Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
FC0-U41 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Examcollection CompTIA FC0-U41 Dumps with VCE and PDF 171-180

September 17, 2017

EnsurePass
2017 Sep CompTIA Official New Released FC0-U41
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/FC0-U41.html

CompTIA Strata IT Fundamentals

Question No: 171 – (Topic 2)

Which of the following statements about expansion bus is true?

  1. It connects expansion cards to BIOS.

  2. It connects expansion cards to system bus.

  3. It is a network interconnectivity device that translates different communicationprotocols and is used to connect dissimilar networks.

  4. It is a cable made of light-conducting glass or plastic fibers.

Answer: B Explanation:

Expansion bus is a collection of wires and protocols used for the expansion of a computer. It connects expansion cards such as network interface card, video card, etc., to system bus. Expansion cards connect to the expansion bus through the expansion slot.

Answer option D is incorrect. Fiber optic cable is made of light-conducting glass or plastic fibers.

Answer option C is incorrect. Expansion bus is not a network connectivity device. It does not translate different communication protocols and is not used to connect dissimilar

networks.

FactWhat is a gateway? Hide

Gateway is a network interconnectivity device thattranslates different communication protocols and is used to connect dissimilar network technologies. It provides greater functionality than a router or bridge because a gateway functions both as a translator and a router. Gateways are slower than bridges and routers. Gateway is an application layer device.

Reference: quot;http://www.webopedia.com/TERM/E/expansion_bus.htmlquot;

Question No: 172 – (Topic 2)

You work as a Network Administrator for NetTech Inc. The company has a wireless local areanetwork (WLAN). You want to prevent your wireless access point from being accessed by intruders.

What will you do to accomplish the task?

  1. Implement WEP.

  2. Implement EAP.

  3. Implement SSL.

  4. Implement auditing.

Answer: A Explanation:

In order to prevent your wireless access point from being accessed by intruders, you will have to implement Wired Equivalent Privacy (WEP) on the network. WEP is a security protocol for wireless local area networks (WLANs). It is the most commonly and widely accepted security standard.

Almost all the available operating systems, wireless access points, wireless bridges support this security standard. It has two components, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.

Answer option C is incorrect. Secure Sockets Layer(SSL) is a protocol used to transmit private documents via the Internet. SSL uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity. Using the SSL protocol, clients and servers cancommunicate in a way that prevents eavesdropping and tampering of data on the Internet. Many Web sites use the SSL protocol to obtain confidential user information, such as credit card numbers. By

convention, URLs that require an SSL connection start withhttps: instead of http:. By default, SSL uses port 443 for secured communication.

Answer option D is incorrect. Auditing is used to track user accounts for file and object access, logon attempts, system shutdown etc. This enhances the security of the network. Before enabling auditing, the type of event to be audited should be specified in the Audit Policy in User Manager for Domains.

Answer option B is incorrect. Extensible Authentication Protocol (EAP) is an authentication protocol that provides support for a wide range of authentication methods, such as smart cards, certificates, one-time passwords, public keys, etc. It is an extension to Point-to-Point Protocol (PPP), which allows the application of arbitrary authentication mechanisms for the validation of a PPP connection.

Reference: quot;http://en.wikipedia.org/wiki/Wired_Equivalent_Privacyquot;

Question No: 173 HOTSPOT – (Topic 2)

Identify the ATX power connector in the image given below.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Ensurepass 2017 PDF and VCE

Explanation:

ATX main power connector: This connector is used in ATX, SFX, and in all ATX oriented form factor power supplies. It is a 20-pin connector with a square hole forpin 1 and round holes for the other 19 pins.

Ensurepass 2017 PDF and VCE

Question No: 174 – (Topic 2)

Which of the following is a software component that can be integrated into Web pages and applications, within a computer or among computers in a network, to reuse the functionality?

  1. Timer component

  2. ComboBox

  3. ActiveX

  4. Combo

Answer: C Explanation:

ActiveX controls are software components that can be integrated into Web pages and applications, within a computer or among computers in a network, to reuse the functionality. Reusability of controls reduces development time of applications and improves program interfaces. They enhance the Web pages with formatting features and animation. ActiveX controls can be used in applications written in different programming languages that recognize Microsoft#39;s Component

Object Model (COM). These controls always run in a container. ActiveX controls simplify and automate the authoring tasks, display data, and add functionality to Web pages.

Answer option B is incorrect. The ComboBox component is a standard HTML drop-down, scrollable list. It is a combination of three components: a Button component, a TextInput component, and a List component. A combo box allows a user to select only one option from the drop-down list. A combo box can be static or editable. An editable combo box includes an input text field at the top of the list. This field allows a user to enter text directly.

Answer option A is incorrect. The Timer component is designed for a Windows Forms environment. It raises an event at regular intervals.

The Interval property of the component defines the length of the intervals. The Start and Stop methods of the component are used to turn on and off, respectively. The component is reset when the timer is switched off and there is no such option to pause the timer.

Answer option D is incorrect. There is no such component as Combo. Reference: quot;http://en.wikipedia.org/wiki/ActiveXquot;

Question No: 175 – (Topic 2)

You work as a Network Administrator for Infonet Inc. Thecompany uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

  1. Only users within the company.

  2. Only users with the correct WEP key.

  3. Anyone can authenticate.

  4. Onlythe administrator.

Answer: B Explanation:

Only users with the correct WEP key can authenticate from the access point of the network.

