FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 1

Which of the following slots on a motherboard are best for a video card?

Each correct answer represents a complete solution. Choose two.

A. PCIe

B. PCI

C. AGP

D. EISA


Options are :

  • C,D
  • B,C
  • A,C (Correct)
  • A,B

Answer : A,C

How many devices can be connected to an IEEE 1394 port? 


Options are :

  • 127
  • 1
  • 63 (Correct)
  • 256

Answer : 63

What is the maximum resolution that SXGA video technology supports?   


Options are :

  • 1280 x 720
  • 1024 x 768
  • 2560 x 1600
  • 1280 x 1024 (Correct)

Answer : 1280 x 1024

Which of the following statements about Hardware Compatibility List (HCL) are true?

Each correct answer represents a part of the solution. Choose two.

A. It ensures that a computer and its components are compatible with the operating system before

the operating system is installed.

B. It contains the listing of all the hardware that operating systems vendors have tested with their

operating systems.

C. It ensures that a computer and its components are working properly.

D. It contains the license to use operating systems.


Options are :

  • B,C
  • A,D
  • C,D
  • A,B (Correct)

Answer : A,B

Under which environmental conditions is the risk of Electrostatic discharge (ESD) the highest? 


Options are :

  • High temperature
  • Low temperature
  • Low humidity (Correct)
  • High humidity

Answer : Low humidity

You are trying to select a particular wireless encryption algorithm. You are concerned that it implements as much of the wireless 802.11i standard as possible. Which encryption algorithm should you implement? 


Options are :

  • WEP
  • WPA
  • WEP2
  • WPA2 (Correct)

Answer : WPA2

Which of the following is a fake target that deters hackers from locating your real network? 


Options are :

  • Malware
  • Spyware
  • Honeypot (Correct)
  • KFSensor

Answer : Honeypot

Which of the following are types of access control attacks? Each correct answer represents a complete solution. Choose all that apply. 

A. Brute force attack

B. Mail bombing

C. Spoofing

D. Dictionary attack



Options are :

  • C,D,A
  • B,C,D
  • A,B,C (Correct)
  • A,B,D

Answer : A,B,C

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number? 


Options are :

  • Spoofing
  • Phishing (Correct)
  • Replay attack
  • Password guessing attack

Answer : Phishing

You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file and folder encryption. Which file system should you use when installing Windows XP? 


Options are :

  • NTFS (Correct)
  • EXT4
  • FAT32
  • FAT

Answer : NTFS

Which of the following wireless standards has a transmission speed of up to 720 Kbps? 


Options are :

  • IEEE 802.11a
  • Bluetooth (Correct)
  • Infrared
  • Wi-Fi

Answer : Bluetooth

How many pins are available on a PS/2 Mini-DIN connector? 


Options are :

  • 6 (Correct)
  • 4
  • 5
  • 3

Answer : 6

Which of the following hardware uses flash memory technology? 


Options are :

  • PCMCIA card
  • Secure digital card (Correct)
  • Smart card reader
  • DDR2 SDRAM

Answer : Secure digital card

Which of the following protocols provides an encryption by using the Temporal Key Integrity Protocol (TKIP)? 


Options are :

  • EAP
  • EAP
  • EAP (Correct)
  • EAP

Answer : EAP

Rick works as a Network Administrator for Company Inc. He takes a backup of some important compressed files on an NTFS partition, using the Windows 2000 Backup utility. Rick restores these files in a FAT32 partition. He finds that the restored files do not have the compression attribute. What is the most likely cause? 


Options are :

  • The Windows 2000 Backup utility decompresses compressed files while taking a backup.
  • The FAT32 partition is corrupt and requires to be reformatted.
  • A FAT32 partition does not support compression (Correct)
  • The backup of files that are saved on an NTFS partition cannot be restored in a FAT32 partition

Answer : A FAT32 partition does not support compression

Your customer is using Windows Vista and complains about the quality of picture he is getting on his monitor. You find that you cannot adjust the refresh rate or the resolution. What is the most likely cause? 


Options are :

  • The monitor is not compatible with the video card.
  • The video card has failed
  • The video card is not recognized by Windows (Correct)
  • The video card does not have enough video RAM.

Answer : The video card is not recognized by Windows

Which of the following types of batteries are used by toys and watches? 


Options are :

  • Silver oxide (Correct)
  • Lead-acid
  • Zinc-air
  • Silver lead

Answer : Silver oxide

Which of the following is a program initially designed to prevent phosphor burn-in on CRT and plasma computer monitors?


Options are :

  • Spider
  • Debugger
  • Screensaver (Correct)
  • Monitor saver

Answer : Screensaver

Which of the following SCSI types use 16-bit bus?

A. Fast Wide SCSI-2

B. Double Wide SCSI-2

C. Fast SCSI-2

D. Wide SCSI-2

E. Ultra-2 SCSI (Fast-40)



Options are :

  • C,D
  • A,B
  • A,D (Correct)
  • B,C

Answer : A,D

Rick works as your assistant. He is configuring a computer running Windows XP Professional to connect to a network. He needs to get IP information in the command prompt. He asks you about the usage and brief description of various switches used with a command. Which of the following command switches will you suggest that he use to get the required information of the command? 


Options are :

  • [command] /+
  • [command] /? (Correct)
  • [command] />
  • A. [command] /<

Answer : [command] /?

Which of the following firewalls inspects the actual contents of packets? 


Options are :

  • Circuit-level firewall
  • Stateful inspection firewall
  • Packet filtering firewall
  • Application-level firewall (Correct)

Answer : Application-level firewall

Which of the following standard displays is commonly used on 14 inch or 15 inch laptop LCD screens with a resolution of 1400 x 1050 pixels? 


Options are :

  • SXGA+ (Correct)
  • UXGA
  • SXGA
  • WUXGA

Answer : SXGA+

Which type of memory chip has 168 pins? 


Options are :

  • DIP
  • DIMM (Correct)
  • DMA
  • SIMM

Answer : DIMM

Which of the following do not support encrypted data transmissions? 


Options are :

  • Wi-Fi devices
  • Infrared devices (Correct)
  • Bluetooth devices
  • Ethernet devices

Answer : Infrared devices

Which of the following statements about Bluetooth are true?

Each correct answer represents a complete solution. Choose two.

A. It forms a network whenever two Bluetooth devices come within a range of ten meters.

B. It has a maximum transmission range of 200 meters.

C. It does not require a line-of-sight connection between devices.

D. It requires a line-of-sight connection between devices.


Options are :

  • C,D
  • A,C (Correct)
  • A,B
  • B,C

Answer : A,C

Which of the following interfaces is the current standard for digital LCD monitors?   


Options are :

  • SVGA
  • VGA
  • DVI (Correct)
  • None of the above
  • DVE

Answer : DVI

Which of the following statements is true about the installation of Universal Serial Bus (USB) devices?   


Options are :

  • A USB device can be plugged to a computer without restarting it. (Correct)
  • A computer has to be restarted to install a USB device.
  • USB devices are non-Plug and Play.

Answer : A USB device can be plugged to a computer without restarting it.

You are responsible for purchasing computer hardware for a school district. You have been looking at various sales brochures advocating various types of memory. What would be one advantage to buying dual-channel memory? 


Options are :

  • It will have more memory capacity than single channel memory.
  • It will be twice as fast as single channel memory.
  • It has no advantage over single channel memory.
  • It will reduce memory bottlenecks (Correct)

Answer : It will reduce memory bottlenecks

Mark purchases a new computer and installs the Windows 2000 Professional operating system on

it.

He wants to connect the computer to the Internet. Which of the following actions can he take to

protect his computer from unauthorized access, adware, and malware?

Each correct answer represents a complete solution. Choose two.

A. Configure a firewall on the computer.

B. Configure auditing on the computer.

C. Set hidden attributes on his important files.

D. Install all the service packs available for the operating system.



Options are :

  • A,B
  • A,D (Correct)
  • C,D
  • B,C

Answer : A,D

Which of the following protocols is widely used for setting up and tearing down multimedia communication sessions such as voice and video calls over the Internet (VoIP)?   


Options are :

  • UDP
  • LDAP
  • ICMP
  • SIP (Correct)

Answer : SIP

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions