[Free] 2018(Mar) EnsurePass Testking CompTIA FC0-U41 Dumps with VCE and PDF 91-100
CompTIA Strata IT Fundamentals
Question No: 91 – (Topic 1)
Which of the following ports is also known as PS/2?
6-pin Mini-DIN connector
5-pin DIN connector
4-pin Mini-DIN connector
Answer: A Explanation:
The 6-pin Mini-DIN connector isalso known as PS/2 port. It uses four of the six pins on a keyboard connector. Pin 1 is used for keyboard data signal, pin 3 is used for grounding, pin 4 has 5 Volt DC, and pin 5 is used for keyboard clock. Pin 2 and pin 6 are not used. The PS/2 6-pin Mini-DIN connector is used to connect a keyboard and mouse. Answer option B is incorrect. The 5-pin DIN connector is used on a computer that has a Baby-AT form or motherboard. Answer option D is incorrect. A Universal Serial Bus (USB) connector is used
with the USB cable for connecting various electronic devices to a computer. USB supports a data speed of up to 12 megabits per second. Two types of connectors are used with USB, namely USB-A Type and USB-B Type.
Question No: 92 – (Topic 1)
Which of the following color code is used for a PS/2 keyboard connector on new motherboards?
Answer: A Explanation:
The purple color is used for a PS/2 keyboard connector on new motherboards.
Answer option D is incorrect. The blue color is used for a15-pin VGA monitor connector on motherboard.
Answer option C is incorrect. The green color is used for a PS/2 mouse connector on new motherboards.
Answer option B is incorrect. The pink color is used for a 25-pin female parallel port connector on new motherboards.
Question No: 93 – (Topic 1)
Which of the following substances are restricted under Restriction of Hazardous Substances(RoHS)?
Each correct Answer represents a complete solution. Choose all that apply.
Answer: A,B,D Explanation:
The following substances are restricted under Restriction of Hazardous Substances (RoHS):
Lead (Pb) Mercury (Hg) Cadmium (Cd)
Hexavalent chromium (CrVI) Polybrominated biphenyls (PBB) Polybrominated diphenyl ethers (PBDE)
Question No: 94 DRAG DROP – (Topic 1)
Drag and drop the appropriate e-mail protocol beside its respective description.
There are three primary protocols that are used for configuring e-mail setup on the Internet. These include the following: POP3: Post Office Protocol version 3 (POP3) is a protocol used for retrieving email messages. The POP3 servers allow access to a single Inbox in contrast to IMAP servers that provide access to multiple server-side folders. IMAP: InternetMessage Access Protocol (IMAP) is a protocol for receiving e-mail messages. It allows an e-mail client to access and manipulate a remote e-mail file without downloading it to a local computer. SMTP: Simple Mail Transfer Protocol (SMTP) is used for transferring or sending e-mail messages between servers.
Question No: 95 HOTSPOT – (Topic 1)
Identify the eSATA port in the image given below.
External Serial Advanced Technology Attachment (eSATA) is an external Interface and
provides hot swappable hard disk drive solution. It is an external interface for Serial Advanced Technology Attachment (SATA) technology. It is designed to support hot- plugging. Hence, it allows users to connect a hard disk drive while the computer is running. eSATA has data transfer rates three times more than USB 2.0 and FireWire 400. Unlike USBand FireWire interfaces, eSATA requires its own power connector. eSATA supports a maximum data cable length of two meters.
Answer option C is incorrect. The 386SX processor has 16-bit data bus width.
Question No: 96 – (Topic 1)
Which of the following programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited?
Answer: B Explanation:
Spyware is a program that takes partial control over a user#39;s computer without user#39;s permission.
Spyware programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited. Spyware programs can also interfere with the control of a user#39;s computer, such as installing additional software, redirecting Web browser activities, accessing
Web sites blindly, etc.
Answer option C is incorrect. A honeypot is a term in computer terminologyused for a trap that is set to detect, deflect, or in some manner counteract attempts at unauthorized use of
information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated,and monitored, and which seems to contain information or a resource of value to attackers.
Answer option A is incorrect. The term malware refers to malicious software, which is a broad class of malicious viruses, including spyware.
Malware is designed to infiltrate or damage a computer without the consent of the owner. Answer option D is incorrect. A worm is a software program that uses computer networks and security holes to replicate itself from one computer to another. It usually performs malicious actions, such as using the resources of computers as well as shutting down computers.
Question No: 97 DRAG DROP – (Topic 1)
Drag and drop the correct names of the power connectors in the respective boxes.
The Molex power connector is a 4-pin connector commonly used in computers. It provides power to hard disk drives and CD drives.
The Berg power connector is used to provide power to the floppy disk drive.
The Serial-ATA (SATA) power connector is used to provide power to SATA hard disk drives.
The ATX main motherboard power connector is used to provide power to the ATX motherboard in a computer.
Question No: 98 – (Topic 1)
Which of the following statements about multi-or authentication is true?
It uses a Key Distribution Center (KDC).
It protects a computer from malicious software such as worms.
It involves two or more methods as part of the authentication process.
It is a process in which a client process and a server are required to prove theiridentities to each other before performing any application function.
Answer: C Explanation:
Multi-or authentication involves a combination of multiple methods of authentication. For example, an authentication method that uses smart cards as well as usernames and passwords can be referred to as multi-or authentication. Answer option D is incorrect.
Mutual authentication is a process in which a client process and server are required to prove their identities to each other before performing any application function. The client and server identities can be verified through a trusted third party and use shared secrets as
in the case of Kerberos v5. The MS-CHAP v2 and EAPTLS authentication methods support mutual authentication. Answer option A is incorrect. Kerberos authentication uses a Key Distribution Center (KDC).Answer option B is incorrect. The multi-or authentication method cannot protect a computer from malicious software such as worms.
What is a worm?
A worm is a software program that uses computer networks and security holes to replicate itself from one computer to another. It usually performs malicious actions, such as using the resources of computers as well as shutting down computers.
Question No: 99 HOTSPOT – (Topic 1)
Identify the S-Video port in the image given below.
S-Video, also known as Y/C video, stands for Super-Video. It is a technology for video transmission.
Using this technology, the video is transmitted into two separate signals. One is used forcolor, and the other for brightness. Sometimes S-Video signals are considered as a type of component video signal. However, its quality is inferior to other complex component video schemes such as RGB. This technology produces sharper images than those produced by composite video, which carries the entire set of signals in a single line. For using S-Video, the device sending the signal must support SVideo output and the device receiving the signal needs to have an S-Video input jack.
Topic 2, Volume B
Question No: 100 – (Topic 2)
A customer has come to you wanting upgrade the video card in his laptop. What would you recommend?
A PCMCIA card
A PCI Express card
Upgrade is not possible
Answer: C Explanation:
Video cards in laptops are built into the motherboard and cannot be upgraded. Answer option D is incorrect. An AGP card is an older type of video card for PC#39;s. What is AGP (Accelerated Graphics Port)? Hide
AGP is a high speed 32-bit bus designed for high performance graphics and video support. It allows a video card to have direct access to a computer#39;s RAM, which enables fast video performance. AGP provides a bandwidth of up to 2,133 MB/second.
Answer options B and A are incorrect. Both are valid expansion cards for laptops, however the laptop video card is not on an expansion slot.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|