
Most Missed #1 from ITF+ Exam #2
Presentation
•
Computers
•
12th Grade
•
Practice Problem
•
Hard
Eric Asel
Used 7+ times
FREE Resource
23 Slides • 16 Questions
1
Most Missed from ITF+ Exam #2
2
Multiple Choice
Which of the following internet service types requires filters to be installed on telephone lines at the location?
Fiber
Satellite
DSL
Cable
3
Fiber is fast. Telephone lines are not fast. Fiber uses Fiber Optic cables. Not telephone lines.
It's not Fiber...
Some cable providers used telephone lines in the past but all Cable now goes through Coax, Ethernet, or Fiber cables.
It's not Cable...
Digital Subscriber Line (DSL)
4
Multiple Choice
Which of the following is used for assigning IP addresses to networking devices?
DHCP
DNS
SMTP
ARP
5
Here's a simplified breakdown:
Device Needs an IP: When a new device (like a laptop) joins the network, it broadcasts a message saying it needs an IP address.
DHCP Server Responds: A DHCP server (often your router) hears the request and offers a free IP address from its pool.
Device Accepts: The device grabs that specific IP address.
Configuration Delivered: The DHCP server also sends additional settings the device needs to connect properly.
Dynamic Host Configuration Protocol
(DHCP)
6
The Simple Mail Transfer Protocol is used for sending emails. It does not assign IP addresses
It's not SMTP...
The Domain Name System translates human-readable domain names, like google.com, to machine-readable IP addresses, like 173.194.217.100
It's not DNS...
Dynamic Host Configuration Protocol
(DHCP)
7
Multiple Choice
Which of the following would be the best design construct to allow developers to group functions and properties for reuse when designing an application?
Class
Function
Vector
Constant
8
Classes act as blueprints for creating objects. These objects contain both properties (data) and functions (methods) that define the object's behavior. By creating classes, you can encapsulate data and functionality together, promoting reusability and code organization.
Class.
9
The Person class defines the attributes(name, age, food) and the hello method that all Person objects share.
Each object(p1, p2, p3) is an instance of the Person class with its own unique values for name, age and food.
Both objects can use the hello method because it is defined within their class.
Class.
10
Constants are simply fixed values and don't contain functionality or behavior. Essentially, they are variables that don't change.
It's not a constant...
Functions are reusable blocks of code, but they don't inherently group properties along with them. They are typically used for specific tasks within a program.
It's not functions...
Class.
11
Multiple Choice
A technician needs to reconfigure the existing wireless network for a small company. Employees at the company report internet connectivity and calls drop when using wireless headsets to communicate. Which of the following configuration changes should the technician make to MOST likely resolve the issue?
update the SSID
restart the DHCP server
change the Wi-Fi channel
utilize a different frequency
12
Changing the wifi channel is the most targeted approach. Wireless headsets and Wi-Fi signals can sometimes interfere with each other, especially if they are on crowded channels. There are typically several channels available on the 2.4 GHz band, and by switching to a less congested channel, the technician can improve the signal quality for both the headsets and the internet connection.
Change the Wi-Fi channel
13
Restarting the DHCP server wouldn't directly affect wireless signal quality. While it's good maintenance practice, it's unlikely to solve the current connectivity issue.
It's not the DHCP server...
Changing the frequency (from 2.4 GHz to 5 GHz) could resolve the issue, but it might also disconnect older devices that don't support 5 GHz. It's a bigger change with a risk of causing new problems.
It's not about frequency...
Change the Wi-Fi channel
14
Multiple Choice
Which of the following programming languages is considered a low-level language with commands specific to the processor type used?
C#
Assembly
Python
XML
15
Assembly language uses instructions that closely resemble the machine code understood by the processor. It provides a way to program closer to the hardware with more control over specific processor functionalities.
Assembly Language.
16
All of these languages are considered High-Level languages.
They are designed to be more human-readable and independent of the underlying processor architecture.
It's not C#, Python, or XML...
Assembly Language.
17
Multiple Choice
A company is looking into ways to ensure only approved users are able to access the company website on devices. Which of the following would work BEST to achieve this goal?
configure proxy settings
disabling the browser cache
installing anti-virus extensions
creating certificates
18
Creating Certificates.
Creating certificates establishes a method for user authentication. Users would need to have a digital certificate installed on their device to access the website. This certificate would act as a form of electronic ID, ensuring only authorized users with the proper certificate can connect.
19
This wouldn't necessarily restrict access based on user identity. A proxy server can filter content, but it wouldn't typically be used for user authentication on a website.
It's not Configure Proxy Settings...
Creating Certificates.
20
Multiple Choice
A replay attack would be the primary concern of:
confidentiality
integrity
availability
authentication
21
Integrity.
In a replay attack, the attacker intercepts a valid communication and then replays it later. This can trick the receiver into thinking the message is legitimate, even though it's not.
22
Integrity.
Eavesdropping: An attacker intercepts the valid data transfer, like your bank transfer information. This could be done by hacking into unsecured Wi-Fi or sniffing network traffic.
Capturing the Data: The attacker captures the critical information in the transfer, such as the amount and recipient details.
Replaying the Data: Later, the attacker replays that captured data to trick the system into thinking it's a new, legitimate request. They might resend the bank transfer information to steal your money.
23
While a replay attack could potentially overwhelm a system with repeated requests, its main goal isn't to take down the system entirely.
It's not Availability??
The information being replayed was presumably not confidential already, otherwise interception wouldn't be possible.
Not encrypted = Not confidential
It's not confidentiality??
Integrity.
24
Multiple Choice
An end user reports seeing the old company intranet site and not the recently released updated version. Which of the following would MOST likely solve the problem?
Clear browser cache
check the proxy server
enable pop-up blockers
disable all add-ons
25
Clear the browser cache.
When a user visits a website, the browser stores local copies of files (like images or stylesheets) to improve loading speed on return visits. This can sometimes lead to an outdated version being displayed if the cached content hasn't been refreshed. Clearing the cache forces the browser to download the latest version of the website files.
26
Pop-up blockers are designed to prevent new windows from opening, not to affect the overall content of a webpage.
It's not pop-up blockers...
While a proxy server can affect internet traffic, it's less likely to be the culprit for an outdated intranet site specifically.
It's not about the Proxy,
this time...
Clear the browser cache.
27
Multiple Choice
A user clicks a link to a web page to view a document, but nothing happens. Which of the following is MOST likely the issue?
scripting is disabled
the web certificate is invalid
pop-up blockers are enabled
the security settings are too high
28
Pop-up blockers are enabled.
Pop-up blockers are designed to prevent new windows from opening when a link is clicked on. Usually when a link to a document is clicked on, that document would open up in a new tab on your web browser, or it would replace the current tab you have open. With pop-up blockers on, that action would be disabled.
29
Pop-up blockers are enabled.
It's not disabled scripting...
Scripting might be used for interactive features within the document, but it wouldn't necessarily prevent the document itself from loading or opening in a new tab.
30
High security settings might restrict certain actions, but they wouldn't necessarily prevent all clicks from working entirely.
It's not security settings...
An invalid certificate would typically display a warning message in the browser, not complete silence when clicking a link.
It's not the certificate...
Pop-up blockers are enabled.
31
Multiple Choice
Which of the following is the number of bits in 8KB?
8,000
16,000
32,000
64,000
32
About 64,000 bits
1 Byte = 8 bits
1KB = 1000 Bytes
8KB = 8000 Bytes
64,000 bits = 8KB
33
Review.
34
Multiple Choice
When developing a game, a developer creates a boss object that has the ability to jump. Which of the following programming concepts does jump represent?
Attribute
Property
Object
Method
35
Multiple Choice
A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo?
Copyright
Trademark
Patent
NDA
36
Multiple Choice
Which of the following storage devices have a spinning disk?
SSD
RAM
Optical Drive
ROM
37
Multiple Choice
The computer language that is closest to machine code is:
Query
Scripting
Markup
Assembly
38
Multiple Choice
A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?
DELETE
DROP
UPDATE
ALTER
39
Multiple Choice
A technician needs to install a wireless router for a client that supports the fastest speeds available and operates on the 5GHz band. Which of the following should the technician select?
802.11ac
802.11n
802.11ax
802.11b
Most Missed from ITF+ Exam #2
Show answer
Auto Play
Slide 1 / 39
SLIDE
Similar Resources on Wayground
31 questions
CRASE - 3° EM
Presentation
•
12th Grade
30 questions
Viruses
Presentation
•
12th Grade
30 questions
Rules of Exponents
Presentation
•
12th Grade
38 questions
Business Organizations
Presentation
•
12th Grade
33 questions
P.7A,B- Characteristics and Behaviors of Waves
Presentation
•
11th Grade
35 questions
Boolean L2
Presentation
•
KG
34 questions
G12 ML with teaching Q
Presentation
•
12th Grade
30 questions
Peramban dan Search Engine (TIK/Informatika)
Presentation
•
KG - University
Popular Resources on Wayground
15 questions
Grade 3 Simulation Assessment 1
Quiz
•
3rd Grade
22 questions
HCS Grade 4 Simulation Assessment_1 2526sy
Quiz
•
4th Grade
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
20 questions
Math Review
Quiz
•
3rd Grade
Discover more resources for Computers
20 questions
Earth Day Trivia
Quiz
•
9th - 12th Grade
10 questions
Earth Day Awareness and Impact
Interactive video
•
6th - 12th Grade
5 questions
A.F/ST Quizizz Day 1
Quiz
•
9th - 12th Grade
100 questions
Biology EOC Review
Quiz
•
9th - 12th Grade
20 questions
Earth Day
Quiz
•
3rd - 12th Grade
16 questions
AP Biology: Unit 1 Review (CED)
Quiz
•
9th - 12th Grade
5 questions
G.PC/DF Quizizz Day 2
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade