Search Header Logo
CompTIA ITF Practice

CompTIA ITF Practice

Assessment

Presentation

Instructional Technology

10th Grade

Practice Problem

Medium

Created by

Kathleen Sullivan

Used 29+ times

FREE Resource

0 Slides • 60 Questions

1

Multiple Choice

A global variable called `age` will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?

1

String

2

Integer

3

Float

4

Double

2

Multiple Choice

A network has been infected with a worm. Which of the following would be the BEST security measures to take?

1

Update the IPS signatures

2

Update the network firewall

3

Update the malware definitions

4

Quarantine the network

5

Reset the network router

3

Multiple Choice

The marketing department contacts the web development team and states that they are receiving inconsistent values in a newly launched form. Which of the following is MOST likely the problem?

1

Private browsing is being used by some clients visiting the site

2

Client-side scripting has been deactivated on some clients visiting the site

3

Legacy browsers that do not support scripting are being used by some clients

4

Server-side scripting has been deactivated by the server administrator

4

Multiple Choice

A company has installed an application that only requires a workstation to function. Which of the following architecture types is this application using?

1

Two-tier

2

n-tier

3

One-tier

4

Three-tier

5

Multiple Choice

Which of the following BEST describes a technology that allows multiple users to create and edit reports at the same time?

1

Locally installed productivity software

2

Informational
intranet page

3

Managed relational database

4

Text file on a shared drive

6

Multiple Choice

Meaningful and accurate reporting is essential to retailers in making business decisions while managing inventory. Which of the following offers the BEST assistance in generating reports?

1

Data capture and collections

2

Asset inventory inputs

3

Sales statistics

4

Average loss oupput

7

Multiple Choice

A business would like to create an employee portal that employees will have access to when they are at work. The employees will not be able to connect to the portal from home without a VPN connection. Which of the following types of application does this describe?

1

Internet application

2

Local application

3

Intranet application

4

Extranet Application

8

Multiple Select

A computer technician is assigned a ticket to install a laptop for a new employee. Due to the arrangement of the workspace, the employee requests that the laptop be installed with the cover closed. Which of the following would be required to satisfy this request? (Choose two.)

1

Speakers

2

Printer

3

Webcam

4

Mouse

5

Display

9

Multiple Choice

A company wants its employee to use an email client that downloads and removes messages from the email server. Which of the following protocols must be configured in the email client to facilitate this?

1

SMTP

2

POP3

3

ICMP

4

IMAP

10

Multiple Choice

Which of the following is a reason why complex passwords are required?

1

To prevent someone from guessing them

2

To encourage password variety

3

To make them harder to remember

4

To reduce social engineering attacks

11

Multiple Choice

Which of the following storage types is MOST vulnerable to magnetic damage?

1

Flash

2

Optical

3

HDD

4

SSD

12

Multiple Choice

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?

1

Method

2

Object

3

Property

4

Attribute

13

Multiple Choice

Concerned with vulnerabilities on a home network, an administrator replaces the wireless router with a recently released new device. After configuring the new device utilizing the old SSID and key, some light switches are no longer communicating. Which of the following is the MOST likely cause?

1

The SSID is not being broadcast

2

The key does not meet password complexity requirements

3

The router is operating on a different channel

4

The light switched do not support WPA2

14

Multiple Select

Which of the following are the primary functions of an operating system? (Choose two.)

1

Provide structure for file and data mangement

2

Provide user data encryption

3

Provide peer-to-peer networking capability

4

Provide system resources

5

Provide protection against malware and viruses

15

Multiple Choice

SQL databases use primary and foreign keys to enable which of the following?

1

Rows

2

Schemas

3

Fields

4

Relationships

16

Multiple Choice

Which of the following is a logical structure for storing files?

1

Shortcut

2

Folder

3

Permissions

4

Extension

17

Multiple Choice

Which of the following is both an input and output device?

1

Speaker

2

Microphone

3

Touch-screen monitor

4

Keyboard

18

Multiple Choice

A technician has successfully verified full system functionality after implementing the solution to a problem. Which of the following is the NEXT troubleshooting step the technician should do?

1

Determine if anything has changed

2

Duplicate the problem, if possible

3

Determine if anything has changed

4

Document lessons learned

19

Multiple Choice

A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?

1

Password reuse

2

Password expiration

3

Password age

4

Password history

20

Multiple Choice

A company is concerned with ensuring its databases are highly available. Which of the following can be used to increase database availability?

1

Backups

2

Prioritization

3

Indexes

4

Failover

21

Multiple Choice

A user revisits a website and receives a message that the site may not be secure. The user is prompted to click a link to continue to the site. Which of the following would MOST likely identify the issue?

1

Checking browser add-ons

2

Checking the proxy settings

3

Checking that caching is enabled

4

Checking certificate validity

22

Multiple Choice

A user wants to ensure port 3389 is open for remote desktop on a PC. Which of the following describes where the user should verify the port is open?

1

Anti-malware

2

Device Manager

3

Host Firewall

4

Antivirus

23

Multiple Choice

To establish a theory of probable cause, one technician investigates network issues in the server room while another technician troubleshoots the user's workstation. Which of the following troubleshooting methodologies is being performed?

1

Question the obvious

2

Divide and conquer

3

Duplicate the problem

4

Research the knowledge base

24

Multiple Choice

A remote user, who is working from home, requires significant bandwidth to connect to the corporate systems. Which of the following types of Internet service connections would BEST meet the user's needs ?

1

Fiber optic

2

T1 Line

3

DSL

4

Satelitte

25

Multiple Choice

Which of the following types of encryption would BEST protect a laptop computer in the event of theft?

1

HTTPS

2

Disk

3

Email

4

VPN

26

Multiple Choice

Which of the following tasks is typically performed during the identification phase of the troubleshooting methodology?

1

Implement the solution

2

Question users

3

Verify functionality

4

Divide and conquer

27

Multiple Choice

A technician overhears a systems administrator mention the term `IOPS`. To which of the following operating system functions would the term BEST apply?

1

Service management

2

Application management

3

Disk management

4

Process management

28

Multiple Choice

Which of the following is the BEST option for a developer to use when storing the months of a year and when performance is a key consideration?

1

Array

2

Vector

3

List

4

String

29

Multiple Choice

Which of the following would MOST likely use an ARM processor?

1

Workstation

2

Server

3

Tablet

4

Laptop

30

Multiple Choice

A systems administrator wants to run a script at a certain time every day. Which of the following is the BEST way to achieve this?

1

Set reminder to run the script

2

Set the system date and time

3

Perform task sheduling

4

Perform process man

31

Multiple Choice

Which of the following would indicate the FASTEST processor speed?

1

3.6Gbps

2

3.6Mbps

3

3.6MHz

4

3.6GHz

32

Multiple Choice

A gaming console needs to allow for inbound connectivity on a home network to facilitate chat functions. Which of the following devices is a user MOST likely to configure to allow this?

1

Wireless router

2

Cable modem

3

Access point

4

Network switch

33

Multiple Choice

The computer language that is closest to machine code is:

1

query language

2

scripting language

3

assembly langauge

4

markup langiage

34

Multiple Choice

Employee information is stored in a database. Which of the following BEST describes where all of an employee's information is stored?

1

Procedure

2

Record

3

Report

4

Column

35

Multiple Choice

Which of the following is an example of an interpreted language?

1

C++

2

Python

3

Java

4

Go

36

Multiple Choice

An employee's laptop does not connect to the Internet when it is used in a coffee shop. Which of the following is the MOST likely cause?

1

Full browser cache

2

Private browsing

3

Proxy settings

4

Script blocker

37

Multiple Choice

Which of the following filesystems would a Linux computer MOST likely use?

1

HFS

2

NTFS

3

FAT32

4

ext4

38

Multiple Choice

Which of the following concerns does installing cross-platform software address?

1

Licensing

2

Product key

3

Compatibility

4

Subscription

39

Multiple Choice

Which of the following requires the MOST frequent updating to remain effective?

1

Device driver

2

Antivirus

3

Host firewall

4

Web browser

40

Multiple Choice

Which of the following BEST explains the use of float over integer to store monetary values?

1

It accepts negative values

2

It stores symbols

3

It support decimals

4

It accommodates larger values

41

Multiple Choice

An IP address is 32 bits long. If converted to bytes, it would be:

1

4 bytes

2

8 bytes

3

16 bytes

4

64 bytes

42

Multiple Choice

Which of the following BEST describes the purpose of a vector in programming?

1

Storing a collection of data

2

Repeating a similar operation

3

Capturing user input

4

Performing mathematical calculations

43

Multiple Choice

Which of the following WiFi security options would create the MOST need for a VPN connection on the client device?

1

WPA

2

WEP

3

Open

4

WPA2

44

Multiple Choice

Which of the following contains exactly four copper wires?

1

RJ45

2

VGA

3

RJ11

4

USB

45

Multiple Choice

A technician replaces the video card in a user's PC. The user reports the resolution on the display seems very low, but the operating system will not let the user adjust it any higher. Which of the following steps would MOST likely fix this problem?

1

Replace the user's display

2

Update the PC's operating system

3

Replace the video cable

4

Install new video drivers

46

Multiple Choice

All users have access to an application at a company. The data from the application is stored on a centralized device located on the network. Which of the following devices would MOST likely be used to store the data?

1

Server

2

Tape library

3

External HDD

4

Workstation

47

Multiple Choice

Which of the following types of network security deals with deviations from the historic connection patterns and analysis of new threats to provide effective mitigation responses?

1

Authorized hacking

2

Behavior security

3

Information Identity Management

4

Unauthorized hacking

48

Multiple Choice

Which of the following is the BEST overall storage option for a laptop?

1

Solid state drive

2

Flash drive

3

Hard drive

4

SD card

49

Multiple Choice

A technician has worked through all steps of the troubleshooting methodology and has not been able to resolve the issue. Which of the following should the technician do NEXT?

1

Escalate as necessary

2

Confirm the root cause

3

Establish a new theory

4

Gather information

50

Multiple Choice

A web developer wants to ensure that a new web application is not vulnerable to brute-force attacks. Which of the following best practices is MOST useful to meet this goal?

1

Input validation

2

System updates

3

Password lockout

4

Login auditing

51

Multiple Choice

Which of the following is MOST likely to be considered protected personal information?

1

Medical Records

2

Property tax records

3

Court records

4

Genealogy records

52

Multiple Choice

A systems administrator downloads an update for a critical system. Before installing the update, the administrator runs a hash of the download and ensures the results match the published hash for the file. This is an example of:

1

confidentiality concerns

2

accounting concerns

3

integrity concerns

4

availability concerns

53

Multiple Choice

A database administrator created the outline for a database that describes its components and how they work. Which of the following did the database administrator create?

1

Record

2

Constraint

3

Field

4

Schema

54

Multiple Choice

The Chief Executive Officer (CEO) has received several emails that are missing attachments. Which of the following concerns is the CEO experiencing?

1

Eavesdropping

2

Email service outage

3

Man-in-the-middle

4

Denial-of-service

55

Multiple Choice

Which of the following is an IP address?

1

0x64F32

2

00:0F:AC:17:2F:32

3

10010110

4

172.0.0.1

56

Multiple Choice

A developer is troubleshooting code in an application. The code is supposed to return the word `vegetables` if the category id is only 2. However, the code is returning vegetables for all values except category id 1. Which of the following code statements would BEST correct the issue?

1

If category id = 1 then 'Fruit' Else 'Vegetables'

2

If category id = 1 then 'Fruit' Else if category id = 2 then 'Vegetables' Else 'Candy'

3

If category id <> 1 then 'Vegetables' Else 'Fruit'

4

If category id = 1 then 'Fruit' Else if category id >= 2 then 'Vegetables' Else 'Candy'

57

Multiple Choice

Which of the following would allow an application to run automatically when a computer is started?

1

Processes

2

Drivers

3

Tasks

4

Journaling

5

Services

58

Multiple Choice

An organization exports an inventory database nightly. This is an example of:

1

database query

2

database report

3

database backup

4

database import

59

Multiple Choice

Which of the following is the number of bytes that is in 2KB?

1

1024

2

2048

3

2400

4

24800

60

Multiple Choice

A WPA2 enterprise wireless network has been subject to several attacks within the last month. Which of the following would be the BEST option to improve the security of the network?

1

Change the SSID

2

Change the default password

3

Change to WEP security

4

Create a guest network

A global variable called `age` will be created in a program and incremented through the use of a function. Which of the following data types should be defined with the age variable?

1

String

2

Integer

3

Float

4

Double

Show answer

Auto Play

Slide 1 / 60

MULTIPLE CHOICE