[Free] 2018(Apr) EnsurePass Braindumps CompTIA FC0-U41 Dumps with VCE and PDF 121-130
CompTIA Strata IT Fundamentals
Question No: 121 – (Topic 2)
Which of the following statements about a serial port are true?
Each correct answer represents a complete solution. Choose all that apply.
It is used to connect a printer and a scanner to a computer.
It sends data one bit at a time, over a single wire.
It has 9-pin and 25-pin connectors on personal computers.
It sends data eight bits at a time, overa single wire.
Explanation: Answer options B and C are correct.
Serial port is the primary means for connecting modems and mouse to a computer. There are two types of serial port connectors, 9-pin and 25-pin. The word serial refers to the thatdata is sent in series, one bit at a time, over a single wire. This design is significantly slower than sending 8 bits at a time via a parallel channel, but serial signals can travel much farther without degradation. Reference: TechNet, Contents:quot; The Roadto USB. Tracking the Next Peripheral Communications
Question No: 122 – (Topic 2)
You work as a Network Administrator for Infonet Inc. The company#39;s office has a wireless network.
Wireless access point on the network works as a router and DHCP server. Youwant to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?
Service Set Identifier
Internet service provider#39;s DNS server address
Answer: C Explanation:
In order to accomplish the task, you will have to configure Service Set Identifier (SSID) on the laptop.
SSID stands for Service Set Identifier. It is used to identify a wireless network. SSIDs are case sensitive text strings and have a maximum length of 32 characters. All wireless devices on a wireless network must have the same SSID in order to communicate with each other.
The SSID on computers and the devices in WLAN can be set manually and automatically. Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict. A network administrator often uses a public SSID that is set on the access point. The access point broadcasts SSID to all wireless devices within its range. Some newer wireless access points have the ability to disable the automatic SSID broadcast feature in order to improve network security.
Answer option D is incorrect. Configuring the ISP#39;s DNS server address on the laptop has nothing to do with this issue.
Answer option A is incorrect. I/O address is a communication port between a device and the CPU. The CPU needs a memory address, known as Input/Output (I/O) address, to communicate with any peripheral device. I/O address is a hexadecimal number that the CPU uses to identify a device. I/O address allows the CPU to send instructions to devices installed on the bus slot of a computer.
Question No: 123 – (Topic 2)
Which of the following are the advantages of Standby mode over Hibernate mode? Each correct answer represents a complete solution. Choose two.
Shorter wake-up period
Lower power consumption
Longer wake-up period
No consumption of hard disk space
Answer: A,D Explanation:
Standby mode has a shorter wake-up period than Hibernate mode. Unlike Hibernate mode, in
Standbymode, the contents of the computer#39;s main memory are not saved to the hard disk, and the operating system need not read contents from the hard disk each time the computer is restarted.
Therefore, Standby mode takes lesser amount of time to wake-up as compared to Hibernate mode.
Moreover, a computer in Standby mode does not consume any hard disk space. FactWhat is hibernate mode? Hide
Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a computer is saved to thehard disk, and the computer shuts down. A user will have to power on the computer to restore the previous settings. When a computer resumes from hibernate mode, it reads the saved settings from the disk and restores the system state as it was before it entered hibernate mode. By default, hibernate mode is disabled. If a computer is not ACPI-enabled or APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer to automatically hibernate after a certain time.
With ACPI-enabled and APM-enabled computers, users are able to set hibernate mode automatically.
Answer option B is incorrect. Since Standby mode maintains the current state of the computer in the computer#39;s RAM, it consumes a small amount of power, whereas Hibernate modewrites contents to the hard disk and shuts down the computer completely.
As a result, a computer in Hibernate mode requires no power to maintain the current state. Reference: TechNet, Contents: quot;Chapter 20 – Power Managementquot;
Question No: 124 – (Topic 2)
Which of the following precautions should be taken to minimize the risk of damage to add- on cards and motherboard? Each correct answer represents a complete solution. Choose three.
Keep water and liquids away from them.
Wear an antistatic wrist strap when handling them.
Always clean them with a water spray gun.
Keep them in antistatic bags.
