CompTIA Strata IT Fundamentals
Question No: 171 – (Topic 2)
Which of the following statements about expansion bus is true?
It connects expansion cards to BIOS.
It connects expansion cards to system bus.
It is a network interconnectivity device that translates different communicationprotocols and is used to connect dissimilar networks.
It is a cable made of light-conducting glass or plastic fibers.
Answer: B Explanation:
Expansion bus is a collection of wires and protocols used for the expansion of a computer. It connects expansion cards such as network interface card, video card, etc., to system bus. Expansion cards connect to the expansion bus through the expansion slot.
Answer option D is incorrect. Fiber optic cable is made of light-conducting glass or plastic fibers.
Answer option C is incorrect. Expansion bus is not a network connectivity device. It does not translate different communication protocols and is not used to connect dissimilar
FactWhat is a gateway? Hide
Gateway is a network interconnectivity device thattranslates different communication protocols and is used to connect dissimilar network technologies. It provides greater functionality than a router or bridge because a gateway functions both as a translator and a router. Gateways are slower than bridges and routers. Gateway is an application layer device.
Question No: 172 – (Topic 2)
You work as a Network Administrator for NetTech Inc. The company has a wireless local areanetwork (WLAN). You want to prevent your wireless access point from being accessed by intruders.
What will you do to accomplish the task?
Answer: A Explanation:
In order to prevent your wireless access point from being accessed by intruders, you will have to implement Wired Equivalent Privacy (WEP) on the network. WEP is a security protocol for wireless local area networks (WLANs). It is the most commonly and widely accepted security standard.
Almost all the available operating systems, wireless access points, wireless bridges support this security standard. It has two components, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.
Answer option C is incorrect. Secure Sockets Layer(SSL) is a protocol used to transmit private documents via the Internet. SSL uses a combination of public key and symmetric encryption to provide communication privacy, authentication, and message integrity. Using the SSL protocol, clients and servers cancommunicate in a way that prevents eavesdropping and tampering of data on the Internet. Many Web sites use the SSL protocol to obtain confidential user information, such as credit card numbers. By
convention, URLs that require an SSL connection start withhttps: instead of http:. By default, SSL uses port 443 for secured communication.
Answer option D is incorrect. Auditing is used to track user accounts for file and object access, logon attempts, system shutdown etc. This enhances the security of the network. Before enabling auditing, the type of event to be audited should be specified in the Audit Policy in User Manager for Domains.
Answer option B is incorrect. Extensible Authentication Protocol (EAP) is an authentication protocol that provides support for a wide range of authentication methods, such as smart cards, certificates, one-time passwords, public keys, etc. It is an extension to Point-to-Point Protocol (PPP), which allows the application of arbitrary authentication mechanisms for the validation of a PPP connection.
Question No: 173 HOTSPOT – (Topic 2)
Identify the ATX power connector in the image given below.
ATX main power connector: This connector is used in ATX, SFX, and in all ATX oriented form factor power supplies. It is a 20-pin connector with a square hole forpin 1 and round holes for the other 19 pins.
Question No: 174 – (Topic 2)
Which of the following is a software component that can be integrated into Web pages and applications, within a computer or among computers in a network, to reuse the functionality?
Answer: C Explanation:
ActiveX controls are software components that can be integrated into Web pages and applications, within a computer or among computers in a network, to reuse the functionality. Reusability of controls reduces development time of applications and improves program interfaces. They enhance the Web pages with formatting features and animation. ActiveX controls can be used in applications written in different programming languages that recognize Microsoft#39;s Component
Object Model (COM). These controls always run in a container. ActiveX controls simplify and automate the authoring tasks, display data, and add functionality to Web pages.
Answer option B is incorrect. The ComboBox component is a standard HTML drop-down, scrollable list. It is a combination of three components: a Button component, a TextInput component, and a List component. A combo box allows a user to select only one option from the drop-down list. A combo box can be static or editable. An editable combo box includes an input text field at the top of the list. This field allows a user to enter text directly.
Answer option A is incorrect. The Timer component is designed for a Windows Forms environment. It raises an event at regular intervals.
The Interval property of the component defines the length of the intervals. The Start and Stop methods of the component are used to turn on and off, respectively. The component is reset when the timer is switched off and there is no such option to pause the timer.
Question No: 175 – (Topic 2)
You work as a Network Administrator for Infonet Inc. Thecompany uses Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?
Only users within the company.
Only users with the correct WEP key.
Anyone can authenticate.
