Latest Certified Success Dumps Download

FC0-U51 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Examcollection CompTIA FC0-U51 Dumps with VCE and PDF 221-230

September 17, 2017

2017 Sep CompTIA Official New Released FC0-U51
100% Free Download! 100% Pass Guaranteed!

CompTIA IT Fundamentals

Question No: 221 – (Topic 3)

How many pins are available on a PS/2 Mini-DIN connector?

  1. 5

  2. 4

  3. 6

  4. 3

Answer: C Explanation:

A PS/2 Mini-DIN connector has 6-pins , while only four are used. Pin 1 is used for keyboard data signal, pin 3 is ground, pin 4 has 5 Volt DC, pin 5 is used for keyboard clock, and pins 2 and 6 are not used. The PS/2 6-pin Mini-DIN connector is used for both keyboard and mouse. Older keyboard connectors use 5-pin DIN connector.

Question No: 222 – (Topic 3)

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

  1. Demilitarized zone (DMZ)

  2. Firewall

  3. Intrusion detection system (IDS)

  4. Packet filtering

Answer: C Explanation:

An Intrusion detection system (IDS) is used to detect unauthorized attempts to access and

manipulate computer systems locally or through the Internet or an intranet. It can detect several types of attacks and malicious behaviors that can compromise the security of a network and computers. This includes network attacks against vulnerable services, unauthorized logins and access to sensitive data, and malware (e.g. viruses, worms, etc.). An IDS also detects attacks that originate from within a system. In most cases, an IDS has three main components: Sensors, Console, and Engine. Sensors generate security events. A console is used to alert and control sensors and to monitor events. An engine is used to record events and to generate security alerts based on received security events. In many IDS implementations, these three components are combined into a single device. Basically, following two types of IDS are used :

Network-based IDS Host-based IDS

Answer option D is incorrect. Packet filtering is a method that allows or restricts the flow of specific types of packets to provide security. It analyzes the incoming and outgoing packets and lets them pass or stops them at a network interface based on the source and destination addresses, ports, or protocols. Packet filtering provides a way to define precisely which type of IP traffic is allowed to cross the firewall of an intranet. IP packet filtering is important when users from private intranets connect to public networks, such as the Internet.

Answer option B is incorrect. A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.

Answer option A is incorrect. Demilitarized zone (DMZ) or perimeter network is a small network that lies in between the Internet and a private network. It is the boundary between the Internet and an internal network, usually a combination of firewalls and bastion hosts that are gateways between inside networks and outside networks. DMZ provides a large enterprise network or corporate network the ability to use the Internet while still maintaining its security.

Reference: quot;;

Question No: 223 HOTSPOT – (Topic 3)

Identify the FireWire 400 port in the image given below.

Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE


Ensurepass 2017 PDF and VCE

The FireWire 400 port is now referred to as the IEEE 1394 port. The maximum speed of FireWire 400 is 400 Mbps. The standard FireWire 400 connector for ports found on Macintosh computers is a six-pin connector. Another popular FireWire 400 connector, found on devices such as camcorders and Windows computers, is the 4-pin connector. The image displayed in the question has 6-pin FireWire 400 port.

Ensurepass 2017 PDF and VCE

Question No: 224 – (Topic 3)

Which of the following actions can a technician take to reduce the chances of static charges being built up? Each correct answer represents a complete solution. Choose three.

  1. Wear silken clothes.

  2. Do not wear wrist strap.

  3. Remove carpets from computer rooms.

  4. Wear cotton clothes.

  5. Increase humidity level.

Answer: C,D,E Explanation:

In order to reduce the chances of static charges being built up, users or technicians will have to take the following steps:

Wear cotton clothes. This will reduce the chance of building up of static charges.

Do not cover the computer room#39;s floor with carpets. This stops neutralizing of static charges.

Increase humidity level. Humidity helps dissipate static charges. What is ESD?

ESD stands for Electrostatic discharge. The static electricity that we generate everyday creates ESD. If you walk across a carpet and touch someone, you experience a mild shock. Electrostatic discharge occurs when the electrostatic charge is transferred from one charged entity to another entity sensitive to that charge.

To minimize Electrostatic discharge (ESD) problems, consider wearing a wrist strap when you are working with computer components. A wrist strap is a wire with a watchband-style strap at one end and a plug or clip on the other end. The wrist strap plug or clip is connected to the ground or to the piece of equipment being worked on.

Answer option A is incorrect. A technician should not wear silken clothes during computer servicing, as silken clothes are more likely to generate static charges than cotton clothes. Answer option B is incorrect. Wearing wrist strap will keep a technician grounded. Hence, static charges cannot build up.

Reference: quot;;

Question No: 225 – (Topic 3)

Which of the following interfaces is the current standard for digital LCD monitors?

  1. DVE

  2. SVGA

  3. DVI

  4. VGA

Answer: C Explanation:

DVI interface is the current standard for digital LCD monitors.

DVI stands for Digital Visual Interface. It is a standard for high speed, high resolution digital display invented by Digital Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital signals coming from DVI connections. However, some monitors come with both types of cables. DVI has three main categories of

connectors. They are: DVI-A, DVI-D, and DVI-I. DVI-A is an analog-only connector, DVI-D is a digital-only connector, and DVI-I is an analog/digital connector. DVI-D and DVI-I connectors are of two types: single link and dual link. DVI supports UXGA and HDTV with a single set of links. Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.

Answer options D and B are incorrect. VGA and SVGA are old standards for monitors. A VGA or SVGA interface is a 15-pin, three rows, female connector, on the back of a PC used for connecting monitors.

Answer option A is incorrect. There is no such interface standard for digital LCD monitors as DVE.


Question No: 226 – (Topic 3)

Which of the following are touch screen technologies?

Each correct answer represents a complete solution. Choose all that apply.

  1. Surface Wave

  2. Resistive

  3. Transitive

  4. Capacitive

Answer: A,B,D Explanation:

Touch screen is a computer display screen that is sensitive to human touch. It allows a user to interact with a computer by touching the icons or graphical buttons on the monitor screen. It is a system that is designed to help users who have difficulty in using mouse or keyboard and is used with information kiosks, computer-based training devices etc. A touch screen panel is attached externally to the monitor that is connected to a serial or Universal Serial Bus (USB) port on a computer. Nowadays, monitors are also available with built-in touch screen technology. There are three types of touch screen technologies:

1.Resistive 2.Capacitive 3.Surface Wave

Answer option C is incorrect. There is no such touch screen technology as Transitive. Reference: quot;;

Question No: 227 – (Topic 3)

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?

  1. Password guessing attack

  2. Spoofing

  3. Phishing

  4. Replay attack

Answer: C Explanation:

Phishing is a type of scam that entice a user to disclose personal information such as social security number, bank account details, or credit card number. An example of phishing attack is a fraudulent e-mail that appears to come from a user#39;s bank asking to change his online banking password. When the user clicks the link available on the e-mail, it directs him to a phishing site which replicates the original bank site. The phishing site lures the user to provide his personal information.

Answer option B is incorrect. Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else#39;s IP address to his identity. However, spoofing cannot be used while surfing the Internet, chatting on- line, etc. because forging the source

IP address causes the responses to be misdirected.

Answer option D is incorrect. Replay attack is a type of attack in which attackers capture packets containing passwords or digital signatures whenever packets pass between two hosts on a network.

In an attempt to obtain an authenticated connection, the attackers then resend the captured packet to the system.

Answer option A is incorrect. A password guessing attack occurs when an unauthorized user tries to log on repeatedly to a computer or network by guessing usernames and passwords. Many password guessing programs that attempt to break passwords are available on the Internet. Following are the types of password guessing attacks:

Brute force attack Dictionary attack

Reference: quot;;

Question No: 228 – (Topic 3)

Which of the following firewalls inspects the actual contents of packets?

  1. Packet filtering firewall

  2. Application-level firewall

  3. Circuit-level firewall

  4. Stateful inspection firewall

Answer: B Explanation:

The application level firewall inspects the contents of packets, rather than the source/destination or connection between the two. An Application level firewall operates at the application layer of the OSI model.

Answer option C is incorrect. The circuit-level firewall regulates traffic based on whether or not a trusted connection has been established. It operates at the session layer of the OSI model.

Answer option A is incorrect. The packet filtering firewall filters traffic based on the headers. It operates at the network layer of the OSI model.

Answer option D is incorrect. The stateful inspection firewall assures the connection between the two parties is valid and inspects packets from this connection to assure the packets are not malicious.

Reference: quot;


Question No: 229 – (Topic 3)

Which of the following are used by FireWire 800 devices?

  1. 6-pin connectors

  2. 10-pin connectors

  3. 9-pin connectors

  4. 4-pin connectors

Answer: C Explanation:

FireWire 800 devices use 9-pin connectors at both ends of the cable. FireWire 400 devices can also be connected to the FireWire 800 ports and vice versa by using an appropriate adapter cable.

What are FireWire ports? Hide

FireWire ports are found on high-end computers and many new media centers. They are also called IEEE 1394 ports.

FireWire ports transfer data at a rate of 400 Mbps or 800 Mbps. They are used primarily for video transfer from digital movie cameras.

Answer options D and A are incorrect. FireWire 400 devices use 4-pin or 6-pin connectors. Reference: quot; quot;

Question No: 230 – (Topic 3)

You are responsible for purchasing computer hardware for a school district. You have been looking at various sales brochures advocating various types of memory. What would be one advantage to buying dual-channel memory?

  1. It will reduce memory bottlenecks.

  2. It will be twice as fast as single channel memory.

  3. It has no advantage over single channel memory.

  4. It will have more memory capacity than single channel memory.

Answer: A Explanation:

Dual Channel memory offers two channels for data to move through it. This may reduce bottle necks.

Answer options B and D are correct. The dual or single channel issue is unrelated to memory speed or capacity.

Answer option C is incorrect. It will have an advantage over single channel, though the advantages are slight.

Reference: configuration/

100% Free Download!
Download Free Demo:FC0-U51 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass FC0-U51 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE