FC0-U41 CompTIA Strata IT Fundamentals Practice Exam Set 5

You work as a Network Administrator for McNeil Inc. The company has a Windows-based

network. You want to upgrade a client computer from

Windows 98 SE to Windows 2000 Professional. Which of the following steps will you take before

the upgrade?Each correct answer represents a part of the solution. Choose two.

A. Convert FAT partitions to NTFS partitions.

B. Verify that each component of the computer is in the hardware compatibility list (HCL).

C. Format the hard disk drive.

D. Remove the Windows folder from the hard disk.

E. Verify that the client computer meets the minimum requirements for Windows 2000

Professional.



Options are :

  • B,E (Correct)
  • A,B
  • C,D
  • B,D

Answer : B,E

Mark has purchased a new working USB webcam. He connects the webcam to a USB port on his computer and finds that the computer does not detect it. He connects other working USB devices to the port and discovers that the USB port is not functioning. What should Mark do first to resolve the issue? 


Options are :

  • Change the computers motherboard
  • Purchase another model of the USB webcam.
  • Replace the USB port wires with a new one.
  • Verify that the USB functionality is enabled in the BIOS. (Correct)

Answer : Verify that the USB functionality is enabled in the BIOS.

Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the Web site, instead of waiting for the download to complete? 


Options are :

  • HTTP streaming
  • Slipstreaming
  • Session Initiation Protocol
  • Streaming media (Correct)

Answer : Streaming media

Which of the following power sources are used to power a laptop?

A. Solar panel

B. AC power

C. Battery

D. Docking station


Options are :

  • A,B
  • A,D
  • C,D
  • B,C (Correct)

Answer : B,C

Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?   


Options are :

  • Infrared
  • 802.11b
  • Bluetooth (Correct)
  • 802.11

Answer : Bluetooth

Which of the following statements about multi-or authentication is true? 


Options are :

  • It involves two or more methods as part of the authentication process (Correct)
  • It uses a Key Distribution Center (KDC)
  • It is a process in which a client process and a server are required to prove their identities to each other before performing any application function.
  • It protects a computer from malicious software such as worms.

Answer : It involves two or more methods as part of the authentication process

Which of the following provides authentication, encryption and data integrity for wireless devices?   


Options are :

  • WTLS (Correct)
  • WAN
  • WAP
  • PAP

Answer : WTLS

You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work? 


Options are :

  • 128 Megabytes
  • 2 Gigabytes
  • 64 Megabytes (Correct)
  • 1 Gigabyte

Answer : 64 Megabytes

Which of the following enables third-party developers to create capabilities to extend an application? 


Options are :

  • Virtual machine
  • Hotfix
  • Plug-in (Correct)
  • JavaScript

Answer : Plug-in

You are responsible for the wireless network at your company. You have been asked to create

SSID's for wireless routers. What are the limits on an SSID?Each correct Answer represents a

complete solution. Choose two.

A. It is not case sensitive.

B. It must be 32 or fewer characters long.

C. It can only contain letters, not numbers.

D. It is case sensitive.

E. It must be 64 or viewer characters long


Options are :

  • A,C
  • B,C
  • B,D (Correct)
  • A,B

Answer : B,D

Which of the following devices allows television signals to be received by a computer? 


Options are :

  • SD Card
  • Smart card
  • Video Capture card (Correct)
  • ExpressCard

Answer : Video Capture card

Which of the following devices provides input by analyzing printed text, handwriting, or an object? 


Options are :

  • BD-ROM Drive
  • Webcam
  • Packet analyzer
  • Image scanner (Correct)

Answer : Image scanner

You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem? 


Options are :

  • His operating system is incompatible.
  • A firewall is blocking him.
  • MAC filtering is blocking him (Correct)
  • His laptop is incompatible

Answer : MAC filtering is blocking him

Which of the following is a software program that collects email addresses of users and creates a mailing list to send unwanted emails to the users? 


Options are :

  • Spambot (Correct)
  • Malware
  • Adware
  • Port scanner

Answer : Spambot

Which of the following buses has a maximum data transfer rate of 2400 Mbps? 


Options are :

  • FireWire 800
  • USB 1.1
  • USB 2.0
  • eSATA (Correct)

Answer : eSATA

What are the benefits of using Universal Serial Bus (USB) 2.0 over legacy communication ports

such as RS-232 and parallel ports? Each correct Answer represents a complete solution. Choose

all that apply.

A. Easy configuration of hardware devices

B. Expansion

C. Security

D. Speed


Options are :

  • A,B,C
  • B,C,D
  • B,A,D
  • A,B,D (Correct)

Answer : A,B,D

Which of the following are dual core processors?

Each correct Answer represents a complete solution. Choose two.

A. AMD Athlon(tm) 64 X2

B. Intel Pentium 4

C. Intel(r) Pentium(r) processor Extreme Edition

D. AMD Athlon(tm)


Options are :

  • A,C (Correct)
  • A,B
  • B,C
  • B,D

Answer : A,C

Which of the following devices has its own BIOS ?


Options are :

  • Hard disk drive
  • Network interface card
  • Sound card
  • Video adapter (Correct)

Answer : Video adapter

Which of the following software displays advertisements, whether or not the user has consented? 


Options are :

  • Honeypot
  • Adware (Correct)
  • Spyware
  • Trojan horse

Answer : Adware

Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces? 


Options are :

  • Unicast
  • Multicast
  • Anycast (Correct)
  • Loopback

Answer : Anycast

You are using infrared devices in your network. You want to improve the quality of connections

and achieve better communication between infrared devices. What will you do to achieve this?

Each correct answer represents a complete solution. Choose three.

A. Move the devices closer together.

B. Keep the devices in line of sight.

C. Remove any obstruction between the devices.

D. Keep the devices in different geographic locations.


Options are :

  • B,C,D
  • A,C,D
  • A,B,C (Correct)
  • A,B,D

Answer : A,B,C

At what voltage does a USB host supply power to the USB bus?   


Options are :

  • 3 volts
  • 50 volts
  • 5 volts (Correct)
  • 15 volts

Answer : 5 volts

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer? 


Options are :

  • Denial-of-Service (DoS) attack
  • Man-in-the-middle attack
  • Shoulder surfing attack (Correct)
  • Buffer-overflow attack

Answer : Shoulder surfing attack

Which of the following bus interfaces are used by the video capture cards?

Each correct Answer represents a complete solution. Choose two.

A. VESA

B. AGP

C. PCIe

D. EISA


Options are :

  • A,D
  • B,C (Correct)
  • A,B
  • C,D

Answer : B,C

Which of the following are types of social engineering attacks?

Each correct Answer represents a complete solution. Choose two.

A. An unauthorized person gains entrance to the building where the company's database server

resides and accesses the server by pretending to be an employee.

B. An unauthorized person inserts an intermediary software or program between two

communicating hosts to listen to and modify the communication packets passing between the two

hosts.

C. An unauthorized person calls a user and pretends to be a system administrator in order to get

the user's password.

D. An unauthorized person modifies packet headers by using someone else's IP address to his

identity.


Options are :

  • B,D
  • B,C
  • A,D
  • A,C (Correct)

Answer : A,C

Your customers Windows XP machine has become unusable due to some unknown cause. You want to put the computer into a working state again. What is the best way to do this? 


Options are :

  • Use the Windows Recovery Console with the Windows Recovery CD to put the system back in a working state. (Correct)
  • Reinstall Windows.
  • Simply uninstall any new software.
  • Simply put the Windows Recovery CD in and the recovery process will start

Answer : Use the Windows Recovery Console with the Windows Recovery CD to put the system back in a working state.

Which of the following can be installed in an AGP slot?   


Options are :

  • RAM
  • Video card (Correct)
  • Microprocessor
  • Modem card

Answer : Video card

Which of the following substances are restricted under Restriction of Hazardous Substances

(RoHS)?

Each correct Answer represents a complete solution. Choose all that apply.

A. Mercury (Hg)

B. Lead (Pb)

C. Iron (Fe)

D. Cadmium (Cd)


Options are :

  • A,B,C
  • A,B,D (Correct)
  • B,C,D
  • A,C,D

Answer : A,B,D

Which of the following defines power management for various types of computers and peripherals? 


Options are :

  • PCIe
  • PCI
  • ACPI (Correct)
  • HDMI

Answer : ACPI

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000

Professional client computers and four Windows 2000 servers. All the client computers are able to

connect to the Internet. Mark is concerned about malware infecting the client computers through

the Internet. What will Mark do to protect the client computers from malware? Each correct Answer

represents a complete solution. Choose two.

A. Educate users of the client computers about the problems arising due to malware.

B. Educate users of the client computers to avoid malware.

C. Prevent users of the client computers from executing any programs.

D. Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.


Options are :

  • A,B (Correct)
  • C,D
  • B,C
  • A,D

Answer : A,B

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions