Search Header Logo

CompTIA ITF+ Multiple Answer Questions

Authored by Gabriella Stevens

Computers

9th - 12th Grade

CompTIA ITF+ Multiple Answer Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following can be configured at the border of your network to control the flow of network traffic and protect systems from unauthorized network connections? (Select two.)

Windows Defender

Anti-malware software

Proxy servers

Host firewalls

Network firewalls

Answer explanation

Network firewalls are configured at the border of your network; this is where the internet connection is. Proxy servers can be configured as network firewalls as well.

Host firewalls are installed on individual computer systems and can protect only that system and not the network.

Anti-malware software is installed on computer systems to detect and prevent malware infections. It does not control the flow of traffic or protect systems from unauthorized network connections.

Windows Defender is anti-malware software installed and enabled by default on Windows systems. It is not designed to serve as a firewall.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A system administrator needs to update a printer driver on the few remaining Windows 7 company laptops. Microsoft no longer offers support for Windows 7, so the administrator has found a third-party website with the driver available for download.

Which of the following should the administrator do before downloading and installing the driver? (Select two.)

Run a checksum on the driver package file and compare it against the one provided by the third party.

Check online forums for others who have tried installing the driver.

Make sure that the driver is being downloaded over a secure HTTPS connection.

Make sure the OS (operating system) is up to date with the latest patches.

Search for references from others on the website's validity.

Answer explanation

When downloading drivers from third-party sites, you should research as much as possible before downloading or installing the driver. You should check for references from others to make sure there are no warnings and that the website is valid.

You should try checking out forums or searching for reviews from others who have tried installing the driver package to see if there are issues or if the driver is legitimate.

Because Windows 7 is no longer supported, there may not be any patches available. And patching the OS does not have any impact on driver legitimacy.

Running a checksum on the file and comparing the generated string against the one provided by the third party simply makes sure that your copy of the file is genuine and error free. It does not indicate whether the driver is valid or legitimate.

While HTTPS ensures that the data being transmitted is encrypted, it would not help the administrator determine if the driver is valid or legitimate.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following devices normally provide a mini-USB (Universal Serial Bus) or micro-USB connector? (Select three.)

Digital camera

Tablet

Printer

Smartphone

Game console

Answer explanation

Devices such as digital cameras, tablets, and smartphones normally provide a mini or micro-USB connector.

Devices such as printers, game consoles, home audio/visual receivers, and DVD players normally provide a USB-A connector (the standard USB connection).

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Before two computers can communicate over a network, some type of network media must be used to connect the computers together. Which of the following are examples of network media? (Select three.)

Radio signals

Fiber Optics

Copper Wiring

Network interface (adapter)

Near Field Communications (NFC)

Answer explanation

Copper wiring is an example of network media used to connect computers together.

Fiber optics is an example of network media used to connect computers together.

A radio signal is an example of network media used to connect computers together.

A network interface (adapter) provides the receptacle (port) for connecting computers together, but it is not the network media that actually does the connecting.

Near Field Communications (NFC) is a technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store. However, it is not designed to connect computers together.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are legitimate sources for obtaining software installation files for a device? (Select three.)

APKs (Android Packages)

Google Play store

Authorized resellers

Merchant app stores

Answer explanation

Authorized resellers, merchant app stores (such as Amazon App Store), and the Google Play store all have stringent tests that need to be passed before any software is offered for download. These are legitimate, trusted sources for obtaining software installation files.

APKs (Android Packages) are available from sources outside the Google Play store. While some APKs are legitimate and can be installed safely, others are vulnerable to viruses and malware, especially if you download them from an untrusted website.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?