Answer: A,B,D Explanation:
In order to minimize the risk of damage to add-on cards and motherboard, users should take the following precautions:
Keep them in antistatic bags whenever they are removed from the computer. Antistatic bags protect them from static charges. Keep water and liquids away from electronic circuits, as they might cause short circuits. Wear antistatic wrist strap while handling or repairing a computer. The antistatic wrist strap prevents static electricity from building up. Users should protect their computers and sensitive components such as RAM from short circuits and static charges, as they can cause critical damage to electronic components. Answer option C is incorrect. Add-on cards and the motherboard should not be cleaned with a water spray gun. It can destroy them. In order to clean them, compressed air and isopropyl alcohol can be used.
Question No: 125 – (Topic 2)
Which of thefollowing methods is based on the user#39;s roles and responsibilities?
Mandatory access control
System access control
Role-based access control
Discretionary access control
Answer: C Explanation:
Role-based access control method is based on theuser#39;s roles and responsibilities.
Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization. For example, a backup administrator is responsible for taking backups ofimportant data. Therefore, he is only authorized to access this data
for backing it up. However, sometimes users with different roles need to access the same resources.
This situation can also be handled using the RBAC model.
Answer option D is incorrect.Discretionary access control (DAC) is an access policy determined by the owner of an object. The owner decides who should be allowed to access the object and what privileges they should have.
Answer option A is incorrect. Mandatory access control uses security lablel system. Answer option B is incorrect. There is no access control method such as System access control.
Question No: 126 – (Topic 2)
Which of the following devices allows television signals to be received by a computer?
Video Capture card
Answer: B Explanation:
A video capture card is a computer component that allows television signals to be received by a computer. It also allows television programs to be recorded onto a hard disk. Most TV tuner cards also function as video capture cards. Video capture cards are a class of video capture devices designed to plug directly into expansion slots in personal computers and servers. These cards comply with one of the popular host bus standards including PCI, newer PCI Express (PCIe), or AGP bus interfaces.
Answer option A is incorrect. Secure Digital (SD) card is a non-volatile memory card format used in portable devices such as mobile phones, digital cameras, and handheld computers. SD cards are based on the older MultiMediaCard (MMC) format, but they are a little thicker
than MMC cards.
Generally an SD card offers a write-protect switch on its side. SD cards generally measure 32 mm x
24 mm x 2.1 mm, but they can be as thin as 1.4 mm. The devices that have SD card slots can use the thinner MMC cards, but the standard SD cards will not fit into the thinner MMC slots. Some SD cards are also available with a USB connector. SDcard readers allow SD cards to be accessed via many connectivity ports such as USB, FireWire, and the common parallel port.
Answer option C is incorrect. ExpressCard, a new standard introduced by PCMCIA, is a thinner, faster, and lighter modular expansionfor desktops and laptops. Users can add memory, wired or wireless communication cards, and security devices by inserting these modules into their computers. ExpressCard slots are designed to accommodate modules that use either Universal Serial Bus (USB) 2.0 or the PCI Express standard. ExpressCard modules are available in two sizes, i.e., 34 mm wide (ExpressCard/34) and 54 mm wide (ExpressCard/54). Both modules are 75 mm long and 5 mm high.
An ExpressCard/34 module can be inserted in either a 54 mm slot ora 34 mm slot, but an ExpressCard/54 requires a Universal (54 mm) slot. However, an extender can be used with ExpressCard/34 slot to connect the ExpressCard/54 module from outside of the computer. Both the modules are identical in performance. They take full advantage of the features of the PCI Express or USB 2.0 interfaces. The only difference between them is that the ExpressCard/54 form-or, due to its larger surface area, allows for greater thermal dissipation than does an ExpressCard/34. As the performance does not vary with module size, module developers usually prefer to fit their applications into the smaller ExpressCard/34 form or. But some applications, such as SmartCard readers, and CompactFlash readers, require the extra width of an ExpressCard/54 module.
Answer option D is incorrect. A smart card is a credit card-sized device used to securely store personal information such as certificates, public and private keys, passwords etc. It is used in conjunction with a PIN number to authenticate users. InWindows 2000/2003, smart cards are used to enable certificate-based authentication. To use smart cards, Extensible Authentication Protocol
Question No: 127 – (Topic 2)
Which of the following PCMCIA cards is 3.3mm thick?
