Search Header Logo
Most Missed ITF Practice Test 03 (Saenz)

Most Missed ITF Practice Test 03 (Saenz)

Assessment

Presentation

Computers

10th Grade

Practice Problem

Hard

Created by

Pedro Saenz

Used 3+ times

FREE Resource

44 Slides • 22 Questions

1

media

2

Multiple Choice

What should a user do to protect sensitive information when working on a public workstation?s?


1

Clear the browser cache.

2

Disable cookies

3

Enable pop-up blocker

4

Set up a firewall:

3

media

4

media

5

Multiple Choice

A user installs VMWare Workstation on a Windows OS (Operating System). Which class of hypervisor is it?

1

Type II, because VMWare is a software application within a host operating system

2

Type II, because it connects to cloud-based virtualization tools

3

Type I, because VMWare manages the virtual machine environment

4

Type I, because the Windows OS is installed directly on the computer:

6

media

7

media

8

Multiple Choice

What does a database dump contain?

1

SQL statements which can recreate all tables

2

A formatted report of the contents of all tables:

3

A flat file with full contents of all tables

4

A hard disk with an exact copy of the database

9

media

10

media

11

Multiple Choice

For enterprise networks with very large amounts of data to backup, which is best to implement?

1

Tape drive

2

Peer-to-Peer (P2P)

3

Use of personally owned devices

4

Cloud storage only

12

media

13

media

14

Multiple Choice

What does bps measure?

1

Throughput rate

2

Processing Speed

3

Display Resolution

4

HDD Performance

15

media

16

media

17

Multiple Choice

Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode?

1

USB 3.0

2

USB 1.1

3

USB 2.0

4

USB 3.1

18

media

19

media

20

Multiple Choice

A Man-in-the-middle attack would be which of the following CIA concerns:

1

Confidentiality

2

Integrity

3

Availability

4

Authentication

21

media

22

media

23

Multiple Choice

The direct database access method is the best method to run which SQL (Structured Query Language) command?

1

GRANT

2

UPDATE

3

INSERT

4

SELECT

24

media

25

media

26

Multiple Choice

Which of the following will NOT help a network administrator avoid service unavailability due to one or more disks failing?

1

Redundant Array of Independent Disks (RAID)

2

Fault tolerance

3

Network Redundancy

4

Contingency Plan

27

media

28

media

29

Multiple Choice

Which of the following best describes their capacity in petabytes?

1

Cloud Systems

2

Hard disk drives

3

Storage Networks

4

Tape Drives

30

media

31

media

32

Multiple Choice

Which of the following is the most likely example of cross-platform software?

1

Application that runs on a Dell PC and a Samsung smartphone 


2

Application that runs on a Dell PC and a Samsung laptop

3

Application that runs on a Samsung tablet and a Motorola smartphone

4

Application that runs from the Chrome browser on a Dell PC and Safari browser on an iMac

33

media

34

media

35

Multiple Choice

Which type of data uses whole disk encryption?

1

Data at rest

2

A webpage

3

Data transmitted over a network

4

An email

36

media

37

media

38

Multiple Choice

Which of the following allows wireless devices to communicate to a wired network?

1

Access Point

2

Firewall

3

Router

4

Modem

39

media

40

media

41

Multiple Choice

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

1

Driver

2

USB Cable

3

Ink Cartridge

4

Permission

42

media

43

Multiple Choice

Which of the following is MOST likely used to represent international text data?

1

Unicode

2

Hexadecimal

3

Octal

4

ASCII

44

media

45

media

46

Multiple Choice

Which of the following filesystems would a Linux computer MOST likely use?

1

ext4

2

FAT32

3

NTFS

4

HFS

47

media

48

media

49

Multiple Choice

Convert the binary number 1000000 into decimal notation.


1

64

2

50

3

32

4

128

50

media

51

media

52

Multiple Choice

What is the end result of the iterative process of establishing and testing a theory while troubleshooting?

1

Establish a root cause for the problem

2

Resolve the problem

3

Ensure that the problem is never repeated

4

Identify the person responsible for creating the problem

53

media

54

media

55

Multiple Choice

A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what should the IT security department implement to prevent this type of mishandling of confidential information?

1

IT Security training

2

Acceptable Use Policy

3

CCTV surveillance cameras installed

4

Data monitoring

56

media

57

media

58

Multiple Choice

Which of the following types of authentication, if compromised, could potentially impact multiple services?

1

Single-Sign On

2

Single-Factor Authentication

3

Multi-Factor Authentication

4

Two-Factor Authentication

59

media

60

media

61

Multiple Choice

Which of the following does NOT encrypt web page data?

1

Mobile device encryption

2

Secure Socket Layer (SSL)

3

A transport encryption protocol

4

Hypertext Markup Language Protocol Secure (HTTPS)

62

media

63

media

64

Multiple Choice

A large payment website was breached recently. A user is concerned that the breach will affect account security on other sites. Which of the following password best practices would mitigate this risk?

1

password resuse

2

password history

3

password age

4

password expiration

65

media

66

media
media

Show answer

Auto Play

Slide 1 / 66

SLIDE