
CompTIA ITF Practice
Presentation
•
Instructional Technology
•
10th Grade
•
Practice Problem
•
Medium
Kathleen Sullivan
Used 32+ times
FREE Resource
0 Slides • 60 Questions
1
Multiple Choice
A global variable called `age` will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
String
Integer
Float
Double
2
Multiple Choice
A network has been infected with a worm. Which of the following would be the BEST security measures to take?
Update the IPS signatures
Update the network firewall
Update the malware definitions
Quarantine the network
Reset the network router
3
Multiple Choice
The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?
Private browsing is being used by some clients visiting the site
Client-side scripting has been deactivated on some clients visiting the site
Legacy browsers that do not support scripting are being used by some clients
Server-side scripting has been deactivated by the server administrator
4
Multiple Choice
A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?
Two-tier
n-tier
One-tier
Three-tier
5
Multiple Choice
Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?
Locally installed productivity software
Informational
intranet page
Managed relational database
Text file on a shared drive
6
Multiple Choice
Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?
Data capture and collections
Asset inventory inputs
Sales statistics
Average loss oupput
7
Multiple Choice
A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?
Internet application
Local application
Intranet application
Extranet Application
8
Multiple Select
A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)
Speakers
Printer
Webcam
Mouse
Display
9
Multiple Choice
A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?
SMTP
POP3
ICMP
IMAP
10
Multiple Choice
Which of the following is a reason why complex passwords are required?
To prevent someone from guessing them
To encourage password variety
To make them harder to remember
To reduce social engineering attacks
11
Multiple Choice
Which of the following storage types is MOST vulnerable to magnetic damage?
Flash
Optical
HDD
SSD
12
Multiple Choice
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
Method
Object
Property
Attribute
13
Multiple Choice
Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?
The SSID is not being broadcast
The key does not meet password complexity requirements
The router is operating on a different channel
The light switched do not support WPA2
14
Multiple Select
Which of the following are the primary functions of an operating system? (Choose two.)
Provide structure for file and data mangement
Provide user data encryption
Provide peer-to-peer networking capability
Provide system resources
Provide protection against malware and viruses
15
Multiple Choice
SQL databases use primary and foreign keys to enable which of the following?
Rows
Schemas
Fields
Relationships
16
Multiple Choice
Which of the following is a logical structure for storing files?
Shortcut
Folder
Permissions
Extension
17
Multiple Choice
Which of the following is both an input and output device?
Speaker
Microphone
Touch-screen monitor
Keyboard
18
Multiple Choice
A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?
Determine if anything has changed
Duplicate the problem, if possible
Determine if anything has changed
Document lessons learned
19
Multiple Choice
A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?
Password reuse
Password expiration
Password age
Password history
20
Multiple Choice
A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?
Backups
Prioritization
Indexes
Failover
21
Multiple Choice
A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?
Checking browser add-ons
Checking the proxy settings
Checking that caching is enabled
Checking certificate validity
22
Multiple Choice
A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?
Anti-malware
Device Manager
Host Firewall
Antivirus
23
Multiple Choice
To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user's workstation. Which of the following troubleshooting methodologies is being performed?
Question the obvious
Divide and conquer
Duplicate the problem
Research the knowledge base
24
Multiple Choice
A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user's needs ?
Fiber optic
T1 Line
DSL
Satelitte
25
Multiple Choice
Which of the following types of encryption would BEST protect a laptop computer in the event of theft?
HTTPS
Disk
VPN
26
Multiple Choice
Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?
Implement the solution
Question users
Verify functionality
Divide and conquer
27
Multiple Choice
A technician overhears a systems administrator mention the term `IOPS`. To which of the following operating system functions would the term BEST apply?
Service management
Application management
Disk management
Process management
28
Multiple Choice
Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?
Array
Vector
List
String
29
Multiple Choice
Which of the following would MOST likely use an ARM processor?
Workstation
Server
Tablet
Laptop
30
Multiple Choice
A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?
Set reminder to run the script
Set the system date and time
Perform task sheduling
Perform process man
31
Multiple Choice
Which of the following would indicate the FASTEST processor speed?
3.6Gbps
3.6Mbps
3.6MHz
3.6GHz
32
Multiple Choice
A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?
Wireless router
Cable modem
Access point
Network switch
33
Multiple Choice
The computer language that is closest to machine code is:
query language
scripting language
assembly langauge
markup langiage
34
Multiple Choice
Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?
Procedure
Record
Report
Column
35
Multiple Choice
Which of the following is an example of an interpreted language?
C++
Python
Java
Go
36
Multiple Choice
An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?
Full browser cache
Private browsing
Proxy settings
Script blocker
37
Multiple Choice
Which of the following filesystems would a Linux computer MOST likely use?
HFS
NTFS
FAT32
ext4
38
Multiple Choice
Which of the following concerns does installing cross-platform software address?