What is WEP?

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has twocomponents, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.

Reference: TechNet, Contents: quot;Wireless LAN Technologies and Windows XPquot;

Question No: 176 – (Topic 2)

Which of the following devices is used to provide visual input that can be easily transferred over the internet?

  1. Solid-state drive

  2. Webcam

  3. Iomega Zip drive

  4. Trackball

Answer: B Explanation:

Webcam is a video cameraused to provide visual input that can be easily transferred over the internet.

Answer option D is incorrect. Trackball is a pointing device consisting of an exposed protruding ball housed in a socket that detects rotation about two axes.

Answer option A is incorrect. Solid-state drive is a device similar to hard disk. It does not contain moving parts and stores data in a digital format.

Answer option C is incorrect. Iomega Zip drive is an outdated medium-capacity removable disk storage system.

Reference: quot;http://en.wikipedia.org/wiki/Computer_hardwarequot;

Question No: 177 – (Topic 2)

Which of the following PCMCIA card supports hard disk drives?

  1. Type VI

  2. Type I

  3. Type II

  4. Type III

Answer: D Explanation:

Type III Personal Computer Memory Card International Association (PCMCIA) card supports hard disk drives. Type III slot is 10.5mm thick.

PCMCIA cards are also known as PC cards. The PC card uses a small expansion slot and is primarily used in laptop computers. PC cards are also available for desktop computers. Answer option B is incorrect. Type I card is most commonly used for memory. It is 3.3mm thick. Answer option C is incorrect. Type II card is mostly used for modem and LAN adapters. Type II card is 5mm thick. It is the most common PC card type. Most of the laptop computers have at least two Type II slots.

Question No: 178 – (Topic 2)

Which of the following are Internet standard protocols for emailretrieval?

Each correct answer represents a complete solution. Choose two.

  1. SNMP

  2. POP3

  3. SMTP

  4. IMAP4

Answer: B,D Explanation:

IMAP4 and POP3 protocols are Internet standard protocols for email retrieval.

Internet Message Access Protocol 4 (IMAP4)is an e-mail message retrieval protocol that allows email clients to retrieve e-mail messages from e-mail servers.

Post Office Protocol version 3 (POP3) is a protocol used to retrieve e-mails from a mail server. It is designed to work with other applications that provide the ability to send e-mails. POP3 is mostly supported by the commercially available mail servers. It does not support retrieval of encrypted emails.

POP3 uses port 110.

Answer option A is incorrect. Simple Network Management Protocol (SNMP)is a part of the TCP/IP protocol suite, which allows users to manage the network. SNMP is used to keep track of what is being used on the network and how the object is behaving.

Answer option C is incorrect. Simple Mail Transfer Protocol (SMTP) is aprotocol for sending e-mail messages between servers. E-mailing systems use this protocol to send mails over the Internet.

SMTP works on the application layer of the TCP/IP or OSI reference model. The SMTP client typically initiates a Transmission ControlProtocol (TCP) connection to the

SMTP server on the well-known port designated for SMTP, port number 25. However, e- mail clients require POP or IMAP to retrieve mails from e-mail servers.

Reference: quot;http://en.wikipedia.org/wiki/Internet_Message_Access_Protocolquot;

Question No: 179 – (Topic 2)

You are selecting upgrade components for a PC. What sort of memory will you find specifically used in video?

  1. SRAM

  2. LRAM

  3. VRAM

  4. DRAM

Answer: C

Explanation:

VRAMis a Video RAM and is used in video cards.

FactWhat is video RAM? Hide Video RAM is a type of memory that stores information about the images that are displayed on the monitor screen. All types of video RAM are special arrangements of dynamic RAM (DRAM).It works as a buffer between the computer processor and the display and is often called the frame buffer.

Answer option D is incorrect. DRAM is a standard RAM type for PCs and laptops. Answer option A is incorrect. SRAM is a legacy type of RAM used in PCs.

FactWhat is the function of SRAM? Hide

Static Random Access Memory (SRAM) is used for a computer#39;s cache memory and as part of the random access memory digital-to-analog converter on a video card. Unlike DRAM, SRAM does not have to be periodically refreshed. SRAM retains data bits in its memory as long as power is being supplied. SRAM is significantly faster and more expensive than DRAM.

Answer option B is incorrect. LRAM is not an actual memory type. Reference:http://www.computermemoryupgrade.net/computer-memory-types-and- memorytechnology.html

Question No: 180 – (Topic 2)

Which of the following connectors are used to connect a keyboard to the computer?Each correct answer represents a complete solution. Choose three.

  1. Six-pin mini-DINconnector

  2. USB connector

  3. Five-pin DIN connector

  4. Nine-pin D type male connector

Answer: A,B,C Explanation:

The following connectors are used for keyboards: Five-pin DIN connector

Six-pin mini-DIN connector USB connector

Five-pin DIN connectors areused on the computers with a Baby-AT form factor motherboard.

Six-pin mini-DIN connectors are used on PS/2 systems and most computers with LPX, ATX, and NLX motherboards.

100% Free Download!
Download Free Demo:FC0-U41 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass FC0-U41 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE