Search Header Logo
Most Missed #1 from ITF+ Exam #2

Most Missed #1 from ITF+ Exam #2

Assessment

Presentation

Computers

12th Grade

Practice Problem

Hard

Created by

Eric Asel

Used 7+ times

FREE Resource

23 Slides • 16 Questions

1

media

Most Missed from ITF+ Exam #2

2

Multiple Choice

Which of the following internet service types requires filters to be installed on telephone lines at the location?

1

Fiber

2

Satellite

3

DSL

4

Cable

3

Fiber is fast. Telephone lines are not fast. Fiber uses Fiber Optic cables. Not telephone lines.

It's not Fiber...

Some cable providers used telephone lines in the past but all Cable now goes through Coax, Ethernet, or Fiber cables.

It's not Cable...

Digital Subscriber Line (DSL)

4

Multiple Choice

Which of the following is used for assigning IP addresses to networking devices?

1

DHCP

2

DNS

3

SMTP

4

ARP

5

Here's a simplified breakdown:

  1. Device Needs an IP: When a new device (like a laptop) joins the network, it broadcasts a message saying it needs an IP address.

  2. DHCP Server Responds: A DHCP server (often your router) hears the request and offers a free IP address from its pool.

  3. Device Accepts: The device grabs that specific IP address.

  4. Configuration Delivered: The DHCP server also sends additional settings the device needs to connect properly.

Dynamic Host Configuration Protocol
(DHCP)

6

The Simple Mail Transfer Protocol is used for sending emails. It does not assign IP addresses

It's not SMTP...

The Domain Name System translates human-readable domain names, like google.com, to machine-readable IP addresses, like 173.194.217.100

It's not DNS...

Dynamic Host Configuration Protocol
(DHCP)

7

Multiple Choice

Which of the following would be the best design construct to allow developers to group functions and properties for reuse when designing an application?

1

Class

2

Function

3

Vector

4

Constant

8

Classes act as blueprints for creating objects. These objects contain both properties (data) and functions (methods) that define the object's behavior. By creating classes, you can encapsulate data and functionality together, promoting reusability and code organization.

Class.

9

The Person class defines the attributes(name, age, food) and the hello method that all Person objects share.


Each object(p1, p2, p3) is an instance of the Person class with its own unique values for name, age and food.


Both objects can use the hello method because it is defined within their class.

Class.

media

10

Constants are simply fixed values and don't contain functionality or behavior. Essentially, they are variables that don't change.

It's not a constant...

Functions are reusable blocks of code, but they don't inherently group properties along with them. They are typically used for specific tasks within a program.

It's not functions...

Class.

11

Multiple Choice

A technician needs to reconfigure the existing wireless network for a small company. Employees at the company report internet connectivity and calls drop when using wireless headsets to communicate. Which of the following configuration changes should the technician make to MOST likely resolve the issue?

1

update the SSID

2

restart the DHCP server

3

change the Wi-Fi channel

4

utilize a different frequency

12

Changing the wifi channel is the most targeted approach. Wireless headsets and Wi-Fi signals can sometimes interfere with each other, especially if they are on crowded channels. There are typically several channels available on the 2.4 GHz band, and by switching to a less congested channel, the technician can improve the signal quality for both the headsets and the internet connection.

Change the Wi-Fi channel

13

Restarting the DHCP server wouldn't directly affect wireless signal quality. While it's good maintenance practice, it's unlikely to solve the current connectivity issue.

It's not the DHCP server...

Changing the frequency (from 2.4 GHz to 5 GHz) could resolve the issue, but it might also disconnect older devices that don't support 5 GHz. It's a bigger change with a risk of causing new problems.

It's not about frequency...

Change the Wi-Fi channel

14

Multiple Choice

Which of the following programming languages is considered a low-level language with commands specific to the processor type used?

1

C#

2

Assembly

3

Python

4

XML

15

Assembly language uses instructions that closely resemble the machine code understood by the processor. It provides a way to program closer to the hardware with more control over specific processor functionalities.

Assembly Language.

16

All of these languages are considered High-Level languages.

They are designed to be more human-readable and independent of the underlying processor architecture.

It's not C#, Python, or XML...

Assembly Language.

17

Multiple Choice

A company is looking into ways to ensure only approved users are able to access the company website on devices. Which of the following would work BEST to achieve this goal?

