CompTIA Strata IT Fundamentals
Question No: 161 – (Topic 2)
Which of the following options will you use to minimize ESD problems?
Wearing synthetic clothes in the computer lab.
A wrist strap.
A plastic CPU cover.
An antiglare screen.
Answer: B Explanation:
To minimizeElectrostatic Discharge (ESD) problems, you should wear a wrist strap when you are working on computer components. A wrist strap is a simple wire with a watchband- style strap at one end and a clip on the other end. The clip is connected to a common groundor to the piece of equipment being worked on.
Answer option D is incorrect. An antiglare screen on the monitor is used to protect the eyes from radiation.
Answer option A is incorrect. Wearing synthetic clothes can make the ESD problem worse. Synthetic clothes can transfer ESD charges from your skin when they rub against your clothes and can damage the computer components. It happens when your body or clothes come in contact with computer components.
Answer option C is incorrect. A plastic CPU cover cannotdecrease the ESD problem.
Question No: 162 – (Topic 2)
You work as a Network Administrator for McNeil Inc. The company has a Windows-based network. You want to upgrade a client computer from
Windows 98 SE to Windows 2000 Professional. Which of the following steps will you take before the upgrade?Each correct answer represents a part of the solution. Choose two.
Convert FAT partitions to NTFS partitions.
Verify that each component of the computer is in the hardware compatibility list (HCL).
Format the hard disk drive.
Remove the Windows folder from the hard disk.
Verify that the clientcomputer meets the minimum requirements for Windows 2000 Professional.
Answer: B,E Explanation:
Before performing the upgrade, you should take the following steps:
Verify that each component of the computer is in the hardware compatibility list (HCL). Verify that the client computer meets the minimum requirements for Windows 2000 Professional.
By verifying that each component of the computer is in the HCL, you will ensure that all
those components are supported and would be working properly in the upgraded operating system.
By verifying that the client computer meets the minimum requirements for the operating system to which the computer is to be upgraded, you will ensure that the upgrade process runs smoothly, and the new operating system is installed without any problem. If the minimum requirements are not met, the new operating system will fail to get installed on the computer.
Answer option A is incorrect. As Windows 2000 Professional supports FAT partitions, the conversion of FAT partitions to NTFS partitions is not required.
Answer option C is incorrect. Formatting the hard disk drive will erase all the data in the disk. For the upgrade, formatting of the disk is not required.
Answer option D is incorrect. After removing the Windows folder, the computer will fail to boot. This will not allow you to upgrade the existing operating system to the new one.
Question No: 163 – (Topic 2)
Which of the following types of display takes the least space on a desk?
Answer: D Explanation:
The Liquid Crystal Display (LCD) is an electronically modulated optical amplification shaped into a thin, flat display device made up of any number of color or monochrome pixels arrayed in front of a light source (backlight) or reflector. It is often utilized in battery- powered electronic devices because it uses very small amounts of electric power. The LCD display also takes the least space on a desk.
Answer options C and B are incorrect. CRT and Light Emitting Diode (LED) displays take lots of space as compared to LCD display.
Question No: 164 – (Topic 2)
Mark has a computer with a CD-ROM drive. He is unable to open the CD-ROM drive tray by pushing the Eject button on the front panel of the drive. What else can he do to open the tray?
Open the tray by holding it through pliers.
Insert a pin into the eject hole on the drive.
Push the Eject button for 2 minutes.
Open the CD-ROM cover.
Answer: B Explanation:
If Mark is unable to open the CD-ROM drive tray by pushing the Eject button on the front panel, he can open it by inserting a pin into theeject hole on the CD-ROM drive.
Answer options A and D are incorrect. These are not the right way to open the tray of a CD-ROM drive.
Answer option C is incorrect. Pushing the Eject button for such a long time will not help accomplish the task.
Question No: 165 – (Topic 2)
Which of the following is used by Wi-Fi Protected Access (WPA) to provide data encryption?
Answer: B Explanation:
TKIP (Temporal Key Integrity Protocol) is an encryption protocol defined in the IEEE 802.11i standard for wireless LANs (WLANs). It is designed to provide more secure encryption than the disreputably weak Wired Equivalent Privacy (WEP). TKIP is the encryption method used in Wi-Fi Protected Access (WPA), which replaced WEP in WLAN products.
TKIP is a suite of algorithms to replace WEP without requiring the replacement of legacy WLAN equipment. TKIP uses the original WEP programming but wraps additionalcode at the beginning and end to encapsulate and modify it. Like
WEP, TKIP uses the RC4 stream encryption algorithm as its basis.
What is WPA? Hide Wi-fi Protected Access (WPA) is an interoperable security standard for Wireless LAN (WLAN). For using WPA,encryption is required. WPA provides encryption by using Temporal Key Integrity Protocol (TKIP). TKIP uses a new encryption algorithm, which is stronger than WEP algorithm. 802.1x authentication is required in WPA.
Answer option C is incorrect. RC4 is a stream cipher designed by Ron Rivest. It is used in many applications, including Transport Layer Security
(TLS), Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), etc. RC4 is fast and simple. However, it has weaknesses that argue against its usein new systems. It is especially vulnerable when the beginning of the output keystream is not discarded, nonrandom or related keys are used, or a single keystream is used twice. Some ways of using RC4 can lead to very insecure cryptosystems such as WEP.
Answer option A is incorrect. The RSA algorithm is an example of the public key algorithm in which the public key is generated from the private key. In the RSA algorithm, public and private keys are generated as follows:
1.Choose two large prime numbers pand q of equal lengths, and compute n=p*q. 2.Choose a random public key e such that e and (p-1)*(q-1) are relatively prime. 3.Calculate e*d=1*mod[(p-1)*(q-1)]. Here, d is a private key.
Now (e,n) and (d,n) are the public and private keys respectively.
Answer option D is incorrect. International Data Encryption Algorithm (IDEA) is a block cipher. IDEA operates on 64-bit blocks using a 128-bit key. This algorithm was intended as a replacement for the Data Encryption Standard. IDEA was used in Pretty Good Privacy (PGP) v2.0, and was incorporated after the original cipher used in v1.0 was found to be insecure. It is an optional algorithm in OpenPGP. The cipher is patented in a number of countries but is freely available for non-commercial use. IDEA is a minor revision of an earlier cipher, PES (Proposed Encryption Standard). It was originally known as IPES (Improved PES).
What is the maximum resolution that the XGA video technology supports? A. 2560 x 1600
B. 1024 x 768
C. 2048 x 1536
D. 800 x 600
The XGA video technology supports a maximum resolution of 1024 x 768, where 1024 refers to horizontal pixels, and 768 refers to vertical pixels from top to bottom.
XGA stands for eXtended Graphics Array. It is a display standard that refers to video adapters. IBM introduced this display standard in 1990. It is capable of displaying the
resolution of 1024 x 768 pixels.
Answer option C is incorrect. The QXGA video technology supports a maximum resolution of 2048 x
Answer option D is incorrect. The SVGA video technology supports a maximum resolution of 800 x
Answer option A is incorrect. The WQXGA video technology supports a maximum resolution of 2560
Question No: 166 HOTSPOT – (Topic 2)
Identify the DVI-D dual link male connector in the image given below.
The DVI-D is a type of DVI connector. A DVI-D connector is used only for digitalsignal type of connection. DVI-D connectors come in dual and single links. The dual link connector contains
24 pins, whereas the single link connector comes with 18 pins.
Question No: 167 – (Topic 2)
Which of the following is the default resolution for a VGA monitor?
Answer: D Explanation:
Video Graphic Array (VGA) monitorshave a default resolution of 640×480-pixels. This is known as standard VGA resolution. Although computers typically use this resolution by default, you can get better resolution using a specifically designed video driver for the installed adapter.
Answeroptions A, C, and B are incorrect. Super VGA monitors have a default resolution of 800×600- pixels.
A VGA or SVGA connector is a 15-pin, three rows, female connector, on the back of a PC used for connecting monitors.
Reference: TechNet, Contents: quot;Chapter21 Multimediaquot;
Question No: 168 HOTSPOT – (Topic 2)
Identify the PS/2 connector in the image.
The PS/2 Mini-DIN connector uses four of the six pins on a keyboard connector. Pin 1 is used for keyboard data signal, pin 3 is ground, pin 4 has 5 Volt DC, and pin 5 is used for keyboard clock. Pin 2 and pin 6 are not used. The PS/2 6 pin Mini-DIN connector is used toconnect keyboard and mouse.
Question No: 169 – (Topic 2)
Andrew purchases a laptop that has the Windows 2000 Professional operating system. He wants to know about the BIOS version of the computer. Which of the following steps will he take to determine the version of the BIOS? Each correct answer represents a part of the solution. Choose two.
Click the Start menu, choose Programs gt; Accessories gt; Communications gt; System Information.
In the System Information window, click the Hardware Resources folder in the left pane.
Click the Start menu, choose Programs gt; Accessoriesgt; System Tools gt; System Information.
In the System Information window, click the System Summary folder in the left pane.
Answer: C,D Explanation:
In order to determine the version of the BIOS on Windows 2000/XP computers, the following steps have to betaken: Click the Start menu, choose Programs gt; Accessories gt; System Toolsgt; System Informati. In the System Information window, click the System Summary folder in the left pane.
Question No: 170 – (Topic 2)
Which of the following types of connectors is used by 1000BASE-TX gigabit ethernet?
Answer: A Explanation:
1000BASE-TX is an IEEE specification for Ethernet. This is commonly known asGigabit Ethernet. It supports the maximum speed of 1000Mbps and the maximum cable length of 100 meters.
1000BASE-TX uses Category 5 UTP cables and RJ-45 connectors. RJ-45 is a type of connector similar to an RJ-11 telephone connector, but it is larger in size because it has eight conductors.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|