Search Header Logo

ITF+ Exam 6

Authored by Eric Asel

Computers

9th Grade

Used 4+ times

ITF+ Exam 6
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

74 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following multifactor authentication methods is considered something you have?

Hardware token

Single sign-on

Geolocation

Password

Answer explanation

The multifactor authentication method considered something you have is a hardware token.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following database structures is the most granular?

Field

Column

Record

Table

Answer explanation

The most granular database structure is a Field, which represents the smallest unit of data in a database. It is more granular than a Column, Record, or Table.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following internet service types is most susceptible to weather disruptions?

Satellite

Cable

DSL

Fiber

Answer explanation

Satellite internet service is most susceptible to weather disruptions due to its reliance on signals being transmitted to and from satellites in orbit.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

Cell phone

Workstation

Laptop

Thin client

Answer explanation

For point-of-sale transactions in a retail store, a cell phone would be the most ideal computing device for salespeople to conduct transactions while roaming around the store due to its portability and convenience.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A business provides access to the internet for customers through a lobby kiosk. After customers check their personal webmail, which of the following actions should customers immediately take to prevent others front accessing their email accounts on the kiosk?

Clear the browser cache.

Reset the browser's home page.

Change the webmail password.

Restart the kiosk

Answer explanation

To prevent others from accessing their email accounts on the kiosk, customers should immediately clear the browser cache after checking their webmail.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A corporate network just implemented a 60-day password-warning banner. Which of the following is most likely going to happen in 60 days?

Password expiration

Password reset

Password reuse

Password implementation

Answer explanation

In 60 days, the most likely to happen is password expiration due to the 60-day password-warning banner implementation.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small company lacks the resources to properly verify a user's identity when the user calls in for technical support. To which of the following is the company susceptible?

Social engineering

Snooping

Wiretapping

On-path attack

Answer explanation

The company is susceptible to social engineering because they lack resources to verify a user's identity, making them vulnerable to manipulation by attackers pretending to be someone they're not.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?