ITF+ Practice
What is the proper example of a string definition?
"It is polite to say \ "Thank you\""
What is a true statement about interpreters and interpreted programming language?
An interpreter converts the program into machine code at runtime
Which of these is a plain text file a website creates when you visit it?
Cookie
Which of these is a Business Continuity concern?
Fault tolerance
Which of the following best represents the way data moves through a computer system?
Input, processing, output, and storage.
A user runs Microsoft Edge on a Windows 10 desktop. For more secure browsing, the user tries to disable scripting, but cannot deactivate it. What should the user do?
Install a script blocker add-on
A program is a sequence of what?
Instructions
What is the purpose of BIOS?
It is the firmware that drives the bootstrapping process.
Select the one UNTRUE statement in regard to an expansion bus.
It's also referred to as the Front Side Bus (FSB) or the local bus
What file system features uses a change log?
Journaling
What is an example of an output device?
Loudspeaker
Which of these is an Integrity concern?
Man-in-the-middle
Which of these is a typical device hardening policy?
Patching
Which of the following is NOT true about critical data when configuring file backups?
Replication allows critical data backup, which protects from accidental deletion of a record
Which of the following encrypts data in motion?
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
Which of the following types of authentication, if compromised, could potentially impact multiple services?
Single sign-on
Which of these is a Confidentiality concern, as defined in the "CIA Triad"?
Snooping
When a general language performs scripting, what does it call on as part of the code?
System commands
What is the main purpose of the Power-On Self-Test (POST)?
The computer performs a Power-On Self-Test (POST) to check that the main components work and then loads Windows.
Which option is an example of an authentication lockout policy?
The device locks for a set period
Why would a programmer create a function instead of a procedure?
The process which calls the function needs to receive back a return value
What kind of computer firmware provides support for mouse operation at boot?
UEFI
Which of the following measures their data transfer capacity in Mbps (megabits per second)?
Wireless networks
Which type of OS (Operating System) allows a user to uninstall Windows XP and replace it with Linux?
Workstation OS
What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)?
800
Which 802.11 wireless standard can use both 2.4 GHz (Gigahertz) and 5 GHz frequency bands?
802.11n
Of the following tags, which does NOT belong to Hypertext Markup Language (HTML)?
<h7>
What is true regarding a 32-bit vs. a 64-bit CPU (Central Processing Unit)?
A 64-bit CPU can run a 32-bit OS
An attacker successfully connects to an open wireless access point, and proceeds to monitor and capture the plain text traffic on the network. Which of the following integrity concerns does this describe?
A Man-in-the-Middle (MitM) attack
What could a network administrator implement to allow employees to securely connect remotely to the corporate network?
A Virtual Private Network (VPN)
What is the difference between a password and a passphrase?
A passphrase is longer than a password, and easier to remember
What is available in software installer packages to select specific feature sets or modules within the software package?
Advanced options
What functionality can turn off a mobile device's Wi-Fi without shutting off the device?
Airplane mode
What should a user do to protect sensitive information from malware, when working on a public worktation?
Clear the browser cache
Which of the following best describes their capacity in petabytes?
Cloud systems
Which backup storage type best helps mitigate against critical data loss in the risk of fire or theft?
Cloud-based storage backup
When does this pseudocode execute the print command? If i == 0 XOR i ! = 0 Then print "Yes" End If
Always
A web browser is an example of productivity software. What type of software is an email client?
Collaboration software
What type of software is Google Drive?
Collaboration software
What type of programming language has the fastest execution time?
Compiled
What's a true statement about compiled programming languages?
Compiled programming languages have to transform the code to an executable binary
Why is it important to protect computer data?
Computer data is an asset
A company has 100 employees, who work in 2 shifts. Half of the employees work during standard business hours, and the other half work at night. All 100 employees have their own desktop computers with an installation of a proprietary software program, which they use on a daily basis. What type of software license makes the most sense for this company?
Concurrent license
What is the Microsoft Edge web browser?
Application software
Which of the following is most likely an example of cross-platform software?
Application that runs on a Dell PC and a Samsung smartphone
Software programs that let users do useful things with their computer, such as create and edit documents are known as what?
Applications (or Apps)
Why is data persistence an important consideration when using a database with an application?
Applications need a way to prevent the loss of information after they terminate
If a worm propagates over a network, which of the following is the first action to take, to prevent further infection?
Disconnect the network link
A Bluetooth device is set up by "pairing" or "bonging" the device with the computer. To do this, the devices need to be put into what mode?
Discoverable
What is the last step in CompTIA's troubleshooting model?
Document lessons learned, actions, and outcomes
Which of the following types of collaboration software is least sensitive to latency?
Document sharing
A user needs to uninstall a driver on a computer running Windows OS (Operating System). Which page or window does NOT contain the relevant options to accomplish this?
Driver Manager
The first step in the troubleshooting process is to identify the problem. What are some of the components of this step?
Duplicate the problem; determine if anything has chagned.
An attacker taps into a wired network to intercept unencrypted wireless transmissions. Which of the following is a type of confidentiality concern that describes this activity?
Eavesdropping
With which method could an attacker use sniffing?
Eavesdropping
What problem is Window's UAC (User Account Control) designed to solve?
Elevated privileges
Which of the following is least likely to pose a substantial risks to an organization, such as a system intrusion?
Employees using permitted software and services as outlined in the handbook
After a network administrator restores data from a backup due to a system outage, what is the first step before allowing user access to the data?
Ensure the integrity of the data
Which workstation operating system type is best used on a business network?
Enterprise Client
What is the term that refers to operating a device by moving it around or using a camera in the device to recognize your hand movements?
Kinetics
What does the term "hybrid laptop" mean?
Laptop that can be used like a tablet
What is an authorization policy that would help a system administrator grant rights to users to perform their job and no more?
Least privilege
What is the principle that grants users the rights necessary to perform their job and no more?
Least privilege
A user's Windows 8 laptop has the latest version of the Safari browser. The user tries to use a web application and receives a message that the browser does not support all features. What is the best course of action?
Install the browser which is fully supported by the application
Which of the following is NOT part of IoT (Internet of Things) home automation?
Insulin pump
A systems engineer wants to control access to critical data. Which of the following describes a security concern regarding storing and transferring data without authorization?
Integrity
Which part of the Confidentiality, Integrity, and Availability (CIA) triad deals with information storage?
Integrity
A wireless network in a small home office generated poor signal quality. The signal improved when an old cordless phone stopped working. What problem did the cordless phone cause when it was active?
Interference
Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks?
Internet
What is the purpose of a NIC card?
It allows the computer to connect to network.
How is open source code used by developers?
It is code used by developers that they have the rights to modify without requiring permission to meet their project needs.
How is data stored on a hard disk drive?
It is encoded magnetically on a platter that spins
What are the properties of a file "Books/CoverPhoto.js"?
It's an executable file named "CoverPhoto.js" in folder "Books".
In terms of file systems, what benefits does exFAT provide over FAT and NTFS?
It's developed for flash drives and has some of the same extended attributes as NTFS, but with less overhead
Arrange the following values in increasing speed (slowest to fastest):
Kbps, Mbps, Gbps, Tbps
What is the physical address of a network interface called?
MAC address
A programmer's task is to analyze a colleague's pseudocode and make it better. What will the programmer try to do?
Make it more compact and efficient
What type of language consists primarily of a series of nested tags?
Markup
What's a true statement about markup languages?
Markup languages are not programming languages
Which of the following is NOT considered to be a measurement of file size?
MicroByte
Which of the following computer components does an "all-in-one" workstation contain within the monitor case?
Microphone
Which is NOT an example of a Relational Database Management Systems (RDBMS)?
Microsoft Office Excel
What's the difference between scripted and scripting languages?
Scripting languages are for configuring an operating system
What should a user do before installing a driver from a third-party website?
Search the web for references of the driver's legitimacy and reputation
In the area of workplace surveillance, what is monitoring data communications and employee's behavior called?
Security assurance
Data encryption, firewalls, and backups are examples of what?
Security controls
Which statement holds true about a desktop/workstation when comparing it to a server?
Servers use the same type of components as a desktop
What type of process is the Windows Task Scheduler?
Service
What do the instruction in this pseudocode do? declare Animal(9) as String For i = 0 to 9 If i > 5 Then Animal(i) = "dog" Else Animal(i) = "cat" End If Next
Set the first 6 elements of the array Animal to "cat", and the rest to "dog".
A home network needs its second printer set as the default printer. The computer runs Windows 10 version 1809. Which page contains the relevant options to complete the setup?
Settings/Devices
A user installs a software application for free, and it displays a 30-day countdown until the user must register it and receive additional features. What type of license is this?
Shareware
Which of these is NOT a form of malware?
Software
An access point is set up in a small home office. What is the best setting for the SSID (Service Set ID)?
Something unique to the network but without personal information
An essential part of troubleshooting is to establish a plan of action to eliminate the root cause without destabilizing some other part of the system. What needs to be in the plan of action?
Steps required to implement the solution
A package-delivery service is working with address information, which contains a house number and a street name. What is the best data type to use for the house number?
String
In addition to making a copy of an entire database, a program can invoke the SQL (Structured Query Language) BACKUP command to work at which level?
Table
Which device is likely to use ARM (Advanced RISC Machine) CPU (Central Processing Unit)?
Tablet
For enterprise networks with very large amounts of data to backup, which is the best to implement?
Tape drives
What is the purpose of Task Scheduler?
Task Scheduler is used to schedule tasks to run at a specific time.
What are the two interfaces used for configuring input devices?
The Settings app and Control Panel
A student is replacing an old computer with a new one, with the help of an external hard drive to transfer the contents of the old computer. The external hard drive arrives with an enclosure. What is the purpose of the enclosure?
The enclosure provides ports to connect the drive to the computer
What is an advantage of the float data type compared to the integer data type?
The float data type is not limited to whole numbers
What three elements are required for a computer to perform useful tasks?
The hardware, software, and the computer's user.
Which best defines throughput rate of a device at any given time?
The measurement of data transferred between computers over a network.
What are the two important components that can be increased to improve video?
The number of pixels and the refresh speed
In a SQL (Structured Query Language) command, what does the WHERE clause determine in the result set?
The number of rows
How does Plug-and-Play Installation work?
When a user connects a new device, Windows identifies it and attempts to install a new device driver.
A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice?
Write a company policy and procedure for escorting visitors
When troubleshooting a computer for a specific issue, what information do you need when searching the internet for possible solutions?
You should obtain the computer model in order to find solutions related to your specific computer.
Which of the following declarations represents a 2-dimensional array?
declare Animal(9,9) as String
A computer program contains a boolean variable. What are the stored values of this variable?
0,1
How much storage does a character data type use?
1 byte
Which numbers does this pseudocode display? declare i as Number = 10 Do While i > 0 If i < 7 Then i = i - 1 End If print i i = i - 1 Loop
10, 9, 8, 7, 5, 3, 1
What is the fastest downlink speed that the typical cable Internet service providers offer to their customers?
100 Mbps
Which of the following represents the largest amount of storage capacity?
10000 TB
Convert the decimal number 35 into binary notation.
100011
How many different values can original, non-extended ASCII (American Standard Code for Information Interchange) express?
128
Which of the following does NOT follow accepted MAC (Media Access Control) address format?
192:168:0.10/100
Convert the hexadecimal number 16 into decimal notation
22
What is the maximum transfer rate for the Firewire standard which uses 6-pin "alpha" connectors and cabling?
400 Mbps
What does 5 GB (GigaBytes) memory mean in the context of the Microsoft Windows operating system?
5120 MB
Convert the binary number 1000000 into decimal notation
64
A laptop built a year ago is likely to have which CPU (Central Processing Unit)?
64-bit
What does this pseudocode declare? declare MinutesPerHour as Number = 60
A constant
A table contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What does the table need, to make sure that the Email field contains the symbols "@" and "."?
A constraint
Which of the following best describes containers and identifiers?
A container is a type of identifier
Which of the following poses a higher risk to ensuring business continuity?
A converged network
Which is an example of a Human Interface Device (HID)?
A customer uses a keyboard to enter a username and password into a shopping application.
What is true about firewalls?
A firewall provides a way to restrict access to a computer or network
An employer fires an end-user for hijacking another employee's user account. Which of the following does NOT provide non-repudiation to the employer?
A guest user account
Select the best example of using dual monitors with multiple windows in Extended mode:
A programmer writes HTML code on one monitor and tests the web page changes in a browser on the other monitor
How does a search engine work?
A search engine usually works by compiling a database of information about web pages
When considering application interaction, an example of programmatic access can be best defined as what?
A software application that can interact with a database either using SQL commands or using SQL commands stored as procedures in the database
Which of the following authentication factors is an example of something you have?
A software token
Which of the following is the best example of variety of data in a database?
A table with a string, number, and date fields
When using web search engines, why should privacy considerations affect a user's decisions?
A user's web searches can reveal very valuable information
What's a true statement about variables?
A variable can have any data type that the programming language supports
Which of these is a NOT a "generation" of cellular Internet services?
ARP
A home office with 3 networks uses devices, which include 2 desktops, 4 laptops, 5 smartphones, 3 tablets, and a wireless printer. What device switches the communication between the wired and wireless networks in this office?
Access point
Which of these is an access control?
Accounting
What type of access control and technology helps ensure non-repudiation, and tracks what users are doing on the network?
Accounting; logs
A website visitor realizes that an important notification is not showing because the browser has a pop-up blocker. What's the best thing to do?
Add an exception for this website
A Customer object has a field called EmailAddress. Other programs need to have frequent access to this field. What is the best way to set up this field?
As a property of the Customer object
How does an object store its attributes?
As private variables
How do the CPU (Central Processing Unit) and storage devices in a computer process data?
As zeros and ones
What type of language is the most difficult to follow?
Assembly
What do we call loss of strength of a wireless signal?
Attenuation
What is the basic unit of computer data?
Bit
Which of the following enable you to create segments of code that you can reuse?
Both procedures and functions.
If a password is short and non-complex, what type of attack can it be vulnerable to?
Brute force
What type of software is project management software?
Business software
How is business software different from productivity software?
Business software is for a particular process, and productivity software is for general office functions
You created a folder called MyFiles under the root in a Windows file system. How would that folder be identified?
C:\MyFiles
What is an advantage of using CLI (Command Line Interface) instead of GUI (Graphical User Interface)?
CLI takes up less system resources to run
Which of the following SQL (Structured Query Language) commands can run with just one parameter?
CREATE DATABASE
Of the following, which language is typically used with markup language?
CSS (Cascading Style Sheets)
An Employee object includes the following fields: Name Address Phone Age DateOfBirth Salary Which of the following is NOT a good example of a method in this object?
CalculateSalesTax, which multiplies two numbers (input as variables) and returns the result to the calling program
Which wireless Internet service does a computer use when it connects by tethering?
Cellular radio
A system administrator is installing a new wireless access point (AP). During installation, the administrator should make sure to complete which of the following?
Change the default password
Which best defines Access Control on a computing device?
Controlling who has the ability to use the device, or information stored on the device.
What is a key difference between copyright and a patent?
Copyright protection happens automatically, but a patent must be applied for and registered
A relational database has a table, Customers, which contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to keep track of customer's purchases in this database?
Create 2 new tables: Products and Purchases
A table contains information about the company's customers. The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to set up a primary key for this table?
Create a new field called Id
A file contains information about the company's customers. The information includes Name, Address, Phone, and Email for each customer. What's the best way to convert this file into a database?
Create a table called Customers, with fields called Name, Address, Phone, and Email
When does a new creation become "copyrighted"?
Creations are copyrighted immediately upon creation.
What is the advantage of DAS (Direct Attached Storage) over NAS (Network Attached Storage)?
DAS is less expensive
A database administrator needs to extend a table with another column. What method contains the commands to do that?
DDL (Data Definition Language)
A web application needs to make changes to the contents of a table in a database, in response to a user's input. What method contains the command to do that?
DML (Data Manipulation Language)
A database administrator is looking to remove a table from a database using Data Definition Language (DDL) commands. Which of the following would achieve only this result?
DROP
Which of the following SQL (Structured Query Language) is NOT a DML (Data Manipulation Language) command?
DROP
What is the advantage of using DSL (Digital Subscriber Line) over fiber optic in a SOHO (Small Office Home Office)?
DSL is more easily available to individual homes
Which of the following is an example of an optical drive?
DVD
Besides Video Graphics Array (VGA), what graphic device interface supports analog equipment?
DVI-I
Which type of data uses whole disk encryption?
Data at rest
The information layer of data analytics requires software to perform which function?
Data correlation
What is an example of "processing" in a computer system?
Data is written to memory and manipulated by the CPU
Why is RAM an example of a volatile storage device?
Data stored in RAM is only stored as long as there is a power source sending constant power to the chip.
Why is it important to write data to a storage device, such as a hard disk?
Data stored in system memory is only preserved while the computer is powered on.
An attacker used hosts compromised with bot malware to launch a coordinated attack against a web service to overload it. Which of the following is the active attack threatening web service availability to your users?
Denial of Service (DoS)
Which of these is NOT a social engineering attack?
Denial-of-service
Which of these is an Availability concern?
Destruction
In an application's properties, which tab is useful for troubleshooting as it will let you know whether you are running a version with the latest patches?
Details
What is used to prove a program was created by a trustworthy software publisher?
Digital certificate
What is a downside to digital products?
Digital products are easy to copy and steal
A guest at a friend's home needs to use the friend's computer for a few hours to browse the Internet and send out some emails/ The browser has many extensions and plug-ins which slow down page loading. What should the guest do with the add-ons?
Disable
Which feature of IoT (Internet of Tings) for motor vehicles uses a component of IoT home automation?
In-vehicle entertainment
Which best defines ergonomics?
Ergonomics is the study of factors affecting the performance of people at work.
What is the end result of the iterative process of establishing and testing a theory while troubleshooting?
Establish a root cause for the problem
Which file system allows a file with the name "Encyclopedia:Volume 1.txt"?
Ext4
Which of these is a protocol used to upload and download files between clients and servers?
FTP
Which term refers to technologies that help ensure data is available in the event of hardware failure?
Fault tolerance
Which of the following encrypts data at rest?
File-level encryption
You have been given the task of installing a new printer for a client. The printer is NOT a plug and play device. How would you proceed?
Find and install the driver. Check first to see if it has been included with the printer. Otherwise, check the Windows Update website. If it isn't there, check the vendor's website.
USB and thumb drives are examples of which type of storage device?
Flash memory
What storage technology do SSDs (Solid State Drives) use?
Flash memory
What does a programmer use to visualize a program sequence?
Flow chart
What is the term for the processing speed of 1 billion cycles per second?
GHz
Which is a true statement about a GPU (Graphics Processing Unit)?
GPU works with the CPU to handle complex high-resolution images
The direct database access method is the best method to run which SQL (Structured Query Language) command?
GRANT
What is an example of a cloud hosted application?
Google mail
What indicates that a website has a highly trusted certificate?
Green padlock icon in front of address bar
Mobile devices detect the device's movement by using accelerometers and what other device?
Gyroscopes
An office computer needs a new keyboard and mouse. Before ordering them, the assistant should check which ports are available, to decide which style to purchase. Which port is NOT part of the consideration?
HDMI
Which rptocol supports interactive mechanisms GET and POST?
HTTP
Why do laptops use a heat spreader instead of heatsinks in their cooling system?
Heatsinks are bulky objects with a lot of height
Which notation is a more efficient method to express large numbers?
Hexadecimal
The system administrator just found out that a user has been using the same password for the last two years. Which of the following password best practices should the system administrator enforce?
History/expiration
What are the four functions which represent most of the ways that data moves through a computer system?
Input, output, processing, and storage
Which of these is a protocol to allow a mail client to download message from a mail server?
IMAP
An office building is using a Wi-Fi access point. The computer uses to configure the access point's device options is located on the other side of the building. What does a technician need to make it work?
IP address of the web configuration page
What is the difference between the address length of IPV4 (Internet Protocol version 4) and IPV6 (Internet Protocol version 6)?
IPV4 addresses are 32 bits, and IPV6 addresses are 128 bits
A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling confidential information?
IT security training
An employee makes unauthorized copies of customer Social Security numbers, saves them in an unencrypted spreadsheet, and transfers them to the employee's personal email account. The employee then opens new credit card accounts with this information and uses the cards to buy personal items. Which of the following did NOT occur?
Identity checks
An attacker captures password packets to figure out a user's password to gain access to a host on a corporate network, and masquerades as that user. Which of the following is a threat to integrity that describes this attack?
