Comptia Itf+ Practice Questions
25 community-sourced questions and answers. Free — no login.
Which of the following would BEST help to protect against unauthorized use of a mobile phone? a) Pop-up blocker and cookie cleaner b) Alternate browser and private mode c) PIN and screen lock d) Encrypted messaging and time-expiring texts
c) PIN and screen lock
A user buys a new desktop computer and then connects a cable that allows the computer to connect to the web. Which of the following ports would MOST likely be used? a) DVI b) HDMI c) Ethernet d) Thunderbolt e) Bluetooth
c) Ethernet
Which of the following software licensing types is MOST likely to require the renewal of terms/conditions agreements and has annual fees? a) One-time purchase b) Open source c) Group license d) Subscription
d) Subscription
Ann, a user, connects a new mouse to a laptop, and the mouse works with no additional steps taken by Ann. Which of the following installation types does this BEST describe? a) Driver installation b) Plug and play c) Web-based d) Manual
b) Plug and play
Which of the following protocols is used for secure web browsing? a) SFTP b) HTTPS c) L2TP d) IMAP
b) HTTPS
Which of the following is the MOST secure password? a) happybirthday12 b) HappyDay12! c) H*ppyBirthDay%12 d) HappyBirthDay123
c) H*ppyBirthDay%12
A school has a sign posted in the computer lab that says, "Sharing passwords with others is prohibited." This is an example of: a) social networking. b) a security policy. c) file sharing. d) instant messaging.
b) a security policy.
08. Which of the following storage units can be used to represent 1024MB? a) 1GB b) 1KB c) 1TB d) 1PB
a) 1GB
09. An image displayed on a monitor is an example of: a) input b) output c) processing d) storage
b) output
10. Which of the following computer components is primarily responsible for preventing overheating? a) Fan b) SSD c) CPU d) Firmware
a) Fan
You are running virtual machines on a single physical server. The server operating system does not run any other applications and is dedicated to virtualization. What type of hypervisor is this? a) Type 1 b) Type 2 c) Type 3 d) Type 4
a) Type 1
Which of these is not a feature of a CPU? a) Multicore b) 64-bit processing c) L1 cache d) DDR
d) DDR
What manages and controls the speed of a motherboard's buses? a) RAM b) CPU c) Chipset d) L1 cache
c) Chipset
Which of these ports are physically identical? a) USB Type-A and USB Type-B b) Thunderbolt and Mini DisplayPort c) DisplayPort and FireWire d) DVI and VGA
b) Thunderbolt and Mini DisplayPort
What kind of drive reads CompactFlash storage? a) USB flash drive b) Card reader c) HDD d) SDD
b) Card reader
If you have a PC with a 32-bit CPU, which operating systems will run on it? a) 32-bit only b) Both 32-bit and 64-bit c) Neither 32-bit nor 64-bit d) 64-bit only
a) 32-bit only
Which OS configuration uses data labels to control resource access? a) Services b) Scheduled tasks c) Mandatory access control d) EULA
c) Mandatory access control
What should you install before you download and install additional software on a new PC? a) Security software b) Nothing c) Updates to other applications d) Drivers for hardware devices
a) Security software
What is a root directory? a) The top-level storage location on a volume b) The folder containing the system files c) The folder containing the boot files d) The folder containing the signed-in user's personal files
a) The top-level storage location on a volume
Which file property makes a search faster for content within files? a) Archive b) Indexed c) Compressed d) Encrypted
b) Indexed
What differentiates a router from a switch? a) Routers are for WANs, and switches are for LANs. b) A router provides a path out of the LAN, such as to the internet. c) A switch provides a path out of the LAN, such as to the internet. d) Routers are for client-server networks, and switches are for peer-to-peer networks.
b) A router provides a path out of the LAN, such as to the internet.
Which wireless encryption standard is the most secure? a) WEP b) WPA c) WPA2 d) WPS
c) WPA2
In which way is a cellular internet connection superior to wired and WiFi? Bandwidth Mobility Number of concurrent connections Security
Mobility
Disabling the Bluetooth adapter on a laptop when it is not in use is an example of: Dumpster diving Cracking Device hardening Hardware theft prevention
Device hardening
Which of the following might you want to disable to protect your privacy? Autofill forms Hyperlinks Certificates InPrivate browsing
Autofill form
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials