Coursera Answers

Practice Exam for CompTIA ITF+ Certification Coursera Quiz Answers

In this article i am gone to share Coursera Course: Practice Exam for CompTIA ITF+ Certification All Weeks Quiz Answers with you.. | Practice Exam for CompTIA ITF+ Certification Coursera Quiz Answers

Enrol Link:ย  Practice Exam for CompTIA ITF+ Certification

Practice Exam for CompTIA ITF+ Certification Coursera Quiz Answers


 

WEEK 1 QUIZ ANSWERS

Practice Quiz: Readiness Assessment Answers

Question 1)
While using a computer, you notice that the system emits a series of beeps during startup. You suspect a hardware issue. What could be the cause of the beep codes?

  • Overheating of the CPU
  • Insufficient RAM
  • A software conflict
  • Loose connection of the graphics card

Question 2)
Youโ€™ve received a call asking for help with a computer. Which of the following is the first step in the troubleshooting process?

  • Reinstall the operating system
  • Update software drivers
  • Identify the problem and gather information
  • Restart the computer

Question 3)
Youโ€™ve identified that your computer is experiencing memory-related errors. Which key component of a computer system would you focus on to solve this issue?

  • RAM
  • GPU
  • CPU
  • Motherboard

Question 4)
You are experiencing frequent system crashes and error messages on your computer. You suspect it may be related to the hardware. Which component could be causing the issue?

  • The monitor
  • The keyboard
  • The Hard Disk Drive (HDD)
  • The Power supply unit (PSU)

Question 5)
Youโ€™re developing a web application that requires storing and retrieving user information. Which database model would be most suitable for your application?

  • Network database model
  • Hierarchical database model
  • NoSQL database model
  • Relational database model

Question 6)
Which is the most common way to create dynamic web pages using โ€˜client-side scripting?โ€™

  • Java
  • Python
  • JavaScript
  • XML

Question 7)
Youโ€™re experiencing slow internet speeds on your computer, but other devices on the same network are working fine. Which of the following is the likely cause of this issue?

  • Incorrect DNS settings
  • Network congestion
  • A faulty Ethernet cable
  • A faulty router

Question 8)
You need to connect multiple computers in your office to a shared storage device to enable data sharing and centralized backup. Which network-attached storage (NAS) configuration would suit your requirements?

  • RAID 10
  • RAID 0
  • RAID 1
  • RAID 5

Question 9)
Youโ€™re on the phone with a customer who has received an email with a link asking him to provide his login credentials for an online banking account. What type of cybersecurity attack does this email most likely represent?

  • Phishing attack
  • Denial-of-service (DoS) attack
  • Malware attack
  • Man-in-the-middle attack

Question 10)
You want to enhance the security of your home network by encrypting your wireless network. Which security protocol should you use?

  • WPA2 (Wi-Fi Protected Access 2)
  • WEP (Wired Equivalent Privacy)
  • WPS (Wi-Fi Protected Setup)
  • WPA (Wi-Fi Protected Access)

 


 

WEEK 2 QUIZ ANSWERS

Instructions

Overview

The following final exam for the Technical Support PC contains the type and style of questions in the CompTIA IT Fundamentals (ITF+) certification exam. Note that the ITF+ exam contains 75 questions worth 900 points with a passing score of 650 points. You are allotted 60 minutes to complete it. By completing this exam it will serve as practice for the ITF+ exam and help you gauge your preparedness. Before starting the exam please ensure you have reviewed the content. Good luck!

Graded Quiz: Practice Exam for ITF+ Certification Quiz Answers

Question 1)
What is a 7-bit character set that is 128 characters including the upper & lowercase English alphabet, the numbers 0-9, and punctuation marks?

  • Base 10
  • Hexadecimal
  • ASCII
  • Binary

Question 2)
Binary is a number expressed in the base-____ numeral system.

  • 0
  • 2
  • 100
  • 10

Question 3)
What type of number contains up to seven digits, and has at least one decimal place?

  • Float
  • Doubles
  • Char
  • Boolean

Question 4)
What are the common data types used for numbers?

  • Floats, chars
  • Integers, strings
  • Strings, chars
  • Integers, floats

Question 5)
You are thinking about adopting a dog and want to create a Boolean search that matches two criteria: dog breed, activity level. Which Boolean operator would be used between the two terms to return your desired results?

  • AND
  • NOT
  • LIKE
  • OR

Question 6)
What computer memory is short term, can be read and changed in any order, and is considered a volatile memory?

  • Cache memory
  • Graphics memory
  • RAM
  • ROM

Question 7)
What function writes data to memory acting on instructions from the operating system and software?

  • Input
  • Processing
  • Storage
  • Output

Question 8)
When assessing the possible security improvements, you want to find the best solution at the lowest cost. What can be performed to estimate the strength and weakness of each approach to find the best method at the lower cost?

  • Cost-Benefit Analysis (CBA)
  • Total Cost of Ownership (TCO)
  • Total Cost Analysis (TCA)
  • Return on Investment (ROI)

Question 9)
In a data-driven business decision, what process is used to determine the type of data that will be captured for collection so it can be analyzed and possibly stored for future reference?

  • Meaningful Reporting
  • Data Correlation
  • Data Capture and Collection
  • Meaningful Collection

Question 10)
In regards to bandwidth, what is the smallest unit of measurement for data transfer?

  • Terabytes per second
  • Kilobytes per second
  • Bytes per second
  • Bits per second

Question 11)
A byte consists of how many bits?

  • 100
  • 2
  • 8
  • 10

Question 12)
You receive a support call from a customer. What is the first step that you should take using the troubleshooting methodology?

  • Document findings/lessons learned, actions, and outcomes
  • Research knowledge base/internet, if applicable
  • Establish a theory of probable cause
  • Identify the problem

Question 13)
A user has contacted you with multiple issues for their computer system. What would be the best course of action to take using the troubleshooting methodology?

  • Approach each problem individually
  • Run updates on the computer system
  • Attempt to duplicate all of the problems simultaneously
  • Ask a coworker or supervisor

Question 14)
Phishing is an example of what type of confidentiality concern?

  • Wiretapping
  • Eavesdropping
  • Snooping
  • Social engineering

Question 15)
A high school holds a vote for student council president. The vote tally is documented on a spreadsheet on the school network. An individual locates the spreadsheet and changes the vote tally for a different candidate, changing the outcome. What type of integrity concern would this be?

  • Denial of service
  • Impersonation
  • Unauthorized information alteration
  • Replay attack

Question 16)
From the list below, what is an anti-virus/malware protection best practice?

  • Run automatic quick scans only once a year
  • Configure daily updates
  • Disable automatic program updates
  • Disable real-time protection

Question 17)
When installing and configuring a new router what action should be taken with the router’s default password to keep a network secure?

  • Tell all your friends the new password so they can connect anytime
  • Keep the default password on the router
  • Change the default password on the router to something only you know
  • Remove all passwords from the router to make it accessible

Question 18)
Your children who are in elementary school use the family computer to do homework. You are concerned that your children will view content on the internet that is inappropriate. What is the best option to handle this situation?

  • Limit the amount of time that you allow your child to use the computer
  • Tell your child not to visit questionable sites
  • Put website tracking software on your computer
  • Use parental control software to create whitelists and blacklists for appropriate and inappropriate content

Question 19)
For the handling of confidential information at a corporation, which of the following would not be an advisable procedure to use?

  • Have employees lock their computer screens when they leave their desks
  • Have employees not open suspicious emails with attachments
  • Have employees shred printed copies of confidential information when finished with it
  • Have employees connect their personal devices to the network

Question 20)
What type of multi-factor authentication can be used to determine a user’s identity with the recognition of a fingerprint or retinal scan?

  • Biometrics
  • Soft token
  • Pin
  • Hardware token

Question 21)
You are a network administrator and want to define access rights by specific roles within a company. What is this type of access called?

  • Role-based
  • Risk-based
  • Rule-based
  • Attribute-based

Question 22)
What nonrepudiation method is used to determine if someone was present in an unauthorized location by use of recordings?

  • Video
  • Signature
  • Biometrics
  • Receipt

Question 23)
What method is used to crack passwords by using a list of common words and running them in various combinations?

  • Man-in-the-middle attack
  • Spidering
  • Brute force attack
  • Dictionary attack

Question 24)
Your new job requires you to login to multiple sites. From the list below, what would be the best course of action?

  • Leave the default password assigned to you by the network admin
  • Create complex passwords for each site and use a password manager
  • Make up one password and use across all sites
  • Create easy passwords for all sites

Question 25)
What do you use to decrypt a smartphone or tablet when you want to use it?

  • A VPN
  • A PIN or passcode
  • A secure network connection
  • Antivirus software

Question 26)
What email encryption works by exchanging digital certificates between users?

  • OpenPGP
  • HTTPS
  • VPN
  • API

Question 27)
Which RAID level is not used for redundant storage, and treats two or more drives as a single unit?

  • RAID 1
  • RAID 0
  • RAID 10
  • RAID 5

Question 28)
What type of disaster recovery site has no power, would need equipment for IT functions, and takes the longest time to deploy during a disaster?

  • Hot site
  • Hot-cold site
  • Cold site
  • Warm site

Question 29)
What provides a database output that is formatted and summarized?

  • Query
  • Import/Export
  • Report
  • Create

Question 30)
Which of the following is true for a flat file database?

  • It has multiple tables related to one another
  • It can be used concurrently by multiple individuals
  • It is difficult to manage as it contains redundant and inconsistent data
  • It stores data in a structured way that is easy to retrieve

Question 31)
What type of database consists of a schema, tables, fields, and constraints?

  • Document database
  • Non-relational database
  • NoSQL
  • Relational database

Question 32)
You have a set of data that includes names, phone numbers, and addresses stored in an Excel sheet. What term best describes this data?

  • JSON data
  • Non-structured data
  • Semi-structured data
  • Structured data

Question 33)
What SQL constraint prevents duplicate values from being stored in a specific column?

  • UNIQUE
  • INDEX
  • DEFAULT
  • FOREIGN KEY

Question 34)
What SQL command removes one or more existing records from a table?

  • Insert
  • Select
  • Update
  • Delete

Question 35)
In regards to database access, what method is suitable for accessing a database that is stored on a local area network and only has a few users?

  • Direct/manual access
  • User interface/utility access
  • Programmatic access
  • Query/report builders

Question 36)
What type of backup is performed when the database is running?

  • Cold backup
  • Logical backup
  • Hot backup
  • Warm backup

Question 37)
What type of programming language converts the source code into an executable file?

  • Query language
  • Interpreted programming language
  • Compiled programming language
  • Assembly language

Question 38)
What type of programming language would you use to request and retrieve data from a database?

  • Compiled programming language
  • Interpreted programming language
  • Query language
  • Assembly language

Question 39)
What type of programming language uses an interpreter to translate commands and does not require a compiler?

  • Scripting language
  • Query language
  • Assembly language
  • Markup language

Question 40)
You are given the task to write pseudocode for a program that reads a file with the numbers 1 through 10 and prints each out to the console. From the options below, what would be your best choice?

  • Open file, write number, close file ,end
  • Read number, if not at end of file then continue to next number, else close file
  • Start, open file, read number, write number, if not at end of file then continue to next number, else close file, end
  • Open file, read number, write number, continue to next number

Question 41)
Your instructor has given you instructions to write a program that contains looping. The one condition is you must check the condition at the beginning of the loop. From the options below which is your best choice?

  • While loop
  • For loop
  • For…Each loop
  • Do…While loop

Question 42)
What type of logic component would be best suited for choosing options based on one or more variables?

  • Looping
  • Branching
  • Sequence
  • Pseudocode

Question 43)
What is a data structure that contains a group of data elements of the same data type?

  • Variables
  • Vectors
  • Constants
  • Arrays

Question 44)
What is a block of computer code that performs a task and can be called and reused repeatedly?

  • Identifier
  • Object
  • Function
  • Container

Question 45)
During program execution what is the term that describes a value that cannot change?

  • Variable
  • Constant
  • Function
  • Object

Question 46)
When using macOS, what is the first step for an initial hard drive setup?

  • Find disk utility for managing internal and external drives
  • Type fdisk in the command line to begin the process
  • Before setting up the hard drive the correct drivers must be installed
  • Find disk management to view what is installed along with drive partitions

Question 47)
You are using a Windows operating system and a newly installed program will not close. What command line keyword is used to end the program?

  • Taskkill
  • killall
  • First use “ps -ax” to view the PIDs of running processes, and then type “kill (PID)”
  • end_program

Question 48)
Which type of file system has support for large hard disk drives and journaling, file compression and encryption, and uses permissions to control access to files or folders?

  • HFS
  • NTFS
  • Ext4
  • FAT32

Question 49)
Which of the following has to be a condition for a device driver to work?

  • The driver supports 32-bit operation for a 32-bit CPU or 64-bit operation for a 64-bit CPU
  • The driver is compatible with the hardware
  • The driver is the correct type for the operating system
  • All of the above

Question 50)
What type of productivity software allows you to write, modify or format text, do markup and proofing, and print?

  • Presentation software
  • Word processing software
  • Spreadsheet software
  • Visual diagramming software

Question 51)
Google docs is what type of collaboration software?

  • Online workspace
  • Instant messaging software
  • Document sharing software
  • Conferencing software

Question 52)
What type of installation is a program that does not need internet access to run and is located on the C: drive of a Windows OS computer?

  • Cloud hosted
  • Locally installed
  • Local network hosted
  • None of the above

Question 53)
What type of application architecture model stores all of the required elements on a single server?

  • One-tier model
  • n-tier model
  • Two-tier model
  • Three-tier model

Question 54)
You are helping a friend by reviewing a website they created about adopting animals. You find an error on one of the webpages and your friend updates the website. You refresh the webpage but do not see any updates to the site. What would be your best option?

  • Tell your friend to restart their computer
  • Clear the cache
  • Close all of the browser windows
  • Turn off your computer for 30 seconds and restart

Question 55)
There are four settings that can be used for proxy servers. From the options below, what setting is used with a web browser?

  • SSL proxy
  • FTP proxy
  • HTTP proxy
  • SOCKS host

Question 56)
What type of software license allows the users to modify the code or make changes to the program?

  • Single use license
  • Group use/site license
  • Concurrent license
  • Open source license

Question 57)
You own a business with 10 employees and want to purchase a license for software to enable all 10 employees to use the software at the same time on their machines. What type of license would that be?

  • Single use license
  • Open source license
  • Group use/site license
  • Concurrent license

Question 58)
If your computer begins to have difficulties after an installation or upgrade, what startup option can be used that only makes essential hardware and software available?

  • Safe mode
  • Last known good configuration
  • Enable boot logging
  • Debugging mode

Question 59)
What allows electronic devices like cell phones and computers to exchange data over short distances using radio waves?

  • Thunderbolt
  • USB
  • Firewire
  • Bluetooth

Question 60)
What type of cable carries digital video signals, including audio, video, and control and is also known as IEEE-1394?

  • Firewire
  • Thunderbolt
  • VGA
  • HDMI

Question 61)
After receiving a new pair of speakers you open the box to see they attach to the desktop computer through a 3.5mm analog headphone jack. When examining the back of the computer you see a section that is color coded for different types of connections. Which color is best suited for output to the speakers?

  • Lime green
  • Pink
  • Light blue
  • Purple

Question 62)
You have connected a keyboard to your computer, what must be done next in order for the keyboard to begin working?

  • Nothing else is required as the keyboard is plug and play and it will be automatically recognized by the computer and begin working
  • The drivers for the keyboard need to be manually loaded to the computer
  • The drivers already exist within the computer and must be activated
  • The keyboard will not work as it is an IP-Based peripheral and must be connected to a local area network (LAN)

Question 63)
What is responsible for locating the drive that has the operating system and runs programs that initialize essential parts of the computer?

