CompTIA ITF+ Practice Exam - Questions and Answers A relational database has a table, Customers, which contains information about the company's customers... [Show More] . The information includes First Name, Last Name, Address, Phone, and Email for each customer. What's the best way to keep track of customer's purchases in this database? Create 2 new tables: Products and Purchases What is true about firewalls? A firewall provides a way to restrict access to a computer or network What are the four functions which represent most of the ways that data moves through a computer system? Input, output, processing, and storage What type of access control and technology helps ensure non-repudiation, and tracks what users are doing on the network? Accounting; logs How do the CPU (Central Processing Unit) and storage devices in a computer process data? As zeros and ones What's a true statement about query languages? Query language code does not need to be compiled What is the basic unit of computer data? Bit A wireless network in a small home office generated poor signal quality. The signal improved when an old cordless phone stopped working. What problem did the cordless phone cause when it was active? Interference A file contains information about the company's customers. The information includes Name, Address, Phone, and Email for each customer. What's the best way to convert this file into a database? Create a table called Customers, with fields called Name, Address, Phone, and Email Convert the decimal number 35 into binary notation. 100011 Which is a true statement about a GPU (Graphics Processing Unit)? GPU works with the CPU to handle complex high-resolution images What should a user do before installing a driver from a third-party website? Search the web for references of the driver's legitimacy and reputation An attacker successfully connects to an open wireless access point, and proceeds to monitor and capture the plain text traffic on the network. Which of the following integrity concerns does this describe? A Man-in-the-Middle (MitM) attack Which TCP/IP (Transmission Control Protocol/Internet Protocol) layer encapsulates packets and deals with routing between different networks? Internet Which statement holds true about a desktop/workstation when comparing it to a server? Servers use the same type of components as a desktop A company has an unwritten rule that visitors must always be escorted, but not every employee abides by it. Which of the following would make employees become more aware of the importance of this responsibility, and help enforce this as a company best practice? Write a company policy and procedure for escorting visitors What should a user do to protect sensitive information from malware, when working on a public worktation? Clear the browser cache A workstation experiences slowdowns while running Microsoft Word. The program does not respond to attempts to close it, therefore the user executes the Task Manager utility to quit the program. What does this fall under? Process management CompTIA's troubleshooting model includes having to establish a theory of probably cause. What is one of the components of this step? Question the obvious Which USB (Universal Serial Bus) version first introduced a SuperSpeed mode? USB 3.0 What type of software is Google Drive? Collaboration software What is the bandwidth available to the memory controller, in MBps (megabytes per second), if the SDRAM (Synchronous Dynamic Random Access Memory) bus is running at 100 MHz (megahertz)? 800 Which type of OS (Operating System) allows a user to uninstall Windows XP and replace it with Linux? Workstation OS What does 5 GB (GigaBytes) memory mean in the context of the Microsoft Windows operating system? 5120 MB A user installs VirtualBox on a Linux OS (operating System). Which class of hypervisor is it? Type II, because VirtualBox is a software application within a host operating system What does a programmer use to visualize a program sequence? Flow chart Which of the following ways best defeats social engineering? Training end-users how to identify and report suspicious activity on the network or workstation Which of the following is least likely to pose a substantial risks to an organization, such as a system intrusion? Employees using permitted software and services as outlined in the handbook Which type of data uses whole disk encryption? Data at rest What type of process is the Windows Task Scheduler? Service Which of the following best describes containers and identifiers? A container is a type of identifier What does this pseudocode do? declare i as Number = 0 Do While i <= 100 i = i + 1 print i i = i - 1 Loop Produces an infinite loop What is a downside to digital products? Digital products are easy to copy and steal What is the end result of the iterative process of establishing and testing a theory while troubleshooting? [Show Less]