Licensing
Product key
Compatibility
Subscription
39
Multiple Choice
Which of the following requires the MOST frequent updating to remain effective?
Device driver
Antivirus
Host firewall
Web browser
40
Multiple Choice
Which of the following BEST explains the use of float over integer to store monetary values?
It accepts negative values
It stores symbols
It support decimals
It accommodates larger values
41
Multiple Choice
An IP address is 32 bits long. If converted to bytes, it would be:
4 bytes
8 bytes
16 bytes
64 bytes
42
Multiple Choice
Which of the following BEST describes the purpose of a vector in programming?
Storing a collection of data
Repeating a similar operation
Capturing user input
Performing mathematical calculations
43
Multiple Choice
Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?
WPA
WEP
Open
WPA2
44
Multiple Choice
Which of the following contains exactly four copper wires?
RJ45
VGA
RJ11
USB
45
Multiple Choice
A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?
Replace the user's display
Update the PC's operating system
Replace the video cable
Install new video drivers
46
Multiple Choice
All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?
Server
Tape library
External HDD
Workstation
47
Multiple Choice
Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?
Authorized hacking
Behavior security
Information Identity Management
Unauthorized hacking
48
Multiple Choice
Which of the following is the BEST overall storage option for a laptop?
Solid state drive
Flash drive
Hard drive
SD card
49
Multiple Choice
A technician has worked through all steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT?
Escalate as necessary
Confirm the root cause
Establish a new theory
Gather information
50
Multiple Choice
A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?
Input validation
System updates
Password lockout
Login auditing
51
Multiple Choice
Which of the following is MOST likely to be considered protected personal information?
Medical Records
Property tax records
Court records
Genealogy records
52
Multiple Choice
A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:
confidentiality concerns
accounting concerns
integrity concerns
availability concerns
53
Multiple Choice
A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?
Record
Constraint
Field
Schema
54
Multiple Choice
The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?
Eavesdropping
Email service outage
Man-in-the-middle
Denial-of-service
55
Multiple Choice
Which of the following is an IP address?
0x64F32
00:0F:AC:17:2F:32
10010110
172.0.0.1
56
Multiple Choice
A developer is troubleshooting code in an application. The code is supposed to return the word `vegetables` if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?
If category id = 1 then 'Fruit' Else 'Vegetables'
If category id = 1 then 'Fruit' Else if category id = 2 then 'Vegetables' Else 'Candy'
If category id <> 1 then 'Vegetables' Else 'Fruit'
If category id = 1 then 'Fruit' Else if category id >= 2 then 'Vegetables' Else 'Candy'
57
Multiple Choice
Which of the following would allow an application to run automatically when a computer is started?
Processes
Drivers
Tasks
Journaling
Services
58
Multiple Choice
An organization exports an inventory database nightly. This is an example of:
database query
database report
database backup
database import
59
Multiple Choice
Which of the following is the number of bytes that is in 2KB?
1024
2048
2400
24800
60
Multiple Choice
A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?
Change the SSID
Change the default password
Change to WEP security
Create a guest network
A global variable called `age` will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?
String
Integer
Float
Double
Show answer
Auto Play
Slide 1 / 60
MULTIPLE CHOICE
Similar Resources on Wayground
56 questions
Viruses
Presentation
•
10th Grade
54 questions
Evidence for Evolution Notes & Review
Presentation
•
9th - 10th Grade
55 questions
Module 4/PT. 2: The Space Management System
Presentation
•
10th Grade
55 questions
Science 9 - Unit A Review Slides
Presentation
•
9th Grade
53 questions
Cell Cycle
Presentation
•
11th Grade
57 questions
Plant Cell Types
Presentation
•
11th Grade
58 questions
Chapter 29: Nervous and Endocrine system
Presentation
•
10th Grade
55 questions
E10 - GRAMMAR REVISION (U1 - 3)
Presentation
•
10th Grade
Popular Resources on Wayground
15 questions
Grade 3 Simulation Assessment 1
Quiz
•
3rd Grade
22 questions
HCS Grade 4 Simulation Assessment_1 2526sy
Quiz
•
4th Grade
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
20 questions
Math Review
Quiz
•
3rd Grade
Discover more resources for Instructional Technology
20 questions
Figurative Language Review
Quiz
•
10th Grade
20 questions
Earth Day Trivia
Quiz
•
9th - 12th Grade
10 questions
Earth Day Awareness and Impact
Interactive video
•
6th - 12th Grade
10 questions
Earth Day and Plastic Alternatives
Interactive video
•
5th - 10th Grade
5 questions
A.F/ST Quizizz Day 1
Quiz
•
9th - 12th Grade
100 questions
Biology EOC Review
Quiz
•
9th - 12th Grade
20 questions
Earth Day
Quiz
•
3rd - 12th Grade
16 questions
AP Biology: Unit 1 Review (CED)
Quiz
•
9th - 12th Grade