[Free] 2018(Mar) EnsurePass Testking CompTIA FC0-U41 Dumps with VCE and PDF 131-140
CompTIA Strata IT Fundamentals
Question No: 131 – (Topic 2)
Which of the following provides only block-based storage and leaves file system concerns on the client side?
Storage area network
Local area network
Network attached storage
Answer: A Explanation:
Storage area network (SAN) provides only block-based storage and leaves file system concerns on the client side.
A storage area network (SAN) is an architecture to attach remote computer storage devices (such as disk arrays, tape libraries, and optical jukeboxes) to servers in such a way that the devices appear as locally attached to the operating system. SANs are generally used in large enterprises.
Answer option C is incorrect. Network attached storage provides both storage and file system.
Answer option B is incorrect. Local Area Network (LAN) is a network with high data transfer rate. In this type of network, the computers are located in a campus and are connected to each other.
Question No: 132 HOTSPOT – (Topic 2)
Inthe image, identify the interface used to connect a USB modem to a computer.
Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel, Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to external hardware devices. USB supports hot plugging, which means that a USB device can be installed or removed while the computer is running. A single USB port can be used to connect up to 127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1 has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer rate of 480 Mbps. USB 2.0 is fully backward compatible with USB 1.1.
Question No: 133 – (Topic 2)
Which of the following is a software programthat collects email addresses of users and creates a mailing list to send unwanted emails to the users?
Answer: D Explanation:
Spambot is a software program that collects email addresses of users and createsa mailing list to sent unwanted emails to the users.
Answer option C is incorrect. The term malware refers to malicious software, which is a broad class of malicious viruses, including spyware. Malware is designed to infiltrate or damage a computer withoutthe consent of the owner.
Answer option A is incorrect. A port scanner is a software tool that is designed to search a network host for open ports. This tool is often used by administrators to check the security of their networks.
It is also used by hackers to compromise the network and systems.
Answer option B is incorrect. Adware is software that automatically downloads and display advertisements in the Web browser without user permission. When a user visits a site or downloads software, sometimes hiddenadware software is also downloaded to display advertisement automatically. This can be quite irritating to user. Some adware can also be spyware.
Question No: 134 – (Topic 2)
What are the differences between the microprocessor of a desktop and that of a laptop? Each correct answer represents a complete solution. Choose two.
A laptop microprocessor consumes less power than a desktop microprocessor does.
A laptop microprocessor has slower processing speed than a desktop microprocessor has.
Unlike laptop microprocessors, a desktop microprocessor has sidebuses (FSB).
A laptop microprocessor generates less heat than a desktop microprocessor does.
Answer: A,D Explanation:
Following are the differences between desktop and laptop processors:
A laptop microprocessor generates less heat than a desktop microprocessor. A laptop microprocessor consumes less power than a desktop microprocessor.
Answer option B is incorrect. The processing speed depends on what model of processor a laptop or desktop has.
Answer option C is incorrect. Both the laptop and desktop microprocessors can have front side buses. It depends on a microprocessor#39;s model.
Question No: 135 – (Topic 2)
Which of the following is a casesensitive text string used in wireless network and having a maximum length of 32 characters?
Answer: A Explanation:
SSID stands for Service Set Identifier. It is used to identify a wireless network. SSIDs are case sensitivetext strings and have a maximum length of 32 characters. All wireless devices on a wireless network must have the same SSID in order to communicate with each other.
The SSID on computers and the devices in WLAN can be set manually or automatically. Configuring the same SSID as that of the other
Wireless Access Points (WAPs) of other networks will create a conflict. A network administrator often uses a public SSID that is set on the access point. The access point broadcasts SSID to all wireless devices within its range. Some newer wireless access points have the ability to disable the automatic SSID broadcast feature in order to improve the network security.
Answer option D is incorrect. Wired Equivalent Privacy (WEP) is a security protocol for wireless localarea networks (WLANs). It has two components, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.
Answer option B is incorrect. The Wireless Access Protocol (WAP) is a technology used with wireless devices. The functionality of WAP is equivalent to that ofTCP/IP. WAP uses a smaller version of
HTML called Wireless Markup Language (WML) to display Internet sites.
Answer option C is incorrect. Wireless Transport Layer Security (WTLS) is a security layer of WAP, which is specifically designed for a wireless environment. It provides privacy, data integrity, and authentication for client-server communications over a wireless network.
WTLS ensures that a client and server are authenticated so that wireless transactions remain secure and the connection is encrypted. WTLS is required because a wireless network does not provide end-to-end security.
Question No: 136 – (Topic 2)
Which of the following ports does not support hot plugging?
Serial port (RS-232)
Answer: B Explanation:
Serial port (RS-232) does not support hot plugging.
RS-232 standard is a specification for serial communication ports, also knownas COM ports, serial ports, or RS-232 ports, and is used to connect RS-232 compatible serial devices, such as modems and pointing devices to a computer.
Answer options D, A, and C are incorrect. All these ports support hot plugging.
Question No: 137 – (Topic 2)
Which of the following processors have 64-bit data bus width? Each correct Answer represents a complete solution. Choose three.
Answer: A,B,D Explanation:
The following processors have 64-bit data bus width: AMD K6
Pentium 4 AMD Athlon
Question No: 138 – (Topic 2)
Which of the following statements about the XCOPY command is true?
XCOPY /s copies system files only.
XCOPY deletes all files and subdirectories.
XCOPY copies archived files only.
XCOPY /s copies files and subdirectories.
Answer: D Explanation:
XCOPY is a command-line utility that copies files and directory trees. XCOPY is similar to the COPY command exceptthat it has many more switches that allow considerable control over exactly what is copied when using wildcards. The XCOPY command with the /s switch copies all directories and subdirectories in the hard disk, unless they are empty.
Reference: TechNet, Contents: quot;MS-DOS 6 Commands: SORT – XCOPYquot;
Question No: 139 – (Topic 2)
Your customer is using Windows XP Service pack 1 with wireless zero configuration. Which is the most modern encryptionsupported with wireless zero configuration?
Answer: A Explanation:
Wireless zero configuration supports Wi-Fi Protected Access (WPA), which is the most modern wireless encryption available today.
What is WPA? Hide Wi-fi Protected Access (WPA) is an interoperable security standard for Wireless LAN (WLAN). For using WPA, encryption is required. WPA provides encryption by using Temporal Key Integrity Protocol (TKIP). TKIP uses a new encryption algorithm, which is stronger than WEPalgorithm. 802.1x authentication is required in WPA.
Answer option D is incorrect. WEP (Wired Equivalent Privacy) is supported, but is an earlier/older encryption method.
What is WEP? Hide
Wired Equivalent Privacy (WEP) is a security protocol for wirelesslocal area networks (WLANs). It has two components, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.
Answer option B is incorrect. There is no WEP2. WEP has been supplanted by WPA (though there is a WPA2). Answer option C is incorrect. PKI is a protocolfor exchanging encryption keys but is not an encryption algorithm.
Question No: 140 – (Topic 2)
Which of the following statements about SRAM are true?
Each correct answer represents a complete solution. Choose three.
SRAM is made of capacitors.
SRAM is more expensive than DRAM.
SRAM is made of a special circuit called a flip-flop.
SRAM is used for caching.
Answer: B,C,D Explanation:
Static RAM (SRAM) is a type of memory chip made of a special circuit known as flip-flop. It is significantly faster than DRAM. Unlike DRAM memory chip circuits, it does not have to be refreshed because it uses the flip-flop circuit to store each bit.
SRAM memory chips are generally used for caching. It has a disadvantage that it is more expensive than DRAM.
Answer option A is incorrect. Dynamic Random Access Memory (DRAM) memory chip circuits are made of tiny capacitors. DRAM is slower than
SRAM, as it needs to be refreshed.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|