Answer: C Explanation:
Type I Personal Computer Memory Card International Association (PCMCIA) cards are 3.3mm thick.
They are most commonly used for memory cards. FactWhat is PCMCIA card? Hide
Personal Computer Memory Card International Association (PCMCIA) card is also known as PC card.
The PC card uses a small expansion slot and is primarily used in laptops. However, PC cards are also available in some of the desktop computers. There are three types of PCMCIA cards:
1.Type I 2.Type II 3.TypeIII
Answer option B is incorrect. Type II is the most commonly used PC card type. Most computers have at least two Type II slots. Type II cards are 5mm thick. They are mostly used for modems and LAN adapters.
Answer option A is incorrect. Type III PCMCIA cards support hard disk drives. Type III slot is 10.5mm thick.
Answer option D is incorrect. There is no PCMCIA card such as Type IV.
Question No: 128 HOTSPOT – (Topic 2)
In the image of the motherboard, identify the area where you connect a floppy disk drive.
Floppy disk drive uses 34 wire cables to connect to a motherboard that has an integrated floppy disk drive controller. A floppy disk drive can also connect to a34-pin connector on a floppy disk drive controller adapter using 34 wire cables. Floppy disk drive is used to read and write on floppy disks.
FactWhat is motherboard? Hide
Motherboard, also known as systemboard, is the main component in a computer on whicha microprocessor, display adapters, and other adapters are installed.
Question No: 129 – (Topic 2)
Which of the following techniques are used to secure wireless networks? Each correct answer represents a complete solution. Choose three.
MAC address filtering
Answer: A,C,D Explanation:
Closed network, SSID spoofing, and MAC address filtering are techniques that can be used to secure wireless networks.
In the closed network technique, the wireless access point (WAP) does not broadcast its Service Set Identifier (SSID). Usersare required to know the SSID to ensure whether or not the wireless network exists. In the SSID spoofing technique, a software generates numerous WAP packets that advertise bogus
SSIDs. When hackers scan for a wireless network, they receive the bogus SSIDsthat cannot be differentiated from a valid SSID.
Most WAPs support MAC address filtering that limits the clients, so that the WAP communicates only with valid media access control (MAC) addresses.
Answer option B is incorrect. In IP spoofing, a user modifies packet headers using someone else#39;s IP address to hide his identity. However, IP spoofing cannot be used while surfing the Internet, chatting online etc. This is because forging the source IP address causes the responses to be misdirected.
Reference:TechNet, Contents: quot;Making IEEE 802.11 Networks Enterprise-Readyquot;
Question No: 130 – (Topic 2)
Mark has purchased a new working USB webcam. He connectsthe webcam to a USB port on his computer and finds that the computer does not detect it. He connects other working USB devices to the port and discovers that the USB port is not functioning. What should Mark do first to resolve the issue?
Verify that the USB functionality is enabled in the BIOS.
Purchase another model of the USB webcam.
Change the computers motherboard.
Replace the USB port wires with a new one.
Answer: A Explanation:
In order to resolve the issue, Mark should first verify thatthe USB functionality is enabled in the BIOS on the motherboard. The BIOS has an option for enabling and disabling the USB functionality. If this functionality is disabled from the BIOS, the USB ports on the computer will not work. Universal Serial
Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel, Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to external hardware devices.
USB supports hot plugging, which means that a USB device can be installed or removed while the computer is running. A single USB port can be used to connect up to 127 peripheral devices, such as
CDROM drives, tape drives, keyboards, scanners etc. USB 1.1 has a maximum data transfer rate of 12
Mbps, whereas USB 2.0 has amaximum data transfer rate of 480 Mbps. USB 2.0 is fully backward compatible with USB 1.1. Answer option C is incorrect. There is no need to change the motherboard, as the problem is most probably due to the BIOS setting for USB functionality. Answer option B is incorrect. Purchasing another model of the USB webcam will not help resolve the issue, because the problem is not with the webcam. Answer option D is incorrect. It is possible that the USB port wires are bad. However, this rarely happens. Reference: TechNet, Contents: quot;Chapter 9 – Managing
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|