ITF+ Exam 6

ITF+ Exam 6

9th Grade

74 Qs

quiz-placeholder

Similar activities

computers, input output devices, software, storage, cpu

computers, input output devices, software, storage, cpu

9th - 12th Grade

75 Qs

PC Troubleshooting

PC Troubleshooting

8th - 12th Grade

69 Qs

CompTIA A+ 220-1101 Practice Exam

CompTIA A+ 220-1101 Practice Exam

9th Grade - Professional Development

75 Qs

ITF+ Practice Exam 4

ITF+ Practice Exam 4

9th Grade

75 Qs

DIT Unit 4 Study Guide

DIT Unit 4 Study Guide

6th Grade - University

76 Qs

IT REVIEW

IT REVIEW

6th - 12th Grade

79 Qs

Google Certified Educator (Level 1)

Google Certified Educator (Level 1)

KG - University

73 Qs

ITF+ Exam 6

ITF+ Exam 6

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Eric Asel

Used 4+ times

FREE Resource

74 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following multifactor authentication methods is considered something you have?

Hardware token

Single sign-on

Geolocation

Password

Answer explanation

The multifactor authentication method considered something you have is a hardware token.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following database structures is the most granular?

Field

Column

Record

Table

Answer explanation

The most granular database structure is a Field, which represents the smallest unit of data in a database. It is more granular than a Column, Record, or Table.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following internet service types is most susceptible to weather disruptions?

Satellite

Cable

DSL

Fiber

Answer explanation

Satellite internet service is most susceptible to weather disruptions due to its reliance on signals being transmitted to and from satellites in orbit.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Salespeople roam around a retail store conducting transactions. Which of the following computing devices would be most ideal for point-of-sale transactions?

Cell phone

Workstation

Laptop

Thin client

Answer explanation

For point-of-sale transactions in a retail store, a cell phone would be the most ideal computing device for salespeople to conduct transactions while roaming around the store due to its portability and convenience.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A business provides access to the internet for customers through a lobby kiosk. After customers check their personal webmail, which of the following actions should customers immediately take to prevent others front accessing their email accounts on the kiosk?

Clear the browser cache.

Reset the browser's home page.

Change the webmail password.

Restart the kiosk

Answer explanation

To prevent others from accessing their email accounts on the kiosk, customers should immediately clear the browser cache after checking their webmail.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A corporate network just implemented a 60-day password-warning banner. Which of the following is most likely going to happen in 60 days?

Password expiration

Password reset

Password reuse

Password implementation

Answer explanation

In 60 days, the most likely to happen is password expiration due to the 60-day password-warning banner implementation.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small company lacks the resources to properly verify a user's identity when the user calls in for technical support. To which of the following is the company susceptible?

Social engineering

Snooping

Wiretapping

On-path attack

Answer explanation

The company is susceptible to social engineering because they lack resources to verify a user's identity, making them vulnerable to manipulation by attackers pretending to be someone they're not.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?