Answer: B Explanation:
Only users with the correct WEP key can authenticate from the access point of the network.
What is WEP?
Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has twocomponents, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.
Reference: TechNet, Contents: quot;Wireless LAN Technologies and Windows XPquot;
Question No: 176 – (Topic 2)
Which of the following devices is used to provide visual input that can be easily transferred over the internet?
Iomega Zip drive
Answer: B Explanation:
Webcam is a video cameraused to provide visual input that can be easily transferred over the internet.
Answer option D is incorrect. Trackball is a pointing device consisting of an exposed protruding ball housed in a socket that detects rotation about two axes.
Answer option A is incorrect. Solid-state drive is a device similar to hard disk. It does not contain moving parts and stores data in a digital format.
Answer option C is incorrect. Iomega Zip drive is an outdated medium-capacity removable disk storage system.
Question No: 177 – (Topic 2)
Which of the following PCMCIA card supports hard disk drives?
Answer: D Explanation:
Type III Personal Computer Memory Card International Association (PCMCIA) card supports hard disk drives. Type III slot is 10.5mm thick.
PCMCIA cards are also known as PC cards. The PC card uses a small expansion slot and is primarily used in laptop computers. PC cards are also available for desktop computers. Answer option B is incorrect. Type I card is most commonly used for memory. It is 3.3mm thick. Answer option C is incorrect. Type II card is mostly used for modem and LAN adapters. Type II card is 5mm thick. It is the most common PC card type. Most of the laptop computers have at least two Type II slots.
Question No: 178 – (Topic 2)
Which of the following are Internet standard protocols for emailretrieval?
Each correct answer represents a complete solution. Choose two.
Answer: B,D Explanation:
IMAP4 and POP3 protocols are Internet standard protocols for email retrieval.
Internet Message Access Protocol 4 (IMAP4)is an e-mail message retrieval protocol that allows email clients to retrieve e-mail messages from e-mail servers.
Post Office Protocol version 3 (POP3) is a protocol used to retrieve e-mails from a mail server. It is designed to work with other applications that provide the ability to send e-mails. POP3 is mostly supported by the commercially available mail servers. It does not support retrieval of encrypted emails.
POP3 uses port 110.
Answer option A is incorrect. Simple Network Management Protocol (SNMP)is a part of the TCP/IP protocol suite, which allows users to manage the network. SNMP is used to keep track of what is being used on the network and how the object is behaving.
Answer option C is incorrect. Simple Mail Transfer Protocol (SMTP) is aprotocol for sending e-mail messages between servers. E-mailing systems use this protocol to send mails over the Internet.
SMTP works on the application layer of the TCP/IP or OSI reference model. The SMTP client typically initiates a Transmission ControlProtocol (TCP) connection to the
SMTP server on the well-known port designated for SMTP, port number 25. However, e- mail clients require POP or IMAP to retrieve mails from e-mail servers.
Question No: 179 – (Topic 2)
You are selecting upgrade components for a PC. What sort of memory will you find specifically used in video?
VRAMis a Video RAM and is used in video cards.
FactWhat is video RAM? Hide Video RAM is a type of memory that stores information about the images that are displayed on the monitor screen. All types of video RAM are special arrangements of dynamic RAM (DRAM).It works as a buffer between the computer processor and the display and is often called the frame buffer.
Answer option D is incorrect. DRAM is a standard RAM type for PCs and laptops. Answer option A is incorrect. SRAM is a legacy type of RAM used in PCs.
FactWhat is the function of SRAM? Hide
Static Random Access Memory (SRAM) is used for a computer#39;s cache memory and as part of the random access memory digital-to-analog converter on a video card. Unlike DRAM, SRAM does not have to be periodically refreshed. SRAM retains data bits in its memory as long as power is being supplied. SRAM is significantly faster and more expensive than DRAM.
Answer option B is incorrect. LRAM is not an actual memory type. Reference:http://www.computermemoryupgrade.net/computer-memory-types-and- memorytechnology.html
Question No: 180 – (Topic 2)
Which of the following connectors are used to connect a keyboard to the computer?Each correct answer represents a complete solution. Choose three.
Five-pin DIN connector
Nine-pin D type male connector
Answer: A,B,C Explanation:
The following connectors are used for keyboards: Five-pin DIN connector
Six-pin mini-DIN connector USB connector
Five-pin DIN connectors areused on the computers with a Baby-AT form factor motherboard.
Six-pin mini-DIN connectors are used on PS/2 systems and most computers with LPX, ATX, and NLX motherboards.