CompTIA-ITF+-Practice Tests 2
CompTIA-ITF+-Practice Tests 2
When trying to activate the operating system, a user receives a notice that the software is not
genuine. Which of the following security threats has occurred?
A. Social engineering
B. Phishing
C. Virus attack
D. License theft
Ans: D
Question 2:
A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the
following operating system types is required?
A. 8-bit
B. 16-bit
C. 32.bit
D. 64-bit
Ans: D
Question 3:
Which of the following operating systems is MOST likely to be found on a desktop where its
primary functions include professional video and audio editing?
A. Chrome OS
B. Windows 7 home
C. Mac OS X
D. IOS
Ans: C
Question 4:
Which of the following is MOST likely required during installation in order to legally install
software?
A. Automatic updates
B. Service level agreement
C. License key
D. Antivirus software
Ans: D
Question 5:
Which of the following alternative technologies allows a computer to run multiple operating
systems without partitioning the hard drive?
A. Web applications
B. Dual boot
C. Telepresence
D. Virtualization
Ans: D
Question 6:
Which of the following software types allows for the creation of a single file composed of
multiple subfiles, while at the same time reducing the overall size of the combined elements?
A. Database
B. Document sharing
C. Compression
D. Maintenance
Ans: C
Question 7:
A. Hard drive
B. CD-ROM/DVD-ROM
C. Flash drive
D. Tape
Ans: B
Question 8:
Joe, a technician, is asked to prevent users from playing games on corporate computers. Which
of the following is the BEST way to accomplish this?
Ans: B
Question 9:
A peripheral device manufacturer has corrected a security flaw in its software and released a
patch. Which of the following is the QUICKEST method to correct this flaw?
Ans: D
Question 10:
A user places a new desktop computer, monitor, and printer on the desk. Which of the following
is the NEXT step in completing the setup of the computer?
A. Install updates
B. Turn on the computer
C. Connect all cables to the computer
D. Configure antivirus software
Ans: C
Question 11:
Which of the following malware infections is responsible for locking data on a system in an
attempt to make the user pay a fee to unlock it?
A. Adware
B. Ransomware
C. Spyware
D. Trojan
Ans: B
Question 62:
A user set up a new computer and implemented cable management with very little slack on all
cabling. However, the workstation is shutting off intermittently. Which of the following issues is
MOST likely occurring?
A. The new surge protector used is not rated to handle the manufacturers workstation
B. The cable ties are loose and need to be adjusted
C. The computer may not have gone through its traditional burn-in period yet
D. The power cable could be too taut and is losing connection in the socket
Ans: D
Question 13:
A user is at the office and has a cellular phone that previously functioned properly. The phone is
powered on with a fully charged battery. However, the phone does not have connectivity. Which
of the following describes the problem?
Ans: D
Question 14:
Which of the following operating systems is very lightweight and relies heavily on Internet
applications?
A. Chrome OS
B. Windows
C. Linux
D. Blackberry OS
Ans: A
Question 15:
Which of the following operating systems is available for free and can be modified by anyone?
A. Windows
B. Linux
C. Mac OS
D. Chrome OS
Ans: B
Question 17:
Which of the following software package types is designed to accept input from multiple users?
A. Utility
B. Operating system
C. Specialized
D. Collaborative
Ans: D
Question 68:
Which of the following computer ports can be used for storage, video output, and peripherals?
A. HDIM
B. USB
C. VGA
D. eSATA
Ans: B
Question 19:
Joe, a technician, has discovered that his SOHO router does not include features that are listed on
the manufacturer’s website. Which of the following would allow Joe to enable these missing
features?
A user has purchased some new software from a vendor and wants to install it on all of the
Windows computers in the house. Which of the following will help the user accomplish the task
and ensure compliance with the software vendor?
A. .zip
B. .app
C. .iso
D. .pdf
Ans: B
Question 22:
A user learns of an operating system vulnerability that would allow a hacker to access the
computer. The user would like to keep the operating system up to date to prevent such
vulnerabilities from occurring. Which of the following should the user configure?
A. Additional OS features
B. Automatic updates
C. Software firewall
D. Anti-malware firewall
Ans: B
Question 23
Which of the following technologies allows people to communicate all over the world
inexpensively?
A. Virtualization
B. SSID
C. Kinetics
D. VoIP
Ans: D
Question 25:
A. SSID
B. SATA
C. SMTP
D. Gzip
Ans: A
Question 26
A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering
Ans: A
Question 27
A software developer develops a software program and writes a document with step-by-step
instructions on how to use the software. The developer wants to ensure no other person or
company will publish this document for public use. Which of the following should the developer
use to BEST protect the document?
A. Patent
B. Trademark
C. Watermark
D. Copyright
Ans: D
Question 28
Which of the following database concepts would MOST likely use a CSV file?
A. Data querying
B. Data reports
C. Data importing
D. Data persistence
Ans: C
Question 29:
A help desk technician encounters an issue and wants to find out if a colleague has encountered
the same issue before. Which of the following should the technician do FIRST?
Which of the following BEST describes the practice of providing user credentials when logging
on to the network?
A. Output
B. Storage
C. Input
D. Processing
Ans: C