Impersonation
If a system goes down, which of these will NOT help recover from data loss due to a natural disaster?
Implementing a Redundant Array of Independent Disks (RAID)
A table in a relational database receives imported data from a text document. In what format does the table store the new data?
In a structured way
Which of the following does NOT encrypt web page data?
Mobile device encryption
If the password policy for a company requires a user to authenticate with a smart card certification as well as with a PIN, what is this type of authentication?
Multifactor
Radio Frequency ID (RFID) is a means of tagging and tracking objects using specially-encoded tags. What is a peer-to-peer version of RFID?
NFC
Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing?
Network redundancy
When does this pseudocode execute the print command? If i== 0 AND i ! = 0 Then print "Yes" End If
Never
Why is scalability an important consideration when choosing to use a database instead of a flat file?
Nonscalable systems increase their costs at the same rate as the number of users that they support
In the context of programming languages such as JAVA, what does the acronym OOP best represent?
Object-Oriented Programming (OOP)
Where does the Central Processing Unit (CPU) live in a computer?
On the motherboard
The accountant of a small company uses a database application to maintain the list of vendors, their services, and their invoices to the company. The application uses Microsoft Access for the database layer, with the front-end interface layer in Visual Basic, to work with the data and to generate custom reports. What is the application architecture of this system, which resides on the accountant's desktop computer?
One-tier
Why do companies pay for a software license subscription plan instead of a less expensive one-time purchase?
One-time purchases do not include full-feature upgrades
What is the difference between DropBox and OneDrive?
OneDrive is built into the Windows OS
What's a true statement about the assembly language?
Only specialists use assembly code
Why would a business choose satellite service instead of DSL (Digital Subscriber Line)?
Satellite systems provide bigger areas of coverage
When a user has multiple passwords for different services, which of the following can help prevent the user from having to remember all of these passwords or from using the same password for each service?
Password managers
What do we call an online network where instead of a central server; each client contributes resources to the network?
Peer-to-Peer
Which of the following helps to authenticate the user requesting a password reset over the telephone?
Personally Identifiable Information (PII)
Which of the following exposes to a Man-in-the-Middle (MitM) attack?
Plain text
A new scanner is purchased for the office, and the technician is using a disk with driver software instead of Plug-and-Play. What is the most likely reason?
Plug-and-Play installation did not work for this scanner model
Which of these is the name for a type of an add-on for a web browser?
Plug-in
Which of these is NOT a form of a multitouch gesture?
Poke
Which of the following would NOT be defined as an input device?
Printer
Which of these is a Disaster Recovery concern?
Prioritization
A workstation experiences slowdowns while running Microsoft Word. The program does not respond to attempts to close it, therefore the user executes the Task Manager utility to quit the program. What does this fall under?
Process management
What does this pseudocode do? declare i as Number = 0 Do While i <= 100 i = i + 1 print i i = i - 1 Loop
Produces an infinite loop
What type of software is Microsoft Office?
Productivity software
What is the main cause of memory leaks?
Programming errors
A senior manager of a regional office branch needs a payroll report of all staff, to calculate next year's budget. Which program is NOT useful for that?
Project management software
In theory, it is possible to read the information in each table of a database manually. What tool can be used to view information more efficiently?
Queries
What type of language has working with datasets as its primary purpose?
Query
What's a true statement about query languages?
Query language code does not need to be compiled
CompTIA's troubleshooting model includes having to establish a theory of probably cause. What is one of the components of this step?
Question the obvious
Which Redundant Array of Independent Disks (RAID) has only striping with parity?
RAID 5
What does a PC (personal computer) need more of to open more programs simultaneously and work on large files more efficiently?
RAM
Select the one UNTRUE statement in regard to system memory.
RAM is random access memory and is non-volatile storage.
What port does an Ethernet network adapter use?
RJ-45
A user needs to backup a 6 GB (GigaByte) video file from a Windows desktop to a new 64 GB flash drive. An error message warns that the file cannot copy over to the flash drive, due to file size limitations. What does the user need to do?
Reformat the flash drive into NTFS
What type of database uses a schema?
Relational
What is an advantage of a relational database over a key/value pair database?
Relational databases have query languages to retrieve data
What is a clean uninstall
Removing files and settings manually
A manager requests to see the information on all of the company's customers, listed by geographical regions, with the totals of purchases made by each customer. What is the best tool to produce this list?
Report
Which of the following will NOT help prevent the attachment of portable personally owned devices, such as smartphones and Universal Serial Buses (USBs)?
Requiring a fob
What is the second step in CompTIA's troubleshooting model?
Research knowledge base/Internet, if applicable
Which of these practices is unsecure as your security becomes dependent on other organization's security measures?
Reusing across sites
What is the correct SQL (Structured Query Language) command to read information from a table?
SELECT
What does a database dump contain?
SQL statements which can recreate all tables
What is a true statement about permissions in a database which uses SQL (Structured Query Language)?
The owner of the database object has complete control over that object
What is the difference between a software product key and a product ID?
The product key activates the software, and the product ID is for technical support
What would be considered a downside to producing digital products?
They are easy to copy and steal.
Why are USB (Universal Serial Bus) thumb drives non-volatile?
They retain data without power
How can a user belong to a group account and inherit security permissions in a workgroup?
Through privileges allocated to the groups
What uses the same physical interface as MiniDP (mini DisplayPort format)?
Thunderbolt
Which of the following is Task Manager commonly used for?
To end an unresponsive process that cannot be closed from the application window itself
What is the best reason to use a flat file instead of a database?
To exchange information between systems
A web application contains a form, which users fill out. What is the most likely use for this form?
To manually input data into a database
Why would a locally installed application store data files in a user folder and not the application folder?
To prevent users from modifying application folders
What is the main purpose of NIC (Network Interface Card) expansion card?
To provide additional NICs to servers on a wired business network
Why would you virtualize an environment?
To use hardware and software resources effectively, as well as potentially to save time and money.
What should a company that's trying to promote its goods and services have on its name and/or logo to protect it from imitators?
Trademark
Which of the following ways best defeats social engineering?
Training end-users how to identify and report suspicious activity on the network or workstation
Which best describes an Information Technology (IT) system?
When a system processes, stores, and transfers information.
A user installs VirtualBox on a Linux OS (operating System). Which class of hypervisor is it?
Type II, because VirtualBox is a software application within a host operating system
An older digital camera without wireless networking support is malfunctioning, so the photos need to be backed up to the computer. Which port on the computer can the camera owner use?
USB
Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?
USB 3.0
What type of connector does Thunderbolt 3 use?
USB-C
Which Unicode character encoding standard do most websites use?
UTF-8
What does the motherboard determine about a desktop computer?
Upgrade potential
What is the easiest way to install a standard mouse, and configure it to use basic settings?f
Use Control Panel/Settings
A user wants the easiest and most secure way to prevent websites from discovering the IP (Internet Protocol) address of the computer. What should the user do?
Use a Virtual Private Network
How can you modify your File Explorer options to allow you to view hidden files?
Use the View tab under the File Explorer Options applet
A complex software application collects requests from general users for certain sets of data through a form, connects to a Microsoft SQL (Structured Query Language) Server database with ODBC (Open Database Connectivity), submits the criteria for the data query, receives the results, and displays them to the users as a report on the screen. Which combination of database access methods best describes this process?
User interface and programmatic access
What is NOT one of the features of an application virtualization software such as Citrix XenApp, which installs on a network server instead of individual workstations?
Users can use the application without a network connection
What is an example of using a locally installed application without network access?
Using Microsoft Word to write a letter
Which of the following helps protect against dangerous unsolicited email file attachment threats?
Using anti-malware
Which of the following is NOT considered a best practice for installing software?
Verify the software was created in the country which you live in.
The person reporting a problem is likely to be the main source of information about it. However, if this is insufficient to successfully troubleshoot, what is a good next step to take?
View log files
A company operates in 2 offices. Both offices are located in the same town, with about 100 employees in each building. What type of network does it need to connect all of its employees, LAN (Local Area network), or WAN (Wide Area Network)?
WAN, because there are multiple locations
What is the difference between WPA (Wi-Fi Protected Access) and WPA2 wireless encryption standards?
WPA2 uses Advanced Encryption Standard
Which of the following is an example of a compressed file format?
zip