CompTIA Tech+ Practice Test 12

CompTIA Tech+ Practice Test 12

CompTIA Tech+ Practice Test

1 / 20

A user wants to automate repetitive tasks like renaming files. Which tool would be most effective?

2 / 20

A small business wants to prevent unauthorized access to its wireless network. What’s the best solution?

3 / 20

A technician needs to install an OS on multiple computers efficiently. What should they use?

4 / 20

You are comparing different CPUs. Which feature most directly affects how many tasks it can handle simultaneously?

5 / 20

An email from "support@yourcompany.it" asks for your password to resolve an issue. What type of attack is this?

6 / 20

A user wants to install software from an unknown website. What is the safest action?

7 / 20

A user installs a free screensaver, and their browser homepage changes without permission. What likely happened?

8 / 20

Your team is working on a software project. Which methodology encourages continuous feedback and iterative development?

9 / 20

An employee needs to enter sales figures and calculate totals automatically. Which tool should be used?

10 / 20

A user asks you to set up a shared workspace where multiple users can edit documents simultaneously. What service should you recommend?

11 / 20

You are choosing a programming language to create a mobile app. Which of the following is most appropriate?

12 / 20

An employee opens an email attachment and a strange program installs itself. What has likely occurred?

13 / 20

A software developer wants to test a new app without affecting their main system. What should they use?

14 / 20

An intern accidentally deletes an important file. Which strategy would best prevent permanent data loss?

15 / 20

Your company wants to allow remote workers to access internal resources securely. What should be implemented?

16 / 20

You are tasked with choosing a storage device that is fast and has no moving parts. Which would be best?

17 / 20

A user notices their laptop shuts down when running multiple programs. What component is most likely being overutilized?

18 / 20

You are helping a friend buy a new computer for graphic design work. Which specification is most important?

19 / 20

A coworker is developing an app that stores user data like names, emails, and login attempts. Which tool would be best for organizing this information?

20 / 20

A user is unable to access a website by its name, but can reach it using its IP address. What is the most likely cause?

Your score is

The average score is 0%

0%