0% found this document useful (0 votes)
54 views

CompTIA ITF EXAM - Reviewer

Uploaded by

itzvladimyr21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

CompTIA ITF EXAM - Reviewer

Uploaded by

itzvladimyr21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

COMPTIA ITF+

1. A technician is attempting to troubleshoot a PC that is having difficulties


connecting to a website. The technician pings the DNS server from the PC.
Which of the following steps in troubleshooting methodology is the technician
currently performing?
A. Implementing the solution
B. Establishing a theory of probable cause
C. Identifying the problem
D. Establishing a plan of action

2. Which of the following storage units can be used to represent 1,024MB?


A. 1GB
B. 1PB
C. 1TB
D. 1KB

3. A user accessed a social media website from a work computer and was
reprimanded by management. Which of the following company guidelines did the
user MOST likely violate?
A. REmote work policy
B. SEcurity policy
C. Acceptable use policy
D. Time card policy

4. Which of the following is described as a rotating code that is generally used in


conjunction with standard login credentials?
A. PIN
B. OTP
C. RBAC
D. SSO

5. Which of the following would be the BEST IP address to use for a corporate
intranet server?
A. 1.1.1.1
B. 4.2.2.4
C. 192.168.4.123
D. 216.176.128.11

6. A company is purchasing software that requires internet access to function.


Which of the following types of hosting methods did the company select?
A. LOcal
B. LAN
C. Cloud
D. MAN
7. A user goes to a coffee shop and connects to the public Wi-Fi. A web page
opens and the user must agree to the terms and conditions before being granted
internet access. This is an example of :
A. a captive portal
B. an encrypted connection
C. Attenuation.
D. Authentication.

8. Which of the following is utilized when a credit card is tapped against a reader
instead of being swiped?
A. Bluetooth
B. NFC
C. WiFi
D. RF

9. Which of the following password policies prevents a user from alternating


between the same password
A. Password history
B. Password age
C. Password complexity
D. Password expiration

10. Which of the following logical components checks the condition after executing its
statement block?
A. while loop
B. do . . . while loop
C. if . . . else statement
D. switch statement

11. A company wants to improve the performance of its datacenter. Which of the
following will allow for the HIGHEST throughput?
A. TBps
B. PBps
C. MBps
D. GBps

12. A company installs a security camera. Which of the following concepts does this
provide for the company?
A. Non-repudiation
B. Authentication
C. Authorization
D. Biometrics
13. Which of the following is a hardware address encoded into a network card by the
manufacturer?
A. MAC address
B. IP address
C. Memory address
D. APIPA address

14. The manager of human resources is unable to connect to the wireless network
while in the conference room. The network administrator decides to check the
logs of the network. While in the log file, the administrator finds that several
access points are down. Which of the following troubleshooting steps should be
performed NEXT?
A. Identify the problem
B. Research knowledge base.
C. Establish a theory of cause.
D. Very full system functionality.

15. Which of the following would MOST likely be used to select a computer’s boot
drive?
A. BIOS
B. Motherboard
C. Hard drive
D. OS

16. Data replication done to maintain system availability is MOST closely associated
with:
A. fault tolerance.
B. data prioritization.
C. OS backups.
D. file backups .

17. Which of the following actions would an administrator perform to create a search
for data within a database?
A. CREATE
B. QUERY
C. IMPORT
D. REPORT
18. Users wish to connect to company-provider resources via mobile devices. Which
of the following technologies BEST describes a solution that provides security
and the ability to erase corporate data on the devices?
A. Encrypted managed application
B. Host-based firewall
C. Host-based IDS
D. Personal cloud-based storage

19. A company’s critical financial servers are all connected to the same power
distribution unit in a server rack. This is an example of:
A. a confidentiality concern
B. an availability concern.
C. an integrity concern.
D. an accounting concern.

20. Text mining customer comments from an online survey is an example of:
A. Data as an asset.
B. Intellectual property.
C. Digital products.
D. Data correlation.

21. Which of the following are the MOST appropriate storage types to use when
loading a new operating system without network connectivity?(Select TWO).
A. HDD
B. DVD
C. USB
D. NAS
E. PXE
F. SSD

22. Which of the following is an example of a DDL command?


A. SELECT
B. INSERT
C. DROP
D. DELETE

23. A system administrator wants to ensure all company laptops go through a single
server before connecting to the internet. Which of the following browser features
should the system administrator configure?
A. Browser cache
B. Proxy settings
C. Private browsing
D. Pop-up blockers
E.
24. A new coffee shop owner is working with an IT contractor to get the coffee shop’s
public WiFi configured. The owner’s legal team requires users of the public WiFi
to agree not to do anything malicious or illegal while on the coffee shop’s WiFi.
The contractor configures a splash screen that opens on a user’s device when
the user connects. The screen display button to accept these terms and
conditions before internet access is granted. Which of the following is this an
example of ?
A. WPA2 enterprise
B. Authentication
C. Open encryption
D. Captive portal

25. Which of the following is a primary function of the OS?


A. Managing devices
B. Providing physical connection to devices
C. Controlling system cooling
D. Selecting the drive boot sequence

26. Which of the following Internet service types provides the MOST resistance to
interference?
A. LTE
B. Fiber
C. Coaxial
D. DSL

27. Which of the following programming concepts would be used to store the value of
the speed of light in a vacuum?
A. Variable
B. Syntax
C. Vector
D. Array

28. Which of the following is used to limit the type of data that can be entered into a
SQL database?
A. Primary key
B. Foreign key
C. Schema
D. Constraint

29. Which of the following allows for creating symbols using hexadecimal notation?
A. ASCII
B. Integers
C. Binary
D. Decimal

30. After logging in to a web application, a user is granted access to only the pages
to which the user has permissions. The granting of access is an example of:
A. authorization
B. authentication
C. accounting
D. availability

31. Which of the following would BEST be used to describe the bandwidth provided
by a cable ISP?
A. Mbps
B. MHz
C. Tbps
D. THz

32. Given the following psuedocode:


IF age < 8
THEN balloons = GREEN
ELSEIF age < 16
THEN balloons = PINK
ELSEIF age > 17
THEN balloons = BLUE
ELSE
THEN balloons = PURPLE
END

Which of the following party balloon colors will be chosen for a 16-year-old?
A. GREEN
B. PINK
C. BLUE
D. PURPLE

33. With regard to a database, which of the following uses the SELECT statement?
A. Query
B. Schema
C. Import
D. Scaling

34. A SOHO business owner is researching licensing options for a software package
that is vital to business operations. Requirements include always having the
latest version, patches, and features. Which of the following license types would
MOST likely satisfy these needs?
A. A subscription
B. A site license
C. An open source
D. A single purchase
35. A bank teller’s computer is situated so customers waiting in line can see the
screen. This is an example of:
A. a confidentiality concern
B. an availability concern
C. an integrity concern
D. an accounting concern

36. When a code is executed by a compiler, this is an example of:


A. input
B. output
C. processing
D. storage

37. A developer is creating an application on one server that stores the database and
the web-based interface. If a user connects to this application from a client on a
workstation, which of the following application architecture models will be used?
A. One-tier
B. Two-tier
C. Three-tier
D. Four-tier

38. Which of the following allows for data persistence in a non-structured database?
A. Schema
B. Processing
C. Input
D. Storage

39. Given the following pseudocde:


IF age < 5
THEN school = LINCOLN
ELSEIF age < 11
THEN school = WASHINGTON
ELSEIF age > 13
THEN school = STEVENSON
ELSE
THEN school = SANDBURG
END

Which of the following schools will be chosen for a 16-year-old student?


A. Lincoln
B. Washington
C. Stevenson
D. Sandburg

You might also like