[Free] 2018(Apr) EnsurePass Braindumps CompTIA FC0-U41 Dumps with VCE and PDF 11-20
CompTIA Strata IT Fundamentals
Question No: 11 – (Topic 1)
Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.
It is used to securely store public and private keys for log on , e-mail signing and encryption, and file encryption.
It is a device that works as an interface between a computer and a network.
It is a device that routes data packets between computers in different networks.
It is a device that contains amicroprocessor and permanent memory.
Explanation: A smart card is a credit card-sized device that contains a microprocessor and permanent memory. It is used to securely store public and private keys for log on, e-mail signing and encryption, andfile encryption. To use a smart card, a computer must have a smart card reader attached with it.
What is a smart card reader? A smart card reader is an interface device, which is used to read information from or write information to a smart card. Answer option B is incorrect. A network adapter is a device that works as an interface between a computer and a network.Answer option C is incorrect. A router is a device that routes data packets between computers in different networks.Reference: TechNet, Contents: quot;Appendix C – Hardware Supportquot;
Question No: 12 – (Topic 1)
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?
Answer: D Explanation:
An IPv6 anycast address is a single address that can be assigned to multiple interfaces. For example, an IPv6 address is assigned to a multi-homed computer. A packet sent to an anycast address is delivered to the first available interface of a device. An anycast address is used to provide loadbalancing and automatic failover. Currently, anycast addresses are used only as destination addresses and can be assigned only to routers.
Answer option A is incorrect. A unicast address identifiesa single interface within the scope
of the type of unicast address.
Answer option B is incorrect. A multicast address identifies multiple interfaces.
Question No: 13 – (Topic 1)
Which of the following stores user preferences related to a Web site?
Local User profile
Answer: A Explanation:
A cookie is a small bit of text that accompanies requests and pages as they move between Web servers and browsers. It contains information that is read by a Webapplication, whenever a user visits a site. Cookies are stored in the memory or hard disk of client computers. A Web site stores information, such as user preferences and settings in a cookie. This information helps in providing customized services to users. There is absolutely no way a Web server can access any private information about a user or his computer through cookies, unless a user provides the information. A
Web server cannot access cookies created by other Web servers.
Answer option B isincorrect. SSID stands for Service Set Identifier. It is used to identify a wireless network. SSIDs are case sensitive text strings and have a maximum length of 32 characters. All wireless devices on a wireless network must have the same SSID in order to communicate with each other. The SSID on computers and the devices in WLAN can be set manually or automatically.
Answer option D is incorrect. Media Access Control (MAC) address is a unique 48-bit address assigned to the network interface card (NIC) by theNIC manuurer. This physical address assigned to
NIC is used for mapping in TCP/IP network communication.
Answer option C is incorrect. Local user profile does not contain user preferences related to a Web site.
Question No: 14 – (Topic 1)
Andrew has a personal computer. One morning, he starts his computer and finds the following error message: quot;CMOS checksum failure.quot;What are the most likely causes of thiserror? Each correct
Answer represents a complete solution. Choose two.
BIOS has become outdated.
The CMOS battery has failed.
The CMOS chip has failed.
Software stored in the CMOS battery is infected by a virus.
Answer: B,C Explanation:
This error message is displayed when the BIOS detects a memory problem in the CMOS. The following are the most likely causes of the error:
The CMOS battery has failed. The CMOS chip has failed.
In order to rectify the error, a technician should try to replace theCMOS battery. If this step does not work, it may indicate that the CMOS chip is bad.
Answer option A is incorrect. An outdated BIOS will not display this error. The outdated BIOS may create problems with new hardware added to the computer. Answer option Dis incorrect. The
CMOS battery does not contain any software and cannot be infected by viruses.
Question No: 15 – (Topic 1)
Which of the following switches is used with the XCOPY command to copy directories and subdirectories, including empty directories?
Answer: D Explanation:
The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. Answer optionB is incorrect. The /o switch of the XCOPY command copies file ownerships and NTFS permissions on the files while copying them. Answer option C is incorrect. The /s switch of the XCOPY command is used to copy directories and subdirectories, except empty directories.
Answer option A is incorrect. The /q switch of the XCOPY command does not display file
names while copying them.
Question No: 16 – (Topic 1)
Which of the following provides authentication, encryption and data integrity for wireless devices?
Answer: D Explanation:
WTLS provides authentication, encryption and data integrity for wireless devices. Wireless Transport Layer Security (WTLS) is a security layer of WAP, which isspecifically designed for a wireless environment. It provides privacy, data integrity, and authentication for client-server communications over a wireless network. WTLS ensures that a client and server are authenticated so that wireless transactions remainsecure and the connection is encrypted. WTLS is required because a wireless network does not provide end-to-end security. Answer option B is incorrect. Wide Area
Network (WAN) represents a network spanned in a large geographic area. WANs connect two or more
LANs separated by a large distance. To connect LANs in a WAN network, carrier networks such as telephone companies provide the services. The basic types of connections or circuits WAN services use are circuit-switched, cell-switched, packet-switched, and dedicated connections. Answer option
A is incorrect. Password Authentication Protocol (PAP) is the least sophisticated authentication protocol, used mostly when a client calls a server running an operating system other than Windows.
PAP uses plain text passwords. Answer option C is incorrect. The Wireless Access Protocol (WAP) is a technology used with wireless devices. The functionality of WAP is equivalent to that of TCP/IP. WAP uses a smaller version of HTML called Wireless Markup Language (WML) to display Internet sites.
Question No: 17 – (Topic 1)
You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorithm. Which encryption standard should you choose?
Answer: D Explanation:
WPA 2 (Wi Fi Protected Access 2) uses AES encryption, which is endorsed by the National Security Administration.
The Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government.
The standard comprises three block ciphers, AES-128, AES-192, and AES-256. Each AES cipher has a
128-bit block size, with key sizes of
128, 192, and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES).
AES was announced by National Institute of Standards and Technology (NIST) as U.S.
(FIPS 197) on
November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable. It became effective as a standard on May 26, 2002. As of
2009,AES is one of the most popular algorithms used in symmetric key cryptography. It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information.
Answer optiond A andB are incorrect. WEP and WPA both use the RC-4 Stream cipher. What is RC4?
RC4 is a stream cipher designed by Ron Rivest. It is used in many applications, including Transport Layer Security (TLS), Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), etc. RC4 is fast and simple. However, it has weaknesses that argue against its use in new systems. It is especially vulnerable when the beginning of the output key stream is not discarded, nonrandom or related keys are used, or a single key stream is used twice. Some ways of using RC4 can lead to very insecure cryptosystems such as WEP.
Answer option C is incorrect. Temporal Key Integrity Protocol is a substitute for WPA, meant to replace WEP without requiring that hardware be replaced. Reference. http.//en.wikipedia.org/wiki/IEEE_802.11i
Question No: 18 – (Topic 1)
Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC card, and CompactFlash (CF)?
Memory card reader
Smart card reader
Answer: B Explanation:
A memory card reader is a device, typicallyhaving a USB interface, for accessing the data on a memory card such as a CompactFlash (CF),
Secure Digital (SD) or MultiMediaCard (MMC).
Answer option C is incorrect. Smart card readers are used to read smart cards. It is used as a communications medium between the smart card and a host.
Answer option D is incorrect. A barcode reader (or barcode scanner) is an electronic device for reading printed barcodes.
Answer option A is incorrect. There is no such device as e-book reader.
Question No: 19 – (Topic 1)
Which of the following AT Attachment (ATA)standards supports transfer mode UltraDMA/133?
Answer: B Explanation:
The AT Attachment-7 (ATA-7) standard supports transfer mode UltraDMA/133. With the market introduction of Serial ATA, the ATA is sometimes referred toas Parallel ATA (PATA).
What is Parallel ATA (PATA)?
Parallel ATA (PATA) is a standard interface for connecting storage devices such as the hard disk and CD-ROM drive inside a computer. It is the most common and least expensive interface for connecting storage devices. A PATA ribbon cable uses either a 40- conductor or an 80-conductor wire and is limited to 46 cm length. The new 80-wire ribbon cable appeared with the introduction of the Ultra DMA/66 mode. All forty additional wires in the new cable are ground wires, interleaved with the previously defined wires. The extra forty conductors are all ground lines, placed there to provide additional shielding and protection against crosstalk between conductors. A maximum of two devices can be connected to a PATAport. Parallel ATA
(PATA) 133 has a data transfer speed of 1064 Mbps.
Answer option A is incorrect. The AT Attachment-6 (ATA-6) standard supports transfer mode UltraDMA/100.
Answer option D is incorrect. The AT Attachment-5 (ATA-5) standard supports transfer mode UltraDMA/66.
Answer option C is incorrect. The AT Attachment-4 (ATA-4) standard supports transfer mode UltraDMA/33.
Question No: 20 – (Topic 1)
Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?
Answer: D Explanation:
HDMI stands for High-Definition Multimedia Interface. It is a standard, uncompressed, and all-digital audio/video interface. HDMI is capable of delivering the highest quality digital video and multichannel digital audio on a single cable. It provides an interface between any audio/video sources, such as a DVD player or a computer and a digital television (DTV) or video monitor. HDMI transmits all ATSC HDTV standards and supports 8-channel digital audio, with extra bandwidth to accommodate future enhancements. HDMI has two types of connectors. Type A and Type B. Type A and Type B connectors use 19 pins and 29 pins, respectively. The Type B connector is designed for very high-resolution displays that are expected in near future.
Answer option B isincorrect. S-Video, also known as Y/C video, stands for Super-Video. It
is a technology for video transmission. Using this technology, the video is transmitted into two separate signals. One is used for color, and the other for brightness. Sometimes S- Video signals are considered as a type of component video signal. However, its quality is inferior to other complex component video schemes such as RGB. This technology produces sharper images than those produced by composite video, which carries the entire set of signals in a single line. For using SVideo, the device sending the signal must support S-Video output and the device receiving the signal needs to have an S-Video input jack.
Answer option A is incorrect. DVI stands for Digital Visual Interface. It is a standard for high speed, high resolution digital display invented by
Digital Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital signals coming from DVI connections. However, some monitors come with both types of cables. DVI has three main categories of connectors. They are. DVI-A, DVI-D, and DVI-I. DVI-A is an analog-only connector, DVI-D is a digital-only connector, and DVI-I is an analog/digital connector. DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and HDTV with a single set of links.
Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.
Answer option C is incorrect. A VGA or SVGA connector is a 15-pin, three rows, female connector, on the back of a PC used for connecting monitors. Reference. quot;http.//en.wikipedia.org/wiki/High-Definition_Multimedia_Interfacequot;
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|