1

configure proxy settings

2

disabling the browser cache

3

installing anti-virus extensions

4

creating certificates

18

Creating Certificates.

Creating certificates establishes a method for user authentication. Users would need to have a digital certificate installed on their device to access the website. This certificate would act as a form of electronic ID, ensuring only authorized users with the proper certificate can connect.

19

This wouldn't necessarily restrict access based on user identity. A proxy server can filter content, but it wouldn't typically be used for user authentication on a website.

It's not Configure Proxy Settings...

Creating Certificates.

20

Multiple Choice

A replay attack would be the primary concern of:

1

confidentiality

2

integrity

3

availability

4

authentication

21

Integrity.

In a replay attack, the attacker intercepts a valid communication and then replays it later. This can trick the receiver into thinking the message is legitimate, even though it's not.

22

Integrity.

Eavesdropping: An attacker intercepts the valid data transfer, like your bank transfer information. This could be done by hacking into unsecured Wi-Fi or sniffing network traffic.

Capturing the Data: The attacker captures the critical information in the transfer, such as the amount and recipient details.

Replaying the Data: Later, the attacker replays that captured data to trick the system into thinking it's a new, legitimate request. They might resend the bank transfer information to steal your money.

23

While a replay attack could potentially overwhelm a system with repeated requests, its main goal isn't to take down the system entirely.

It's not Availability??

The information being replayed was presumably not confidential already, otherwise interception wouldn't be possible.
Not encrypted = Not confidential

It's not confidentiality??

Integrity.

24

Multiple Choice

An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem?

1

Clear browser cache

2

check the proxy server

3

enable pop-up blockers

4

disable all add-ons

25

Clear the browser cache.

When a user visits a website, the browser stores local copies of files (like images or stylesheets) to improve loading speed on return visits. This can sometimes lead to an outdated version being displayed if the cached content hasn't been refreshed. Clearing the cache forces the browser to download the latest version of the website files.

26

Pop-up blockers are designed to prevent new windows from opening, not to affect the overall content of a webpage.

It's not pop-up blockers...

While a proxy server can affect internet traffic, it's less likely to be the culprit for an outdated intranet site specifically.

It's not about the Proxy,
this time...

Clear the browser cache.

27

Multiple Choice

A user clicks a link to a web page to view a document, but nothing happens. Which of the following is MOST likely the issue?

1

scripting is disabled

2

the web certificate is invalid

3

pop-up blockers are enabled

4

the security settings are too high

28

Pop-up blockers are enabled.

Pop-up blockers are designed to prevent new windows from opening when a link is clicked on. Usually when a link to a document is clicked on, that document would open up in a new tab on your web browser, or it would replace the current tab you have open. With pop-up blockers on, that action would be disabled.

29

Pop-up blockers are enabled.

It's not disabled scripting...

Scripting might be used for interactive features within the document, but it wouldn't necessarily prevent the document itself from loading or opening in a new tab.

30

High security settings might restrict certain actions, but they wouldn't necessarily prevent all clicks from working entirely.

It's not security settings...

An invalid certificate would typically display a warning message in the browser, not complete silence when clicking a link.

It's not the certificate...

Pop-up blockers are enabled.

31

Multiple Choice

Which of the following is the number of bits in 8KB?

1

8,000

2

16,000

3

32,000

4

64,000

32

About 64,000 bits

1 Byte = 8 bits

1KB = 1000 Bytes

8KB = 8000 Bytes

64,000 bits = 8KB

33

Review.

media

34

Multiple Choice

When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?

1

Attribute

2

Property

3

Object

4

Method

35

Multiple Choice

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo?

1

Copyright

2

Trademark

3

Patent

4

NDA

36

Multiple Choice

Which of the following storage devices have a spinning disk?

1

SSD

2

RAM

3

Optical Drive

4

ROM

37

Multiple Choice

The computer language that is closest to machine code is:

1

Query

2

Scripting

3

Markup

4

Assembly

38

Multiple Choice

A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

1

DELETE

2

DROP

3

UPDATE

4

ALTER

39

Multiple Choice

A technician needs to install a wireless router for a client that supports the fastest speeds available and operates on the 5GHz band. Which of the following should the technician select?

1

802.11ac

2

802.11n

3

802.11ax

4

802.11b

media

Most Missed from ITF+ Exam #2

Show answer

Auto Play

Slide 1 / 39

SLIDE