[Free] 2018(Mar) EnsurePass Testking CompTIA FC0-U41 Dumps with VCE and PDF 41-50
CompTIA Strata IT Fundamentals
Question No: 41 HOTSPOT – (Topic 1)
Identify the PS/2 keyboard port in the image given below.
The PS/2 port is developed by IBM for connecting a mouse or keyboard to a computer. The PS/2 port supports amini DIN plug containing 6 pins. The PS/2 keyboard port generally comes in purple color. The PS/2 mouse port generally comes in green color.
Question No: 42 – (Topic 1)
Which of the following is the most common method used by attackers to identify wireless networks?
Answer: D Explanation:
War driving is the most common method used by attackers to identify wireless networks. In war driving, a person drives around businesses and neighborhoods attempting to locate a wireless access point (AP) by using a portable device.
Answer option Bis incorrect. Packet sniffing is a process of monitoring data packets that travel across a network. The software used for packet sniffing is known as sniffers. There are many packetsniffing programs that are available on the Internet. Some of these are unauthorized, which can be harmful for a network#39;s security.
Answer option C is incorrect. Packet filtering is a method that allows or restricts the flow of specific types of packets to provide security. It analyzes the incoming and outgoing packets and letsthem pass or stops them at a network interface based on the source and destination addresses, ports, or protocols. Packet filtering provides a way to define precisely which type of IP traffic is allowed to cross the firewall of an intranet. IP packet filtering is important when users from private intranets connect to public networks, such as the Internet.
Answer option A is incorrect. Back door is a program or account that allows access to a system by skipping the security checks. Many vendors and developers implement back doors to save time and effort by skipping the security checks while troubleshooting. Back door is considered to be a security threat and should be kept with the highest security. If a back door becomes known to attackers and malicious users, they can use it to exploit the system.
Question No: 43 – (Topic 1)
Which of the following Interfaces has the ability to support digital audio as well as video through a single cable?
Answer: B Explanation:
HDMI interfacehas the ability to support digital audio as well as video through a single cable. HDMI stands for High-Definition Multimedia Interface. It is a standard, uncompressed, and all-digital audio/video interface. HDMI is capable of delivering the highest quality digital video and multichannel digital audio on a single cable. It provides an interface between any audio/video sources, such as a DVD player or a computer and a digital television (DTV) or video monitor. HDMI transmits all ATSC HDTV standards and supports 8-channel digital audio, with extra bandwidth to accommodate future enhancements. HDMI has two types of connectors. Type A and Type B. Type A and Type B connectors use 19 pins and 29 pins, respectively. The Type B connector is designed for very high-resolution displays that are expected in near future.
Answer options C, D, and A are incorrect. SVGA, VGA, and DVI interfaces do not have capability to support digital audio as well as video through a single cable.
What is a VGA or SVGA connector?
A VGA or SVGA connector is a 15-pin, three rows, female connector, on the back of a PC used for connecting monitors.
What is DVI?
DVI stands for Digital Visual Interface. It is a standard for high speed, high resolution digital display invented by Digital
Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital signals coming from DVI connections. However, some monitors come with both types of cables. DVI has three main categories of connectors. They are. DVI-A, DVI- D, and DVI-I. DVI-A is an analog-only connector,
DVI-D is a digital-only connector, and DVI-I is an analog/digital connector. DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and HDTV with a single set of links. Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.
Question No: 44 – (Topic 1)
Which of the following cryptographic algorithm uses public key and private key to encrypt or decrypt data ?
Answer: C Explanation:
Asymmetric algorithm uses two keys, public key andprivate key, to encrypt and decrypt data.
What is asymmetric encryption?
Asymmetric encryption is a type of encryption that uses two keys – a public key and a private key pair for data encryption. The public key is available to everyone, while the privateor secret key is available only to the recipient of the message. For example, when a user sends a message or data to another user, the sender uses a public key to encrypt the data. The receiver uses his private key to decrypt the data.
Answer option B is incorrect. Symmetric algorithm uses a single key to encrypt and decrypt data.
Answer option A is incorrect. Hashing encryption algorithm uses a process of converting a message, or data, into a numeric value to encrypt data. Secure Hash Algorithm (SHA) and Message Digest Algorithm (MDA) are two standards that use the hashing process for encryption.
Answer option D is incorrect. There is no such cryptographic algorithm as Numeric. Reference. TechNet, Contents. quot;Description of Symmetric and Asymmetric Encryptionquot;
Question No: 45 – (Topic 1)
Which of the following are types of social engineering attacks? Each correct Answer represents a complete solution. Choose two.
An unauthorized persongains entrance to the building where the company#39;s database server resides and accesses the server by pretending to be an employee.
An unauthorized person inserts an intermediary software or program between two communicating hosts to listen to and modify the communication packets passing between the two hosts.
An unauthorized person calls a user and pretends to be a system administrator in order to get the user#39;s password.
An unauthorized person modifies packet headers by using someone else#39;s IP address to his identity.
Following are the types of social engineering attacks: 1.An unauthorized person calls a user and pretends to be a system administrator in order to get the user#39;s password.
2.An unauthorized person gainsentrance to the building where the company#39;s database server resides and accesses the server by pretending to be an employee.
A social engineering attack is based on misleading users or administrators at the target site. Social engineering attacks are usually carried out by telephoning users or operators and pretending to be an authorized user in order to gain unauthorized access to systems. Answer option D is incorrect.
Spoofing is a technique that makes a transmission appear to have come from an authenticsource by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else#39;s IP address to his identity.
However, spoofing cannot be used while surfing the
Internet, chatting on-line, etc. because forging the source IP address causes the responses to be misdirected.
Question No: 46 – (Topic 1)
Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?
A. Bluetooth B. 802.11 C. 802.11b
Answer: A Explanation:
Bluetooth is the best wireless technology to connect peripheral devices, such as a printer and mouse, to a laptop.Bluetooth is a standard for very low powered and short-range radio connections.
It is used to link personal access devices (PDA), mobile phones and laptops, and provides them with Internet access via hot spots. Bluetooth uses the 2.4 Ghz spectrum with a data rate of about 1 Mbps.
As a radio technology, Bluetooth does not require line of sight like aninfrared connection requires.
The maximum transmission range of Bluetooth is around 10 meters. High-powered Bluetooth would extend the range to 100 meters. Answer options B and C are incorrect. These are the latest networking specifications for wireless local area networks (WLANs) developed by the Institute of Electrical and Electronic Engineers.
Answer option D is incorrect. Infrared medium transmits data at almost the same rate as a parallel port does. Infrared data transfer requires a clear line of sight between devices, and the communicating devices must be in close proximity. Although infrared technology can be used to connect peripherals to a computer, Bluetooth technology is the best for this purpose.
Question No: 47 – (Topic 1)
Atwhat voltage does a USB host supply power to the USB bus?
Answer: B Explanation:
A USB host supplies power to the USB bus at 5 volts. The USB light is a device that uses power from the bus to power small LEDs.USB lights are generally used for lighting keyboards at night. Most of the USB devices that require more power to operate have separate power outlets.
What is USB?
Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC,Intel, Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to external hardware devices. USB supports hot plugging, which means that a USB device can be installed or removed while the computer is running. A single USBport can be used to connect up to
127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1 has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer rate of 480
Mbps. USB 2.0 is fully backward compatible with USB 1.1.
Question No: 48 – (Topic 1)
You are handling IT support for a sales company. One of the sales representatives complains that his laptop does not have a network card. You wish to add one via an
expansion slot.What type of expansion card should you use?
Answer: B Explanation:
PCMCIA is a widely used expansion card slot for laptops.
What is PCMCIA card? Personal Computer Memory Card International Association (PCMCIA) card is alsoknown as PC card.
The PC card uses a small expansion slot and is primarily used in laptops. However, PC cards are also available in some of the desktop computers. There are three types of PCMCIA cards.
1.Type I 2.Type II 3.Type III
Answer option C is incorrect. PCI slots are used in PC#39;s, not laptops. Answer option D is incorrect. AGP is a legacy graphics slot for PC#39;s. What is AGP (Accelerated Graphics Port)?
AGP is a high speed 32-bit bus designed for high performance graphics and video support. It allowsa video card to have direct access to a computer#39;s RAM, which enables fast video performance. AGP provides a bandwidth of up to 2,133 MB/second.
Answer option A is incorrect. MCA is a legacy PC slot.
Question No: 49 – (Topic 1)
Which of the following maximum resolutions does the UXGA video technology supports?
A. 2560 x 1600
B. 1600 x 1200
C. 2048 x 1536
D. 1280 x 1024
Answer: B Explanation:
UXGA stands for Ultra eXtended Graphics Array. It is a display standard that refers to video adapters.
This display standard is capable of displaying the resolution of 1600 x1200 pixels. A UXGA
display provides four times more pixels than an 800 x 600 display. where 1600 refers to horizontal pixels, and 1200 refers to vertical pixels.
Answer option C is incorrect. The QXGA video technology supports a maximum resolution of 2048 x
Answer option A is incorrect. The WQXGA video technology supports a maximum resolution of 2560 x 1600.
Answer option D is incorrect. The SXGA video technology supports a maximum resolution of 1280 x 1024.
Question No: 50 – (Topic 1)
Which of the following statements about the G3 state of a computer are true? Each correct answer represents a complete solution. Choose two.
It is a normal working state of a computer.
A complete power loss occurs in this state such as power cord unplugged from a computer.
A computer can be disassembled in this state.
This state is also known as soft off.
Answer: B,C Explanation:
In the G3 state of a computer, a complete power loss occurs such as power cord unplugged from a computer. A computer can be disassembled in this state.G0, G1, G2, G3 are various power states of a computer. The G1 state is divided into four submodes or sleep modes known as S1, S2, S3, and
S4. Higher state number indicates more power saving.
Answer option A is incorrect. G0 is a normal working state of a computer. It is assumed that all the devices are running using full power in this state.
Answer option D is incorrect. The G2 state is also known as soft off. A user can execute soft off by clicking the Shutdown button in Windows operating system.
EnsurePass ExamCollection Testking Lowest Price Guarantee Yes No No Up-to-Dated Yes No No Real Questions Yes No No Explanation Yes No No PDF VCE Yes No No Free VCE Simulator Yes No No Instant Download Yes No No