100% found this document useful (1 vote)
1K views

CompTIA-ITF+-Practice Tests 2

This document contains 30 multiple choice questions about operating systems, security, and IT concepts. The questions cover topics like software licensing, virtualization, malware, updates, and networking. Correct answers are provided for each question.

Uploaded by

M3iat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

CompTIA-ITF+-Practice Tests 2

This document contains 30 multiple choice questions about operating systems, security, and IT concepts. The questions cover topics like software licensing, virtualization, malware, updates, and networking. Correct answers are provided for each question.

Uploaded by

M3iat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Question 1:

When trying to activate the operating system, a user receives a notice that the software is not
genuine. Which of the following security threats has occurred?

A. Social engineering
B. Phishing
C. Virus attack
D. License theft
Ans: D
Question 2:

A user wants to purchase a CAD application that requires 8GB of RAM to operate. Which of the
following operating system types is required?

A. 8-bit
B. 16-bit
C. 32.bit
D. 64-bit

Ans: D

Question 3:

Which of the following operating systems is MOST likely to be found on a desktop where its
primary functions include professional video and audio editing?

A. Chrome OS
B. Windows 7 home
C. Mac OS X
D. IOS

Ans: C

Question 4:

Which of the following is MOST likely required during installation in order to legally install
software?

A. Automatic updates
B. Service level agreement
C. License key
D. Antivirus software

Ans: D
Question 5:

Which of the following alternative technologies allows a computer to run multiple operating
systems without partitioning the hard drive?

A. Web applications
B. Dual boot
C. Telepresence
D. Virtualization

Ans: D

Question 6:

Which of the following software types allows for the creation of a single file composed of
multiple subfiles, while at the same time reducing the overall size of the combined elements?

A. Database
B. Document sharing
C. Compression
D. Maintenance

Ans: C

Question 7:

Which of the following storage media is intended for single-use backups?

A. Hard drive
B. CD-ROM/DVD-ROM
C. Flash drive
D. Tape

Ans: B

Question 8:

Joe, a technician, is asked to prevent users from playing games on corporate computers. Which
of the following is the BEST way to accomplish this?

A. Move the game files to a network share


B. Remove the games using the OS utility
C. Require all users to sign a company zero-tolerance gaming document
D. Rename the games folder to ‘Do Not Use”

Ans: B
Question 9:

A peripheral device manufacturer has corrected a security flaw in its software and released a
patch. Which of the following is the QUICKEST method to correct this flaw?

A. Replace the device


B. Power cycle the device
C. Reconnect the device
D. Update the device drivers

Ans: D

Question 10:

A user places a new desktop computer, monitor, and printer on the desk. Which of the following
is the NEXT step in completing the setup of the computer?

A. Install updates
B. Turn on the computer
C. Connect all cables to the computer
D. Configure antivirus software

Ans: C

Question 11:

Which of the following malware infections is responsible for locking data on a system in an
attempt to make the user pay a fee to unlock it?

A. Adware
B. Ransomware
C. Spyware
D. Trojan

Ans: B

Question 62:

A user set up a new computer and implemented cable management with very little slack on all
cabling. However, the workstation is shutting off intermittently. Which of the following issues is
MOST likely occurring?

A. The new surge protector used is not rated to handle the manufacturers workstation
B. The cable ties are loose and need to be adjusted
C. The computer may not have gone through its traditional burn-in period yet
D. The power cable could be too taut and is losing connection in the socket
Ans: D

Question 13:

A user is at the office and has a cellular phone that previously functioned properly. The phone is
powered on with a fully charged battery. However, the phone does not have connectivity. Which
of the following describes the problem?

A. Phone is disconnected from Wi-Fi


B. Provider is conducting system testing
C. MAC address is bad
D. Phone is in airplane mode

Ans: D

Question 14:

Which of the following operating systems is very lightweight and relies heavily on Internet
applications?

A. Chrome OS
B. Windows
C. Linux
D. Blackberry OS

Ans: A

Question 15:

Which of the following is a common characteristic of open source software?

A. Update cycles are dictated by the manufacturer


B. Modifications to core functionalities are made by the manufacturer
C. Can only run on certain manufacturer
D. Can be fully modified by the user
Ans: D
Question 16

Which of the following operating systems is available for free and can be modified by anyone?

A. Windows
B. Linux
C. Mac OS
D. Chrome OS
Ans: B
Question 17:

Which of the following software package types is designed to accept input from multiple users?

A. Utility
B. Operating system
C. Specialized
D. Collaborative
Ans: D
Question 68:

Which of the following computer ports can be used for storage, video output, and peripherals?

A. HDIM
B. USB
C. VGA
D. eSATA
Ans: B
Question 19:

Joe, a technician, has discovered that his SOHO router does not include features that are listed on
the manufacturer’s website. Which of the following would allow Joe to enable these missing
features?

A. Update the firmware


B. Enable WPA2
C. Change the SSID
D. Reset the router
Ans: A
Question 20:

A user has purchased some new software from a vendor and wants to install it on all of the
Windows computers in the house. Which of the following will help the user accomplish the task
and ensure compliance with the software vendor?

A. Copy and paste the program between computers


B. Purchase a multi-user license
C. Purchase a single-user license
D. Use remote desktop to share the program between computers
Ans: B
Question 21:

Which of the following file types is considered executable?

A. .zip
B. .app
C. .iso
D. .pdf
Ans: B
Question 22:

A user learns of an operating system vulnerability that would allow a hacker to access the
computer. The user would like to keep the operating system up to date to prevent such
vulnerabilities from occurring. Which of the following should the user configure?

A. Additional OS features
B. Automatic updates
C. Software firewall
D. Anti-malware firewall
Ans: B
Question 23

Which of the following is the BEST example of productivity software?

A. Word processing software


B. Entertainment software
C. Image editing software
D. Anti-malware software
Ans: A
Question 24:

Which of the following technologies allows people to communicate all over the world
inexpensively?

A. Virtualization
B. SSID
C. Kinetics
D. VoIP
Ans: D
Question 25:

Which of the following is a requirement to connect a smartphone to a wireless network?

A. SSID
B. SATA
C. SMTP
D. Gzip
Ans: A
Question 26

Which of the following is primarily a confidentiality concern?

A. Eavesdropping
B. Impersonating
C. Destructing
D. Altering
Ans: A
Question 27

A software developer develops a software program and writes a document with step-by-step
instructions on how to use the software. The developer wants to ensure no other person or
company will publish this document for public use. Which of the following should the developer
use to BEST protect the document?

A. Patent
B. Trademark
C. Watermark
D. Copyright
Ans: D
Question 28

Which of the following database concepts would MOST likely use a CSV file?

A. Data querying
B. Data reports
C. Data importing
D. Data persistence
Ans: C
Question 29:
A help desk technician encounters an issue and wants to find out if a colleague has encountered
the same issue before. Which of the following should the technician do FIRST?

A. Check Knowledge Base


B. Search local logs
C. Research possible theories
D. Question users
Ans: A
Question 30:

Which of the following BEST describes the practice of providing user credentials when logging
on to the network?

A. Output
B. Storage
C. Input
D. Processing
Ans: C

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy