CompTIA ITF EXAM - Reviewer
CompTIA ITF EXAM - Reviewer
3. A user accessed a social media website from a work computer and was
reprimanded by management. Which of the following company guidelines did the
user MOST likely violate?
A. REmote work policy
B. SEcurity policy
C. Acceptable use policy
D. Time card policy
5. Which of the following would be the BEST IP address to use for a corporate
intranet server?
A. 1.1.1.1
B. 4.2.2.4
C. 192.168.4.123
D. 216.176.128.11
8. Which of the following is utilized when a credit card is tapped against a reader
instead of being swiped?
A. Bluetooth
B. NFC
C. WiFi
D. RF
10. Which of the following logical components checks the condition after executing its
statement block?
A. while loop
B. do . . . while loop
C. if . . . else statement
D. switch statement
11. A company wants to improve the performance of its datacenter. Which of the
following will allow for the HIGHEST throughput?
A. TBps
B. PBps
C. MBps
D. GBps
12. A company installs a security camera. Which of the following concepts does this
provide for the company?
A. Non-repudiation
B. Authentication
C. Authorization
D. Biometrics
13. Which of the following is a hardware address encoded into a network card by the
manufacturer?
A. MAC address
B. IP address
C. Memory address
D. APIPA address
14. The manager of human resources is unable to connect to the wireless network
while in the conference room. The network administrator decides to check the
logs of the network. While in the log file, the administrator finds that several
access points are down. Which of the following troubleshooting steps should be
performed NEXT?
A. Identify the problem
B. Research knowledge base.
C. Establish a theory of cause.
D. Very full system functionality.
15. Which of the following would MOST likely be used to select a computer’s boot
drive?
A. BIOS
B. Motherboard
C. Hard drive
D. OS
16. Data replication done to maintain system availability is MOST closely associated
with:
A. fault tolerance.
B. data prioritization.
C. OS backups.
D. file backups .
17. Which of the following actions would an administrator perform to create a search
for data within a database?
A. CREATE
B. QUERY
C. IMPORT
D. REPORT
18. Users wish to connect to company-provider resources via mobile devices. Which
of the following technologies BEST describes a solution that provides security
and the ability to erase corporate data on the devices?
A. Encrypted managed application
B. Host-based firewall
C. Host-based IDS
D. Personal cloud-based storage
19. A company’s critical financial servers are all connected to the same power
distribution unit in a server rack. This is an example of:
A. a confidentiality concern
B. an availability concern.
C. an integrity concern.
D. an accounting concern.
20. Text mining customer comments from an online survey is an example of:
A. Data as an asset.
B. Intellectual property.
C. Digital products.
D. Data correlation.
21. Which of the following are the MOST appropriate storage types to use when
loading a new operating system without network connectivity?(Select TWO).
A. HDD
B. DVD
C. USB
D. NAS
E. PXE
F. SSD
23. A system administrator wants to ensure all company laptops go through a single
server before connecting to the internet. Which of the following browser features
should the system administrator configure?
A. Browser cache
B. Proxy settings
C. Private browsing
D. Pop-up blockers
E.
24. A new coffee shop owner is working with an IT contractor to get the coffee shop’s
public WiFi configured. The owner’s legal team requires users of the public WiFi
to agree not to do anything malicious or illegal while on the coffee shop’s WiFi.
The contractor configures a splash screen that opens on a user’s device when
the user connects. The screen display button to accept these terms and
conditions before internet access is granted. Which of the following is this an
example of ?
A. WPA2 enterprise
B. Authentication
C. Open encryption
D. Captive portal
26. Which of the following Internet service types provides the MOST resistance to
interference?
A. LTE
B. Fiber
C. Coaxial
D. DSL
27. Which of the following programming concepts would be used to store the value of
the speed of light in a vacuum?
A. Variable
B. Syntax
C. Vector
D. Array
28. Which of the following is used to limit the type of data that can be entered into a
SQL database?
A. Primary key
B. Foreign key
C. Schema
D. Constraint
29. Which of the following allows for creating symbols using hexadecimal notation?
A. ASCII
B. Integers
C. Binary
D. Decimal
30. After logging in to a web application, a user is granted access to only the pages
to which the user has permissions. The granting of access is an example of:
A. authorization
B. authentication
C. accounting
D. availability
31. Which of the following would BEST be used to describe the bandwidth provided
by a cable ISP?
A. Mbps
B. MHz
C. Tbps
D. THz
Which of the following party balloon colors will be chosen for a 16-year-old?
A. GREEN
B. PINK
C. BLUE
D. PURPLE
33. With regard to a database, which of the following uses the SELECT statement?
A. Query
B. Schema
C. Import
D. Scaling
34. A SOHO business owner is researching licensing options for a software package
that is vital to business operations. Requirements include always having the
latest version, patches, and features. Which of the following license types would
MOST likely satisfy these needs?
A. A subscription
B. A site license
C. An open source
D. A single purchase
35. A bank teller’s computer is situated so customers waiting in line can see the
screen. This is an example of:
A. a confidentiality concern
B. an availability concern
C. an integrity concern
D. an accounting concern
37. A developer is creating an application on one server that stores the database and
the web-based interface. If a user connects to this application from a client on a
workstation, which of the following application architecture models will be used?
A. One-tier
B. Two-tier
C. Three-tier
D. Four-tier
38. Which of the following allows for data persistence in a non-structured database?
A. Schema
B. Processing
C. Input
D. Storage