IT CertificationsAnswer Key

Comptia Itf+ Exam Questions

75 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following is primarily a confidentiality concern

ANSWER

Eavesdropping

QUESTION 2

A software developer develops a software program and writes a document with step-by-step instructions on how to use the software. The developer wants to ensure no other person or company will publish this document for public use. Which of the following should the developer use to BEST protect the document?

ANSWER

Copyright

QUESTION 3

Which of the following database concepts would MOST likely use a CSV file?

ANSWER

Data reports

QUESTION 4

A help desk technician encounters an issue and wants to find out if a colleague has encountered the same issue before. Which of the following should the technician do FIRST?

ANSWER

Check Knowledge Base.

QUESTION 5

Which of the following BEST describes the practice of providing user credentials when logging onto the network?

ANSWER

Input

QUESTION 6

Which of the following allows wireless devices to communicate to a wired network?

ANSWER

Access point

QUESTION 7

Which of the following computing devices would be used to provide a centralized means to distribute services to a group of clients and usually possesses a role on a LAN?

ANSWER

Server

QUESTION 8

Which of the following describes something in a database that refers to the unique identifier in the parent table?

ANSWER

Attribute

QUESTION 9

For which of the following is a relational database management system MOST commonly used?

ANSWER

Storing information

QUESTION 10

Which of the following BEST describes an application running on a typical operating system?

ANSWER

Process

QUESTION 11

The broadcast signal from a recently installed wireless access point is not as strong as expected. Which of the following actions would BEST improve the signal strength?

ANSWER

Ensure sources of EMI are removed.

QUESTION 12

A user is getting an error message when trying to go to a website. A technician asks the user a few questions to find out more about the issue. The technician opens a browser locally and browses to the same site as the user. Which of the following troubleshooting steps is the technician using by browsing to the same site?

ANSWER

Duplicate the problem.

QUESTION 13

A user is attempting to print a document to a wireless printer and receives an error stating the operation could not be completed. Which of the following should the user do to correct this issue?

ANSWER

Ensure both devices are connected to the LAN.

QUESTION 14

Which of the following relational database constructs is used to ensure valid values are entered for a column?

ANSWER

Constraint

QUESTION 15

A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen. Which of the following should be set up to accomplish this?

ANSWER

Encryption

QUESTION 16

A systems administrator uses a program that interacts directly with hardware to manage storage, network, and virtual machines. This program is an example of:

ANSWER

a Type 1 hypervisor.

QUESTION 17

Which of the following is a compiled language?

ANSWER

Java

QUESTION 18

Which of the following actions is the FINAL step in the standard troubleshooting methodology?

ANSWER

Document the solution and cause

QUESTION 19

Which of the following is a value that uniquely identifies a database record?

ANSWER

Primary key

QUESTION 20

A systems administrator wants to return results for a time range within a database. Which of the following commands should the administrator use?

ANSWER

SELECT

QUESTION 21

Which of the following statements BEST describes binary?

ANSWER

A notational system used to represent an “on†or “off†state

QUESTION 22

Joe, a developer, is writing a program in which he needs to store a number that changes over the duration of the programs run. Which of the following would Joe MOST likely use to accomplish this?

ANSWER

Variable

QUESTION 23

An end users computer has been failing to open its word processing software. An IT technician successfully solves the problem. Which of the following best describes the technician's NEXT step?

ANSWER

Document the findings.

QUESTION 24

A regulation requires new applicants to provide a scan of their retinas in case of any future legal questions regarding who applied for the position. Which of the following concepts is this an example of?

ANSWER

Authentication

QUESTION 25

Which of the following is an advantage of installing an application to the cloud?

ANSWER

Data is not stored locally.

QUESTION 26

A small company wants to set up a server that is accessible from the company network as well as the Internet. Which of the following is MOST important to determine before allowing employees to access the server remotely?

ANSWER

A security method of allowing connections

QUESTION 27

A program needs to choose apples, oranges, or bananas based on an input. Which of the following programming constructs is BEST to use?

ANSWER

If

QUESTION 28

A UPS provides protection against:

ANSWER

power outages.

QUESTION 29

A company executive wants to view company training videos from a DVD. Which of the following components would accomplish this task?

ANSWER

Optical drive

QUESTION 30

A technician is troubleshooting a problem. The technician tests the theory and determines the theory is confirmed. Which of the following should be the technician's NEXT step?

ANSWER

Establish a plan of action.

QUESTION 31

Given the following pseudocode: program Breakfast weekday = ["Monday", "Tuesday", "Wednesday", "Thursday", "Friday"] weekend = ["Saturday", "Sunday"] if today == Wednesday output "Bacon and eggs" else if today == Firday output "Oatmeal" else if today in weekend out "Waffles" else output "Pancakes" end If the Breakfast program ran on Sunday, which of the following would be the output?

ANSWER

Waffles

QUESTION 32

A desktop administrator just connected a printer to a workstation, but the workstation does not recognize the printer. Which of the following does the workstation MOST likely need for the printer to function?

ANSWER

Driver

QUESTION 33

Which of the following BEST describes a kilobyte?

ANSWER

A kilobyte is a measurement of storage (e.g., 100KB).

QUESTION 34

Which of the following security concerns is a threat to confidentiality?

ANSWER

Replay attack

QUESTION 35

Which of the following software license models allows a developer to modify the original code and release its own version of the application?

ANSWER

Open source software

QUESTION 36

Which of the following are the basic computing operations?

ANSWER

Input, process, output, and storage

QUESTION 37

Which of the following would work BEST stored as a flat file rather than stored in a database?

ANSWER

Contact list

QUESTION 38

An administrator grants permission for a user to access data in a database. Which of the following actions was performed?

ANSWER

Data definition

QUESTION 39

An employee is asked to generate a report on a student information system. The employee uses spreadsheet software and connects to a remote database to pull data for the report. Which of the following types of application architectures did the employee use?

ANSWER

Client-server application

QUESTION 40

Ann, a user, is experiencing difficulty getting her IP-based security camera to function at her house after a rain storm that caused a power interruption. The camera has an LED light indicating it has power. Which of the following is MOST likely the problem?

ANSWER

Anna's Internet connection and wireless router are still down.

QUESTION 41

A programmer needs to store output in a place that can be accessed as quickly as possible. The data does not need to remain persistent. Which of the following is the BEST option for storing the data?

ANSWER

Flat file

QUESTION 42

Which of the following intellectual property concepts BEST represents a legally protected slogan of a business?

ANSWER

Trademark

QUESTION 43

Which of the following is a wireless communication that requires devices to be within 6in of each other to transfer information?

ANSWER

NFC

QUESTION 44

The IT department has established a new password policy for employees. Specifically, the policy reads: -> Passwords must not contain common dictionary words -> Passwords must contain at least one special character. -> Passwords must be different from the las six passwords used. -> Passwords must use at least one capital letter or number. Which of the following practices are being employed? (Select TWO).

ANSWER

Password complexity and Passwords history

QUESTION 45

Which of the following would MOST likely prevent malware sent as compromised file via email from infecting a personal's computer?

ANSWER

Patching

QUESTION 46

A user wants to use a laptop outside the house and still remain connected to the Internet. Which of the following would be the BEST choice to accomplish this task?

ANSWER

WLAN card

QUESTION 47

Joe, a user, finds out his password for a social media site has been compromised. Joe tells a friend that his email and banking accounts are probably also compromised. Which of the following has Joe MOST likely performed?

ANSWER

Password reuse

QUESTION 48

A technician is installing a new wireless network and wants to secure the wireless network to prevent unauthorized access. Which of the following protocols would be the MOST secure?

ANSWER

WPA2

QUESTION 49

Which of the following network protocols will MOST likely be used when sending and receiving Internet email? (Select TWO.)

ANSWER

POP3 and SMTP

QUESTION 50

A database administrator finds that a table is not needed in a relational database. Which of the following commands is used to completely remove the table and its data?

ANSWER

DROP

QUESTION 51

A technician is called to replace a display for a workstation. Which of the following would MOST likely be used to connect the display to the workstation?

ANSWER

DVI

QUESTION 52

Ann, the president of a company, has requested assistance with choosing the appropriate Internet connectivity for her home. The home is in a remote location and has no connectivity to existing infrastructure. Which of the following Internet service types should MOST likely be used?

ANSWER

Satellite

QUESTION 53

Which of the following is MOST likely used to represent international text data?

ANSWER

Unicode

QUESTION 54

For a disaster recovery exercise, a company wants to ensure customer data is recovered before operational data. This is an example of:

ANSWER

prioritization

QUESTION 55

Which of the following operating systems do not require extensions on files to execute a program? (Select TWO).

ANSWER

UNIX and Linux

QUESTION 56

A technician needs to install a wireless router for a client that supports speeds up to 11Mbps and operates on the 2.4GHz band. Which of the following should the technician select?

ANSWER

802.11b

QUESTION 57

Which of the following is an example of multifactor authentication?

ANSWER

Smart card and PIN

QUESTION 58

Which of the following language types would a web developer MOST likely use to create a website?

ANSWER

Interpreted

QUESTION 59

A developer is creating specific step-by-step instructions/procedures and conditional statements that will be used by a computer program to solve problems. Which of the following is being developed?

ANSWER

Algorithm

QUESTION 60

A startup company has created a logo. The company wants to ensure no other entity can use the logo for any purpose. Which of the following should the company use to BEST protect the logo? (Select TWO).

ANSWER

Copyright and Trademark

QUESTION 61

Which of the following would be BEST to keep the data on a laptop safe if the laptop is lost or stolen?

ANSWER

Full disk encryption

QUESTION 62

In which of the following situations should there be come expectation of privacy?

ANSWER

Submitting personal information on a school enrollment site

QUESTION 63

Which of the following data types should a developer use when creating a variable to hold a postal code?

ANSWER

String

QUESTION 64

Which of the following is the closest to machine language?

ANSWER

Assembly languages

QUESTION 65

A function is BEST used for enabling programs to:

ANSWER

define variables to hold different values.

QUESTION 66

When transferring a file across the network, which of the following would be the FASTEST transfer rate?

ANSWER

1.22Gbps

QUESTION 67

A technician has been asked to assign an IP address to a new desktop computer. Which of the following is a valid IP address the technician should assign?

ANSWER

172.16.2.189

QUESTION 68

A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded. Which of the following devices would be BEST for the developer to buy?

ANSWER

Server

QUESTION 69

A company requires several reports that analyze related information from sales, inventory, marketing, and compensation data. Which of the following is the BEST place to store this data?

ANSWER

Database

QUESTION 70

A computer user is downloading software from the Internet and notices the following at the end of the install file: x86.exe. Which of the following statements BEST represents what the x86.exe means in the installation file?

ANSWER

x86 only supports an installation on a 32-bit CPU architecture.

QUESTION 71

Which of the following would be used to send messages using the SMTP protocol?

ANSWER

Email software

QUESTION 72

Malware infections are being caused by websites. Which of the following settings will help prevent infections caused by Internet browsing?

ANSWER

Configure prompting before downloading content.

QUESTION 73

Which of the following is an example of information a company would ask employees to handle in a sensitive manner?

ANSWER

Customer date of birth

QUESTION 74

The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. Which of the following applications should be used to create this list?

ANSWER

Database software

QUESTION 75

Ann, a user, connects to the corporate WiFi and tries to browse the Internet. Ann finds that she can only get to local (intranet) pages. Which of the following actions would MOST likely fix the problem?

ANSWER

Configure the browser proxy settings.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials