Tech+ Practice Tests
CompTIA Tech+ Practice Test 5
Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 20
1. Question
Which database feature allows you to retrieve and generate results or reports based on searches you performed earlier to locate specific information?
CorrectIncorrect -
Question 2 of 20
2. Question
Which data type can effectively transform unstructured data into semi-structured or structured data?
CorrectIncorrect -
Question 3 of 20
3. Question
Which logical component of a relational database consists of one or more fields that uniquely identify each record in a table, such as a cust_ID?
CorrectIncorrect -
Question 4 of 20
4. Question
Which of the following is NOT an example of a database constraint or constraint enforcement in a relational database?
CorrectIncorrect -
Question 5 of 20
5. Question
In a key–value database, how many times can the same key exist within a given collection?
CorrectIncorrect -
Question 6 of 20
6. Question
When a file is created or modified in Windows, its archive bit is set to 1 to indicate that it needs to be backed up. What does it mean when the archive bit for a file is set to 0?
CorrectIncorrect -
Question 7 of 20
7. Question
You want to back up files that have been created or modified since the previous backup. Which backup type is most suitable for this operation?
CorrectIncorrect -
Question 8 of 20
8. Question
Identify the backup locations and their drawbacks by matching the location type in the left column to its drawback in the right column.
Sort elements
- Single point-of-failure; high initial costs; complex setup.
- Vulnerability to physical destruction; inability to access data remotely.
- Dependency on speed and access; reduced control over data
-
Network-attached storage
-
Local storage
-
Cloud-based storage
CorrectIncorrect -
Question 9 of 20
9. Question
Flash drives and SD cards are often used for quick and inexpensive backups of personal data. Despite their convenience, what is the most significant drawback of relying on these devices for data backup?
CorrectIncorrect -
Question 10 of 20
10. Question
An individual contacts the human resources department from an external phone line, claims to be a long-time vendor, and requests that the employee phone list be emailed to him without providing proper identification. Which type of attack does this scenario represent?
CorrectIncorrect -
Question 11 of 20
11. Question
Which cookies may be exempt from GDPR privacy requirements if they are determined to be critical to a website’s functionality?
CorrectIncorrect -
Question 12 of 20
12. Question
To improve security, a company requires employees to change their passwords monthly and to register a mobile number that receives a one-time password (OTP) each time they log in to company servers. What type of authentication method is being used in this scenario?
CorrectIncorrect -
Question 13 of 20
13. Question
How does the least privilege model ensure top-notch security for a network?
CorrectIncorrect -
Question 14 of 20
14. Question
A company deploys user access accounting across all its offices across continents. They decided to install software in laptops that would use GPS satellites to track the device’s movements by gathering latitude, longitude, and elevation of the location. What type of tracking is explained in this scenario?
CorrectIncorrect -
Question 15 of 20
15. Question
A user receives an email that appears to be from their bank. The message claims that suspicious activity has been detected on the account and instructs the user to click a link and confirm their login credentials immediately. The link directs the user to a website that closely resembles the bank’s official site but uses a slightly altered URL.
Which type of attack is being attempted?
CorrectIncorrect -
Question 16 of 20
16. Question
A technician is researching a security vulnerability and needs to ensure the information being used is accurate and trustworthy before applying a fix in a production environment.
Which action best helps validate that the source is legitimate?
CorrectIncorrect -
Question 17 of 20
17. Question
Windows and macOS are proprietary operating systems that require purchasing a license to install and use them. What type of licensing is required to use NetBSD?
CorrectIncorrect -
Question 18 of 20
18. Question
Which of the following is NOT an example of an effective password?
CorrectIncorrect -
Question 19 of 20
19. Question
An organization is reviewing its password policy to better protect user accounts and comply with security best practices. Which policy change would most effectively reduce the risk of unauthorized access due to compromised passwords?
CorrectIncorrect -
Question 20 of 20
20. Question
An organization is redesigning its password reset process for highly sensitive systems. Due to strict security requirements, the company wants to minimize the risk of social engineering and unauthorized resets.
Which password reset approach best meets this requirement?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Correct
- Incorrect
