Mr D's Test.pdf
Document Details
Uploaded by BlamelessJuniper
Tags
Full Transcript
6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... COR-APR-24-FT IT Fundamentals Lessons Week 5 | Lesson Review Test Submission: ITF+ Exam Review Test Submission: ITF+ Exam User...
6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... COR-APR-24-FT IT Fundamentals Lessons Week 5 | Lesson Review Test Submission: ITF+ Exam Review Test Submission: ITF+ Exam User Fenn Demetri Course COR-APR-24-FT IT Fundamentals Test ITF+ Exam Started 6/4/24 8:19 AM Submitted 6/4/24 9:19 AM Status Completed Attempt Score 516 out of 900 points Time Elapsed 1 hour, 0 minute out of 1 hour Results All Answers, Submitted Answers, Correct Answers, Incorrectly Answered Displayed Questions Question 1 12 out of 12 points Phillip, a programmer, is trying to decide whether to use a compiled language or an interpreted language. The program needs to work on multiple platforms. Which of the following would be the BEST reason for choosing an interpreted language? Selected Answer: A compiled language requires rewriting and recompiling for each platform. Answers: A compiled language requires rewriting and recompiling for each platform. A interpreted language can be provided to customers on different platforms in the form of an executable file. A interpreted language does not require code to be compiled into bytecode. A compiled language executes slower than interpreted languages. Question 2 12 out of 12 points Which of the following scenarios is an example of why an application or utility would need a database for persistent data storage? Selected Answer: A customer fills out an online form to order a Bluetooth speaker. Answers: A student creates and saves a graphic image. https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 1/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... A system manager edits and saves a network device's configuration. A customer fills out an online form to order a Bluetooth speaker. A business manager edits and saves a PowerPoint presentation. Question 3 12 out of 12 points Alex, a system administrator, wants to grant NTFS permissions to a user so they can view and change files but not change permissions. Which of the following permissions should be used? Selected Answer: Modify Answers: Full Control Modify Read Read & Execute Question 4 12 out of 12 points Ted, an employee in the Sales department has asked a coworker, Ann, in the Production department to update the product descriptions contained in a Sales document. Ann can open the file but, after making changes, can't save the file. Which of the following digital security methods is MOST likely preventing this? Selected Answer: Directory permission Answers: Directory permission Data loss prevention Antivirus software Multifactor authentication Question 5 12 out of 12 points Which of the following are important reasons for reading the documentation before installing an application on your computer? (Select two.) Selected Answers: To make sure that you have a valid software agreement or license To make sure that the application is compatible with your operating system https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 2/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Answers: To make sure that you have the proper internet connection for installing the software To make sure that you have all the software installation files To make sure that you have a valid software agreement or license To make sure that the application is compatible with your operating system To make sure that the software provider is legitimate Question 6 12 out of 12 points Which of the following does a computer use to make sure that people, hardware, and software can interface with each other? Selected Answer: OS (operating system) Answers: Application and hardware interface GUI (graphical user interface) Device driver OS (operating system) Question 7 12 out of 12 points Sara, a user, wants to play a movie on her laptop while traveling. She recently purchased a movie on Blu-ray disc. Which of the following computer components does she need installed? Selected Answer: Optical drive Answers: Optical drive Flash storage SSD Hard disk Question 8 12 out of 12 points Jason works out of his home using a Small Office Home Office (SOHO) network and is planning on moving to a new city in a few months. What is the MOST likely reason Jason would choose Digital Subscriber Line (DSL) over a fiber network in his next home? Selected DSL is more likely to be available at his new home. Answer: https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 3/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Answers: DSL is more likely to be available at his new home. DSL provides higher upload and download speeds. DSL does not interfere with voice calls. DSL cables provide better performance over longer distances. Question 9 12 out of 12 points Marcus was assigned to troubleshoot a problem with a customer not being able to access a cloud application. Which of the following is the LAST step in the troubleshooting methodology that should be completed? Selected Document findings/lessons learned, actions, and outcomes Answer: Answers: Verify full system functionality and, if applicable, implement preventive measures Establish a plan of action to solve the problem and identify potential effects Document findings/lessons learned, actions, and outcomes Implement the solution or escalate as necessary Question 10 12 out of 12 points Pam is working with a database that contains all the product and customer orders for her company. Pam is using SQL to access the database to retrieve a customer's order. Which of the following BEST describes SQL? Selected Answer: Query language Answers: Compiled language Query language Object-oriented language Markup language Question 11 12 out of 12 points A pop-up blocker is a web browser feature that _________________. Selected Answer: prevents unwanted advertisements Answers: prevents color images from being displayed censors Internet searches https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 4/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... prevents unwanted advertisements keeps the window in a minimized state Question 12 12 out of 12 points A developer wants to take existing code written by another person and add some features specific to their needs. Which of the following software licensing models allows them to make changes and publish their own version? Selected Answer: Open-source Answers: Proprietary Open-source Subscription Software-as-a-Service (SaaS) Question 13 0 out of 12 points Which of the following programming languages are interpreted languages? (Select three.) Selected Answers: Java JavaScript Python Answers: Java Ruby Pascal JavaScript Python C# C++ Question 14 12 out of 12 points Which of the following Microsoft Access database features provides the BEST way to organize and summarize data for analysis? Selected Answer: reports Answers: queries forms tables https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 5/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... reports Question 15 12 out of 12 points Hannah is the manager of a successful Thai cuisine restaurant. It's November and Hannah wants to begin reviewing salary expenses for the year. She decides to generate a payroll report for all her employees. Which of the following types of business software could easily provide Hannah with the report she needs? Selected Answer: business accounting software Answers: spreadsheet software business accounting software database software project management software Question 16 0 out of 12 points A systems administrator has been given the task of backing up critical data on a network server. Which of the following should the administrator consider as critical data? (Select two.) Selected Answers: Company contracts Marketing images Answers: Third-party application installation files Company contracts Company newsletters Marketing images Settings files Question 17 0 out of 12 points A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device. They use an 802.11n wireless network. The wireless network is broadcasting an SSID of Linksys. The wireless network uses WPA2 with AES security. Directional access points are positioned around the periphery of the building. Which of the following would you MOST likely recommend your client do to increase their wireless network security? (Select two.) Selected Change the SSID to something other than the default. Answers: Upgrade to an 802.11g wireless network. https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 6/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Answers: Implement omnidirectional access points. Disable SSID broadcast. Change the SSID to something other than the default. Upgrade to an 802.11g wireless network. Configure the wireless network to use WPA with TKIP security. Question 18 0 out of 12 points Dave, a videographer, wants to purchase a network switch that will improve the performance of transferring video from his video editing workstation to a backup server. Which of the following transfer rates currently available to consumers is the FASTEST for network switches? Selected Answer: Tbps Answers: Gbps Tbps Kbps Mbps Question 19 12 out of 12 points Arrange the following from smallest to largest. Answers Selected Answer 1. Kilobyte 1. Kilobyte 2. Megabyte 2. Megabyte 3. Gigabyte 3. Gigabyte 4. Terabyte 4. Terabyte Question 20 0 out of 12 points Which connector on the back of a computer is used to attach a mouse to a modern PC system? Selected Answer: USB B Answers: High-density (three row), female DB-15 USB A Mini-DIN https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 7/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Low-density (two row), female DB-15 RJ-45 USB B Question 21 12 out of 12 points An application developer needs to store configuration data that can be retrieved each time the application is launched. The data must be in a format that could be easily viewed outside of the application and edited using any editor. Which of the following would be the BEST choice? Selected Answer: text-based flat file Answers: relational database text-based flat file database management system binary flat file Question 22 0 out of 12 points Martin just purchased a new computer and wants to surf the web. He is afraid his new computer may get infected by automatically installing viruses. What should he do to protect his computer? Selected Change browser settings to prevent pop-up windows. Answer: Answers: Change browser settings to notify before downloading. Change browser settings to block third-party cookies. Change browser settings to prevent pop-up windows. Change browser settings to notify when downloads are complete. Question 23 0 out of 12 points On Windows, which application lets you add accounts, change passwords, manage power consumption, and personalize your computer's environment? Selected Answer: Control Center Answers: Settings Control Center Start Menu https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 8/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Finder Question 24 12 out of 12 points What is the surest way to prevent the loss of important information on your mobile device if it is lost, stolen, destroyed, or there is a natural disaster? Selected Answer: Configure your device to remotely backup important data to the Cloud. Answers: Only use apps, such as email apps, that store data on the app provider's servers. Configure your device to remotely backup important data to the Cloud. Don't put important information on your mobile device. Configure your device to backup important data to your personal computer. Question 25 12 out of 12 points Which of the following are web browsers? (Select two.) Selected Answers: Google Chrome Mozilla Firefox Answers: Microsoft Visio Bing Google Chrome Google Mozilla Firefox Question 26 0 out of 12 points A database administrator wants to create a copy of an entire database. Which of the following SQL (Structured Query Language) commands can the administrator use to create the copy? Selected Answer: CREATE BACKUP database_name Answers: BACKUP database_name BACKUP DATABASE database_name CREATE BACKUP DATABASE database_name CREATE BACKUP database_name https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_2755… 9/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Question 27 12 out of 12 points Even if you perform regular backups, what must be done to ensure that you are protected against data loss? Selected Regularly test restoration procedures. Answer: Answers: Regularly test restoration procedures. Restrict restoration privileges to system administrators. Configure System Maintenance to automatically defragment system hard drives every night. Write-protect all backup media. Question 28 0 out of 12 points Robert is looking for software that will help him organize tasks and deadlines for his marketing team projects. Which of the following software types will MOST effectively provide the tools that Robert needs? Selected Answer: Productivity software Answers: Productivity software Networking software Collaboration software Business software Question 29 0 out of 12 points Which of the following database features would provide a formatted, easy-to-read listing of the results of a query? Selected Answer: form Answers: record form SQL command report Question 30 12 out of 12 points https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 10/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Which of the following will improve the security of sensitive information on your device if it is lost or stolen? (Select all that apply.) Selected Answers: A screen lock Remote wipe Locator applications Answers: Keeping up to date with OS updates and patches Anti-malware software A screen lock Remote wipe Locator applications Remote backup Question 31 12 out of 12 points Which of the following contains information that allows the software vendor to collect and store data about software usage? Selected Answer: Software agreement Answers: Software installation instructions Software documentation Software subscription Software agreement Question 32 12 out of 12 points A network administrator is following the troubleshooting process to try and resolve a third-party application problem. After researching the issue and backing up the system, what is the next step in the troubleshooting process for the administrator? Selected Answer: Establish a theory of probably cause. Answers: Document the solution and process. Test any theories. Establish a theory of probably cause. Create an action plan. Question 33 0 out of 12 points Carlos is building a web page using HTML. The web page is not interactive and only contains static content. Which of the following language types BEST describes HTML? https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 11/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Selected Answer: Compiled Answers: Markup Compiled Interpreted Scripting Question 34 0 out of 12 points What is the general purpose and use of software? Selected Answer: Create data from information Answers: Create data from information Create knowledge from information Create information from data Create data from knowledge Question 35 12 out of 12 points Which of the following is not a form of biometrics? Selected Answer: smart card Answers: smart card fingerprint retina scan face recognition Question 36 12 out of 12 points What do biometrics use to perform authentication of identity? Selected Answer: Biological attributes Answers: Knowledge of passwords Biological attributes Possession of a device Ability to perform tasks https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 12/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Question 37 12 out of 12 points As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely use? Selected Answer: String Answers: Boolean String Float Integer Question 38 0 out of 12 points Which of the following are optical storage devices? (Select three.) Selected Answers: CD DVD USB flash drive Answers: CD SDHC SSD HDD DVD USB flash drive BD Question 39 12 out of 12 points Which of the following wireless technologies requires a distance of approximately 4 cm (1.5 inches) in order to establish a communications link between devices? Selected Answer: NFC Answers: NFC Bluetooth WiFi Infrared Question 40 0 out of 12 points https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 13/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... A network administrator is setting up a new wireless network access point. What should the administrator do to ensure the security of the router and network? (Select two.) Selected Answers: Change the admin password used to configure the network router. Set the wireless network encryption standard to WPA2. Answers: Eliminate or reduce interference. Change the network SSID (Service Set Identification). Change the frequency band of the router. Change the admin password used to configure the network router. Set the wireless network encryption standard to WPA2. Question 41 12 out of 12 points Which of the following are the fundamental types of relational methods associated with Structured Query Language (SQL)? (Select two.) Selected Answers: Manage information in the database Define the database structure Answers: Back up the data in a database Manage information in the database Define the database structure Upgrade the database software Increase the storage space for the database Question 42 12 out of 12 points A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure? Selected Answer: VPN Answers: VPN Bluetooth IMAP Hotspot Question 43 12 out of 12 points https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 14/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Which of the following is an advantage to using biometric scanners over hardware tokens? Selected Biometric scanners are harder to fool than hardware tokens. Answer: Answers: Biometric scanners are harder to fool than hardware tokens. Biometric scanners can provide multifactor authentication. Biometric scanners use software tokens instead of more expensive hardware tokens. Biometric scanners are cheaper to implement than hardware tokens. Question 44 12 out of 12 points Which of the following is the best definition for a LAN? Selected A network in a small geographic area, like in an office. Answer: Answers: The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less). A network in a small geographic area, like in an office. A network whose computers and servers are separated geographically but still connected. An extension of a private network over a shared or public network, such as the Internet. Question 45 0 out of 12 points A system engineer is helping to design new security measures for company headquarters. Which of the following authentication factors could be included as a solution for Type 2 (something you have) authentication? (Select two.) Selected Answers: A fingerprint A fob Answers: A fingerprint A pattern drawn on a screen A physical location A fob A password Question 46 0 out of 12 points https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 15/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Which of the following programming languages is a compiled language? Selected Answer: JavaScript Answers: SQL C Ruby JavaScript Question 47 12 out of 12 points A technician walks into the office with a UPS. What sort of threat will this device prepare a system for? Selected Answer: Power outage Answers: Power outage Denial-of-Service Data redundancy Wiretapping Question 48 12 out of 12 points Rick and Steve want to share information between their smart phones without connecting to the WiFi network. Which of the following is the least complicated way to accomplish this? Selected Answer: Bluetooth Answers: infrared NFC Bluetooth USB cable Question 49 0 out of 12 points You're troubleshooting a computer running Windows 10. The operating system has halted and a blue screen has been displayed on the monitor with an error message. Which of the following is the MOST likely first step that should be taken in troubleshooting the issue? Selected Update the BIOS. Answer: https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 16/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Answers: Uninstall the last application or system update that was installed. Check the voltage levels on the DC side of the power supply. Update the BIOS. Remove all memory modules and replace them one at a time until the error reappears. Search for the error in Microsoft's knowledgebase. Question 50 12 out of 12 points Which of the following is an advantage of DisplayPort 1.4 over HDMI 2.0? Selected DisplayPort has a greater maximum bandwidth than HDMI. Answer: Answers: DisplayPort can connect gaming consoles; HDMI can only connect computers to monitors. DisplayPort connection monitors are less expensive than HDMI connection monitors. DisplayPort is supported by more devices than HDMI. DisplayPort has a greater maximum bandwidth than HDMI. Question 51 0 out of 12 points A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that variable. Which of the following data types is the BEST for this purpose? Selected Answer: string Answers: integer float boolean string Question 52 12 out of 12 points As part of the troubleshooting process, you need to establish a plan of action to remove the root cause of the problem without destabilizing other parts of the system. What should your plan of action include? Selected Answer: Detailing steps and the resources needed to implement the solution https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 17/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Answers: Detailing steps and the resources needed to implement the solution Identifying possible causes of the problem Addressing multiple problems individually Escalating the problem Question 53 0 out of 12 points Firewalls, data encryption, backups, and passwords are designed to protect computing devices. These technologies are all examples of what? Selected Answer: data protection Answers: file compression security controls secure transactions data protection Question 54 0 out of 12 points Which of the following chips is responsible for processing audio input from a microphone and converting it into data? Selected Answer: DLP Answers: CPU DLP DSP GPU Question 55 12 out of 12 points A computer system can be interconnected to other computer systems for the purpose of sharing information with each other. What are these computer systems called? Selected Answer: Network clients Answers: Network interfaces Network services Network clients https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 18/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Local area networks (LANs) Question 56 0 out of 12 points What of the following is a reserved character in the ext4 file system? Selected Answer: : Answers: : ? | / Question 57 12 out of 12 points Which option should you use to respond to every single person included on an email? Selected Answer: Reply All Answers: Forward Reply Reply All CC Question 58 12 out of 12 points You sign up for an online class at the local community college. The course is all web based. You open your favorite browser to enter the class portal, and you get a message "Use one of these browsers." What is the problem? Selected Answer: Browser compatibility. Answers: Browser compatibility. The class has not started yet. You need to make a secure connection. You typed the URL wrong. Question 59 12 out of 12 points https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 19/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent log on after three unsuccessful logon attempts. Which of the following policies are BEST to configure? (Select TWO). Selected Answers: Account lockout threshold Minimum password length Answers: Enforce password history Account lockout duration Account lockout threshold Maximum password age Password complexity Minimum password length Question 60 12 out of 12 points Mark is a database administrator who's responsible for managing the records in a boat inventory relational database for a local chain of boat shops. Recently, the owners have decided to expand to several more stores. Mark has hired David, an assistant administrator, to help out. In order to get started, he wants to grant permission to the assistant to retrieve and view information in the database. Which of the following SQL commands can Mark use to grant this permission to David? Selected Answer: GRANT SELECT ON boatinventory TO david Answers: GRANT ALL ON boatinventory TO david GRANT UPDATE ON boatinventory TO david GRANT SELECT ON boatinventory TO david GRANT SELECT TO david ON boatinventory Question 61 0 out of 12 points Which of the following should not be used as a primary key in a table? Selected Answer: Username Answers: Username Employee ID Firat Name Social Security Number Question 62 0 out of 12 points https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 20/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... What is the term for code that keeps running as long as a certain condition is met? Selected Answer: Decision Answers: Branch Decision While loop For loop Question 63 12 out of 12 points Alice is an architect for a large design company. She spends most of her day working in a software program called AutoCAD. What do we call this type of software program? Selected Answer: Business-specific application Answers: Business-specific application Cloud-based solution Productivity application Collaboration software Question 64 12 out of 12 points What is the collective name for creations that are not the intellectual property of anybody? Selected Answer: Public Domain Answers: Unclaimed Works Federal Reserve Public Domain Royalty Free Question 65 0 out of 12 points Before two computers can communicate over a network, some type of network media must be used to connect the computers together. Which of the following are examples of network media? (Select three.) Selected Answers: Network protocols Network interface (adapter) https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 21/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Local Area Network (LAN) Answers: Copper wiring Network protocols Network interface (adapter) Fiber optics Local Area Network (LAN) Radio signals Near Field Communications (NFC) Question 66 12 out of 12 points Which of the following digital communication media does NOT require a connection to the Internet? Selected Answer: SMS Answers: Social network Discussion board Video conference SMS Question 67 0 out of 12 points A federal government agency is working on updating their employee handbook to specifically cover employee internet usage. Which of the following are topics that should be covered under this section in the handbook? (Select three.) Selected Answers: personal management policies data protection social media and email Answers: workplace surveillance personally identifiable information (PII) data destruction personal management policies data protection impersonation social media and email Question 68 12 out of 12 points https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 22/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Dana, an IT manager, is part of a transition team determining whether to keep the company's Excel flat file system for storing customer data or to switch to a database (such as PostgreSQL). Which of the following would be a significant advantage of switching from Excel to a database for storing customer data? Selected Answer: A database makes analyzing a million records just as easy as analyzing a few hundred. Answers: A database is useful for tracking simple data, such as customer addresses. A database makes analyzing a million records just as easy as analyzing a few hundred. A database is difficult to secure with different users having different privilege levels. A database is useful for transferring information between systems. Question 69 0 out of 12 points Christian has logged onto his bank's website. He wants to pay some bills electronically and transfer funds to his savings account. He checks to see if the padlock icon is visible in the address bar. The padlock is there, and it is green. What does that indicate? Selected Answer: The green color has no meaning. Answers: The certificate is pending, but you should trust it anyway. The green color has no meaning. A highly trusted certificate. You should not trust a green padlock. Question 70 0 out of 12 points Your company wants to use multifactor authentication. Which of the following would you most likely suggest? Selected Answer: [None Given] Answers: Fingerprint and retinal scan Password and passphrase Token and smartphone PIN and smart card https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 23/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Question 71 0 out of 12 points Which of the following is used to model real-world objects into computer code? Selected Answer: [None Given] Answers: Flow charting Object-oriented programming Algorithms Pseudocode Question 72 0 out of 12 points Peter is a regional sales manager for an online clothing retail company. He would like information on all the customers in his region and the purchases made by each of them during the last quarter. Which of the following database elements can BEST provide the information Peter needs? Selected Answer: [None Given] Answers: Form Table Report Query Question 73 0 out of 12 points Which of the following provides services to hosts on its network? Selected Answer: [None Given] Answers: Client Server Storage Email Question 74 0 out of 12 points Classes contain properties, which are the attributes or characteristics that objects can hold as fields or private variables. Which of the following is TRUE about properties? https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 24/25 6/4/24, 9:34 AM Review Test Submission: ITF+ Exam – COR-APR-24-FT IT... Selected [None Given] Answer: Answers: The properties are read-only, so there is no need to access them publicly Methods are used to read or write properties. Other programs can access and change properties directly. Properties in a class do not actually have the ability to store data in the fields or private variables. Question 75 0 out of 12 points You need a storage device that has very large storage capacity, is fast, and is relatively inexpensive. Which storage device will best suit your needs? Selected Answer: [None Given] Answers: USB flah drive hard disk optical SSD Tuesday, June 4, 2024 9:19:59 AM EDT ← OK https://carolinacybercenter.blackboard.com/webapps/assessment/review/review.jsp?attempt_id=_437026_1&course_id=_5112_1&content_id=_275… 25/25