ITF+ Random Questions Flashcards
To familiarize myself with the topics. IT Concepts and Terminology Infrastructure Applications and Software Software Development Concepts Database Fundamentals Security
Which connector type is standard for connecting a network cable to a switch or router?
RJ-45 connector
A new employee at your office is trying to connect a laptop to a projector for a presentation. The employee has only found a cable in the conference room with a connector that supports both video and audio output. Which type of cable should the employee look for to ensure the connection can transmit high-definition video and audio to the projector?
HDMI
A company’s document management system is set to only allow access to financial reports after regular business hours to users within the finance department who have a managerial role. What type of access control does this scenario exemplify?
Rule-based access control
When troubleshooting a computer that is unable to connect to the internet, which of the following approaches BEST aligns with the divide and conquer method?
Check the network configuration settings, such as IP address and DNS.
You are setting up a new workstation and need to connect a high-definition monitor to the computer. Which of the following connectors would be best suited for this purpose?
HDMI
Which feature of a web browser should be used when you want to visit websites without saving the history, cookies, or temporary files related to your activities during that session?
Private browsing
In a corporate setting, when an employee is unable to see if their colleagues are online or busy in their instant messaging software, what should they check first to resolve this issue?
Verify if the status visibility feature is enabled in the settings
What is a key benefit of generating meaningful reports from collected data?
It helps identify trends and patterns for better decision-making
When defining a disaster recovery plan, which of the following should be given the highest priority for data restoration to ensure the quickest recovery of critical operations?
Restoring access to critical data
Which application delivery method is characterized by software that is installed on a user’s device, does not require a network connection to function, and stores files directly on the device?
Locally installed
Your team is working on a program that’s supposed to run with high performance on a user’s computer. You need to choose a programming language that, after writing the code, will be translated into machine code before it’s executed on the computer. Which type of language will you choose?
A compiled programming language
When attempting to solve a problem on a computer, why is it important to establish a theory of probable cause?
It allows troubleshooters to focus on specific potential issues.
Which type of software would you use to create and edit spreadsheets?
Spreadsheet software
An employee in your company has received a friend request from someone claiming to be a coworker. The employee views the profile and sees that there are mutual friends from the company and the profile includes work-related posts. What should the employee do to maintain confidentiality best practices before accepting the request?
Verify the identity of the individual by other means
A local library is integrating smart technology to optimize energy usage. They have decided to install smart thermostats that can be controlled remotely through the internet. Which type of device is the library incorporating, and why is it suitable for this purpose?
IoT smart thermostat