  • BIOS
  • RAM
  • CPU
  • GPU

Question 64)
What is a hardware component that allows a dedicated and full time connection to a network?

  • SSD
  • NIC
  • CPU
  • GPU

Question 65)
An active heat sink is normally attached to what in a computer?

  • CPU
  • NIC
  • SSD
  • RAM

Question 66)
What is one advantage of cable internet?

  • Considered as an “Always-on” connection
  • Data is digitally transmitted rather than analogically
  • Faster than fiber optics
  • Connection speed will not be affected by neighborhood usage

Question 67)
What type of wireless connection is also known as a fixed wireless service?

  • DSL
  • Satellite
  • Cellular
  • Radio Frequency

Question 68)
What type of local storage drive uses lasers to read and write data?

  • Flash drive
  • HDD
  • SSD
  • Optical drive

Question 69)
What type of storage allows for multiple machines to share storage over a network and allows the centralization of data?

  • RAM
  • Optical
  • SSD
  • NAS

Question 70)
What term refers to a group of computers used to perform work and is typically connected to a local area network for printing?

  • Server
  • Clients
  • RAID
  • Workstations

Question 71)
What type of device connects or manages other computers on a network and can be hardware or software?

  • Tablet
  • Mobile phone
  • Workstation
  • Server

Question 72)
What identifies the device’s host network and the location of the device on the host network?

  • MAC address
  • Router
  • URL
  • IP address

Question 73)
What connects computers over a relatively short distance, allowing users to share data, files, and resources?

  • WAN
  • Modems
  • DNS
  • LAN

Question 74)
What can support up to four data streams and is the current minimum standard for equipment with Wi-Fi capabilities?

  • 802.11ac
  • 802.11n
  • 802.11g
  • 802.11b

Question 75)
Which wireless security encryption standard, out of the following options, offers the best security strength?

  • WEP
  • WAP
  • WPA
  • WPA2

 


 

WEEK 3 QUIZ ANSWERS

Honors Assignment

Exam – Cloud Computing Basics

Question 1)
Of the five essential cloud characteristics what are measured services?

  • Paying only what you use or reserve as you go
  • Accessing cloud resources using a simple interface without the requirement of human interaction
  • Accessing more resources when you need them and scaling back when you do not
  • Resources are accessed via the network through standard mechanisms and platforms

Question 2)
What are the key drivers for moving to the cloud?

  • Cost, timelines, and risk
  • Security, workload, and hardware
  • Agility, cost, and optimized server utilization
  • Development, exposure, and infrastructure

Question 3)
There are three main cloud service models: SaaS, PaaS, and IaaS. What type of user is associated with the IaaS service model?

  • Any user
  • Developer
  • Testers
  • System Admin

Question 4)
What cloud service provides resources on-demand for customers?

  • SaaS
  • PaaS
  • IaaS
  • CaaS

Question 5)
What is a piece of software that runs above the physical server or host and creates virtual machines?

  • A cloud region
  • A container
  • An operating system
  • A hypervisor

Question 6)
Which of the following is not a characteristic of bare metal servers?

  • Is a multi-tenant system shared with other users
  • Have full access and control because there is no hypervisor required
  • Dedicated and intended for long term, high performance use
  • Are physical machines

Question 7)
In cloud computing what term is used when IT resources are able to scale up in response to a load and automatically deprovision resources when not needed?

  • Data and AI
  • Composite cloud
  • Cloud scaling
  • Modernization

Question 8)
What is a key attribute of serverless computing?

  • Pay only when invoked and used
  • Pays for virtual machines even when idle
  • Needs provisioning of servers and runtimes
  • Needs manual configuration for scaling

Question 9)
Of the three cloud monitoring categories, what is a characteristic of the infrastructure category?

  • Helps identify minor and large-scale failures
  • Helps to improve the user experience
  • Helps to meet app and user SLAs
  • Helps track processes, queries, and reliability of database management systems

Question 10)
According to the Cloud Security Report by Cybersecurity Insiders, what is the top cloud security concern?

  • Data loss and leakage
  • Audit and compliance
  • Access management and reporting
  • Directory services and authentication