structured format?
Non-relational
Which of these is the best description of solid-state storage? A Magnetic storage B Non-volatile memory C Volatile memory D Spinning platters with a read/write head
Non-volatile memory
What professional IT career will you be qualified for after passing the ITF+ exam?
None, because this is a pre-professional certification
Emily connects her wireless earbuds to her smartphone via Bluetooth. What type of network is she creating when she does that?
PAN
What is larger than a terabyte?
Petabyte
Bert is traveling to a client site to service some desktop PCs. What is the most important thing he should make sure to bring?
Phillips screwdriver
ACME Corporation wants to minimize the number of times an employee must sign into systems to gain access to protected resources throughout their workdays. What could their network staff implement to help with this?
SSO
Which internet connection method is most affected by high latency?
Satellite
Roselyn has teenage children at home and wants to prevent them from visiting websites with adult content. She signs up for a service that will block such sites from her home network's internet connection. As Roselyn is following the instructions to set up the service, what configuration change will she probably be prompted to make?
Use a proxy server.
Glenda's supervisor has mandated that everyone use multi-factor authentication when signing into their workplace account from home. Which of these would be considered multi-factor authentication? A Username, password, and a security code sent to her smartphone B Fingerprint recognition C Username and password D Username and a stored password from a password manager
Username, password, and a security code sent to her smartphone
Nina is writing a section of code where the program will determine whether variable X is set to 0. If it is, the program will terminate. If it isn't, the program will continue. What structure should she use?
While loop
Which operating system relies on file extensions to determine a file's type?
Windows
Timi wants to use a markup language to structure a database. Which of these languages could they use?
XML
Windows keeps crashing on Consuela's computer, and she suspects that one of her system files has become corrupted. What utility can she use to troubleshoot?
sfc /scannow
Andrew wants to upgrade the memory in his laptop. What kind of RAM should he shop for?
SO-DIMM
Patsy is preparing for a career as a database administrator. What language would be most important for her to study?
SQL
Suppose you want to set up the fastest possible Wi-Fi network that supports both 2.4 GHz and 5 GHz frequencies. You should look for devices that support which standard?
802.11ax
Suppose you want to install an OS on a server that will enable that server to host multiple guest virtual machines without the overhead of a full-featured OS. What would you choose?
A Type 1 hypervisor
Suppose you see 0x4820 in some documentation. What type of number is this?
A hexadecimal number
Which of these is the best description of CompTIA?
A non-profit trade association
Which of these is a valid binary number? A 2 B E C 10 D 15
10
Janice would like a widescreen monitor. When she is shopping, what aspect ratio should she look for?
13:9
Which of these is a valid IPv4 address? 192.168.0.2.5 195.2.5.254 260.14.25.8 EFA3:2402:A3A5:2EFD:C92B:4C88:3491:A141
195.2.5.254
Thomas has a drive with a capacity of two terabytes. Approximately how many gigabytes is that?
2,000
Kenneth is searching his hard drive for a file he created in Microsoft Excel. What file extension should he search for?
.xlsx
Cramer needs to replace the hard drive on a laptop that is seven years old. What type should he shop for?
2.5" HDD
Sandra is telling a friend about her internet connection's fast speed. What unit of measure will she use to describe it?
Gbps
Lei wants to define a variable that will hold a binary value, such as True/False. Which data type should they use?
Boolean
Benjamin wants to write an application and distribute it as an executable. What languages could he use?
C++
Barb is using SQL commands to create a query. Which SQL command will do this?
CREATE VIEW
Keisha is concerned that when she visits certain websites, her activity is monitored by advertisers who want to know her usage habits. What is one way she can minimize this invasion of privacy?
Change browser settings to disallow third-party cookies.
Donna's Wi-Fi slows down dramatically when her mother is using a 2.4 GHz cordless telephone near the router. What setting could she change on the wireless router to help with this?
Channel
What type of fire extinguisher should a server room be equipped with?
Class C
Rupert is shopping online for a present for his daughter's birthday and he wants to keep it a secret. They share a computer, and he doesn't want her to be able to snoop and see what websites he has been visiting. What should he do?
Clear his browser history.
In Wayne's database table, no field is unique for each record, but each record must have a unique combination of two different fields. What kind of key is needed to ensure that there are no duplicate records?
Composite
Suppose a hacker uses social engineering to gain access to a data server, and then sabotages the company's manufacturing processes by changing some machine settings stored there. Which part(s) of the CIA triad has or have been violated?
Confidentiality and integrity
Ashley needs more USB ports than their laptop has available. What is the best way to solve this problem without buying a new laptop?
Connect a port replicator.
What legal protection applies to creative works such as books and websites?
Copyright
Maria wants to be a web designer when she completes school. It is essential that she study which language?
HTML
What type of server assigns IP addresses to client devices?
DHCP
What kind of RAM is typically used in a desktop PC?
DIMM
Finn has connected an external webcam to his desktop PC, but none of his video conferencing apps recognize its presence. What Windows utility could he use to troubleshoot?
Device Manager
Which Windows utility helps you manage device drivers for peripherals?
Device Manager
What helps with non-repudiation?
Digital signatures
What is a method of encrypting data at rest?
EFS
Royce is writing a program in Java. He wants to save time by using some pre-written code blocks for common operations such as saving and opening files. He found a library online of Java code snippets. What kind of code is he looking for?
Function
Francesco just bought a new storage device, and he needs to partition it. Which partitioning method should he use if it is available?
GPT
What is the most modern (and preferred) disk partitioning method?
GPT
Jess has received an email message that appears to be from her bank, telling her there is a problem with her account. It contains a hyperlink to visit her bank's website to learn more about the problem. Which of these is a good way for her to protect herself from a potential phishing attempt while still finding out if there is an actual problem with her account? A Delete the message and do nothing. B Phone or visit her bank and inquire about her account status. C Click the hyperlink in the message. D Click Reply and send a message back to the sender asking them to verify their identity.
Phone or visit her bank and inquire about her account status.
Which of these is an example of a two-tier application architecture? - Playing a game that is installed on your local PC but that pulls data from an online server so you can play with friends in other cities - Accessing a database stored on your local PC using a locally installed app - Playing a game locally that you purchased and downloaded online - Using your browser to access an application hosted on a website, which in turn draws data from a different server
Playing a game that is installed on your local PC but that pulls data from an online server so you can play with friends in other cities
In which step of a computer's operation is the CPU most closely involved?
Processing
Suppose you have written a mobile app. You want to make it available to the public for free, but you don't want to give up ownership to it or distribute the source code. What is this licensing model called?
Proprietary
Leif wants to extract information from certain fields and certain records from his database. What should he use to generate this subset of his data?
Query
Rick needs to connect his desktop PC to an Ethernet network. What type of connector will the cable use?
RJ-45
Parker has created a database that contains three tables: Members, Events, and Participation. The tables are joined so that Parker can look up the names of each member who attended a certain event. What kind of database is this?
Relational
Bishop Enterprises LLC wants to maintain real-time copies of their data across multiple locations. What fault tolerance method best describes this?
Replication
Which of these is an important section to include in a business continuity plan? A Password policy B Risk assessment C Acceptable use plan D VPN server
Risk assessment
Petra is troubleshooting a client's problem with his PC not powering up. She has a theory about what might be happening. Following the troubleshooting methodology, what is her next step?
Test the theory.
Beth needs to connect a Thunderbolt dock to her laptop. She should connect it to a _____ port with a lightning symbol next to it.
USB-C
Which of these OSs does not have a GUI by default? A Windows B Ubuntu Linux C iOS D Ubuntu Server
Ubuntu Server
Fedora, Red Hat, and UNIX are all operating systems for what type of computer?
Server
Which type of device would be most likely to have a command-line operating system?
Server
Akela is troubleshooting a Windows PC and wants to stop and restart a service. What utility should she use?
Services
From what Windows utility can you restart a service that has stopped?
Services
Phishing, pretexting, and baiting are all forms of what type of cyberattack?
Social engineering
What is the best definition of a Type 2 hypervisor?
Software that runs as an app in the main OS and manages guest OSs
Suppose you need to keep track of multiple salespeople and their daily sales and provide a summary total for each person monthly. Which business application would be the best choice for this task?
Spreadsheet
Which business application would be best suited for compiling a list of salespeople and their sales over a three-month period?
Spreadsheet
To practice the principle of least privilege, Windows users should use ___ accounts for their everyday usage, and reserve ___ accounts for situations where they require increased privileges, such as to install software.
Standard, Administrator
What Windows utility enables you to boot into special startup modes that can help with troubleshooting?
System Configuration
In what kind of computer would you be likely to find an ARM CPU?
Tablet
Beck wants to run a utility that clears their browser cache automatically each day at 5 p.m. What Windows utility can they use to set this up?
Task Scheduler
Suppose that a relational database has an Employees table and a Training table, and both tables have an EmployeeID field. That field uniquely identifies each record in the Employees table, but that field can have duplicate values in the Training table. Which of these statements is true about the relationship between them? A Both fields are the primary key in each of their respective tables. B The EmployeeID field in the Training table is the foreign key. C The EmployeeID field in the Employees table is the foreign key. D Both fields are the foreign key in each of their respective tables.
The EmployeeID field in the Training table is the foreign key.
Daisy has tested her cable internet connection speed and it's nowhere near the speed she was promised when she signed up. Why might this be?
The bandwidth is shared with others in her neighborhood.
In asymmetric cryptography, how does the process of sending an encrypted message begin?
The sender asks the receiver for the receiver's public key and receives it.
Which of these is an example of a public domain app? A The app is free to all but there are conditions on how it may be used. B An owner controls access to the app and its use. C The source code is available to all, but there are rules about how it may be used and redistributed. D There are no owners or rules about the app's use.
There are no owners or rules about the app's use.
What is the purpose of pseudocode?
To plan the programming structures and logic of a program in a language-independent way
Kimyata is wearing a wrist strap with a cable that connects it to the chassis of the desktop computer she is working on. What is the purpose of this strap?
To prevent ESD damage to the internal components
Some computing devices have more than one function. Which one of these devices functions as both an input and an output device?
Touchscreen
Suppose the app you use for tracking product sales is installed on a server, and you access it via a web browser interface. Its data is stored on the same server as the app. What is this an example of?
Two-tier architecture
The character A in the ASCII character set is represented by the number 0x41. What is it in the Unicode character set?
U+0041
Jacob wants to connect his laptop to a printer with a USB cable. He purchases a cable with USB-A on one end. What is on the other end?
USB-B
Brenda is setting up a new Linux system. During the process of installation, she must respond to a prompt asking which file system to use on the main volume. Which one should she choose?
ext4
Linux systems use what file system by default?
ext4
