IT CertificationsAnswer Key

Comptia Itf+ Practice Questions

25 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Which of the following would BEST help to protect against unauthorized use of a mobile phone? a) Pop-up blocker and cookie cleaner b) Alternate browser and private mode c) PIN and screen lock d) Encrypted messaging and time-expiring texts

ANSWER

c) PIN and screen lock

QUESTION 2

A user buys a new desktop computer and then connects a cable that allows the computer to connect to the web. Which of the following ports would MOST likely be used? a) DVI b) HDMI c) Ethernet d) Thunderbolt e) Bluetooth

ANSWER

c) Ethernet

QUESTION 3

Which of the following software licensing types is MOST likely to require the renewal of terms/conditions agreements and has annual fees? a) One-time purchase b) Open source c) Group license d) Subscription

ANSWER

d) Subscription

QUESTION 4

Ann, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken by Ann. Which of the following installation types does this BEST describe? a) Driver installation b) Plug and play c) Web-based d) Manual

ANSWER

b) Plug and play

QUESTION 5

Which of the following protocols is used for secure web browsing? a) SFTP b) HTTPS c) L2TP d) IMAP

ANSWER

b) HTTPS

QUESTION 6

Which of the following is the MOST secure password? a) happybirthday12 b) HappyDay12! c) H*ppyBirthDay%12 d) HappyBirthDay123

ANSWER

c) H*ppyBirthDay%12

QUESTION 7

A school has a sign posted in the computer lab that says, "Sharing passwords with others is prohibited." This is an example of: a) social networking. b) a security policy. c) file sharing. d) instant messaging.

ANSWER

b) a security policy.

QUESTION 8

08. Which of the following storage units can be used to represent 1024MB? a) 1GB b) 1KB c) 1TB d) 1PB

ANSWER

a) 1GB

QUESTION 9

09. An image displayed on a monitor is an example of: a) input b) output c) processing d) storage

ANSWER

b) output

QUESTION 10

10. Which of the following computer components is primarily responsible for preventing overheating? a) Fan b) SSD c) CPU d) Firmware

ANSWER

a) Fan

QUESTION 11

You are running virtual machines on a single physical server. The server operating system does not run any other applications and is dedicated to virtualization. What type of hypervisor is this? a) Type 1 b) Type 2 c) Type 3 d) Type 4

ANSWER

a) Type 1

QUESTION 12

Which of these is not a feature of a CPU? a) Multicore b) 64-bit processing c) L1 cache d) DDR

ANSWER

d) DDR

QUESTION 13

What manages and controls the speed of a motherboard's buses? a) RAM b) CPU c) Chipset d) L1 cache

ANSWER

c) Chipset

QUESTION 14

Which of these ports are physically identical? a) USB Type-A and USB Type-B b) Thunderbolt and Mini DisplayPort c) DisplayPort and FireWire d) DVI and VGA

ANSWER

b) Thunderbolt and Mini DisplayPort

QUESTION 15

What kind of drive reads CompactFlash storage? a) USB flash drive b) Card reader c) HDD d) SDD

ANSWER

b) Card reader

QUESTION 16

If you have a PC with a 32-bit CPU, which operating systems will run on it? a) 32-bit only b) Both 32-bit and 64-bit c) Neither 32-bit nor 64-bit d) 64-bit only

ANSWER

a) 32-bit only

QUESTION 17

Which OS configuration uses data labels to control resource access? a) Services b) Scheduled tasks c) Mandatory access control d) EULA

ANSWER

c) Mandatory access control

QUESTION 18

What should you install before you download and install additional software on a new PC? a) Security software b) Nothing c) Updates to other applications d) Drivers for hardware devices

ANSWER

a) Security software

QUESTION 19

What is a root directory? a) The top-level storage location on a volume b) The folder containing the system files c) The folder containing the boot files d) The folder containing the signed-in user's personal files

ANSWER

a) The top-level storage location on a volume

QUESTION 20

Which file property makes a search faster for content within files? a) Archive b) Indexed c) Compressed d) Encrypted

ANSWER

b) Indexed

QUESTION 21

What differentiates a router from a switch? a) Routers are for WANs, and switches are for LANs. b) A router provides a path out of the LAN, such as to the internet. c) A switch provides a path out of the LAN, such as to the internet. d) Routers are for client-server networks, and switches are for peer-to-peer networks.

ANSWER

b) A router provides a path out of the LAN, such as to the internet.

QUESTION 22

Which wireless encryption standard is the most secure? a) WEP b) WPA c) WPA2 d) WPS

ANSWER

c) WPA2

QUESTION 23

In which way is a cellular internet connection superior to wired and WiFi? Bandwidth Mobility Number of concurrent connections Security

ANSWER

Mobility

QUESTION 24

Disabling the Bluetooth adapter on a laptop when it is not in use is an example of: Dumpster diving Cracking Device hardening Hardware theft prevention

ANSWER

Device hardening

QUESTION 25

Which of the following might you want to disable to protect your privacy? Autofill forms Hyperlinks Certificates InPrivate browsing

ANSWER

Autofill form

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials