CompTIA Strata IT Fundamentals
Question No: 31 – (Topic 1)
Which of the following devices contains no moving parts and stores data in a digital format?
Floppy disk drive
Hard disk drive
Answer: A Explanation:
Solid-state drive contains no moving parts and stores data in a digital format.
A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistentdata. An SSD emulates a hard disk drive interface, thus easily replacing it in most applications. It is also known as solid-state hard disk drive. SSDs have no moving parts; hence, they are less fragile and silent than hard disks. As there are no mechanical delays,
SSDs usually enjoy low access time and latency. An SSD using SRAM or DRAM (instead of flash memory) is often called a RAM-drive, which should not be confused with a RAM disk.
Answer options D, C, and B are incorrect. Hard disk drive, floppy diskdrive, and cartridge tape drive contain moving parts.
Question No: 32 – (Topic 1)
What is the difference between the USB 2.0 and IEEE1394 bus standards?
IEEE 1394 is faster than USB 2.0.
IEEE 1394 supports hot swapping.
IEEE 1394 is slower than USB 2.0.
USB 2.0 supports Plug and Play feature.
Answer: C Explanation:
IEEE is a standard that defines the specifications for highspeed serial bus. IEEE 1394 is also known as Firewire. Like USB, IEEE 1394 also supports hot swapping and Plug and Play feature. However, an
IEEE 1394 bus runs at a speed of 400 Mbps, which is slower than that of a USB 2.0 bus. The IEEE
1394 standard defines two types of connectors, 4-pin and 6-pin. 6-pin connectors are commonly used on PC adapters. 4-pin connectors are used on Macintosh systems. What is USB?
Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel, Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to external hardware devices. USB supports hot plugging, which means that a USB device can be installed or removed while the computer is running. A single USB port can beused to connect up to
127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1 has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer rate of
480 Mbps. USB 2.0 is fully backward compatible with USB 1.1.
Question No: 33 – (Topic 1)
You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?
Non Parity RAM
Logic Parity RAM
Answer: C Explanation:
Parity RAM can indeed handle error correction, however is not supported in most new computers.
ECC is supported. What is ECC memory module?
An Error Correcting Code (ECC) memory moduledetects and corrects single-bit errors in memory. It helps a computer to continue working without interruption and data corruption. Although ECC can detect both single-bit and double-bit errors, it can only correct single-bit errors. As most memory errorsare of a single-bit nature, ECC provides high system reliability and attendant availability. An ECC-based computer is a good choice for servers. Answer option B is incorrect. Non parity RAM offers no error checking at all. Answer option D is incorrect. Logic Parity is a mechanism whereby a non parity RAM chip can simulate parity. Answer option A is incorrect. Rambus is unrelated to the issue of parity. What is RIMM? Rambus Inline Memory Module (RIMM) is a type of memory that has 184 pins. It was developed by Rambus, Intel, and Kingston. This module only supports Rambus memory and fits on its own slot.
Question No: 34 – (Topic 1)
Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the Web site, instead of waiting for the download to complete?
Session Initiation Protocol
Answer: B Explanation:
Streaming media is a technology that allows you to hear and watch video clips as soon as they start downloading from the Web site, instead of waiting for the download to complete.
Answer option C is incorrect. HTTP streaming is a simple mechanism for sending data from a Web server to a Web browser in response to an event. Every time a seek operation is performed, the media player makes a request to the server side script with a couple of GET variables. One is the file to play and one is the start position. The server side script then starts the video from the offset given. For example, after starting the video, a user can jump directly to any part in the video without having to wait until it is loaded. Answer optionA is incorrect. Session Initiation Protocol (SIP), designed by Henning
Schulzrinne and Mark Handley in 1996, is a signaling protocol, widely used for setting up and tearing down multimedia communication sessions such as voice and video calls over the Internet
(VoIP).Answer option D is incorrect. Slipstreaming is a process of integrating service pack updates into the Windows XP Professional setup files. The slipstreaming process eliminates the need of deploying service pack update on each computer separately.
Question No: 35 – (Topic 1)
What are the benefits of using Universal Serial Bus (USB) 2.0 over legacy communication ports such as RS-232 and parallel ports? Each correct Answer represents a complete solution. Choose all that apply.
Easy configuration of hardware devices
Answer: A,B,D Explanation:
Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel,
Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to external hardware devices. USB supports hot plugging, which means that a USB device can be installed or removed while the computer is running. A single USB port canbe used to connect up to 127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1 has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer rate of
480 Mbps. USB 2.0 is fully backward compatible with USB 1.1. By connecting a USB hub to a USB port on a computer, you can connect multiple devices to the computer and therefore get the benefit of expansion using the same port.
Answer option C is incorrect. USB ports have nothing to do with security.
Reference: TechNet Technical Information CD, Topic: quot;Appendix C – Hardware Supportquot;
Question No: 36 – (Topic 1)
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee#39;s computer?
Denial-of-Service (DoS) attack
Answer: D Explanation:
The Shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee#39;s computer.
Shoulder surfing is a type of in person attack in which an attacker gathers information about thepremises of an organization. This attack is often performed by looking surreptitiously at the keyboard or monitor screen of an employee#39;s computer while he is typing in his password at any access point such as a terminal/Web site. An attacker can also gather information by looking at open documents on the employee#39;s desk, posted notices on the notice boards, etc.
Answer option A is incorrect. Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packetspassing between the two hosts. The software intercepts the communication packets and then sends the information to the receivinghost. The receiving host responds to the software, presuming it to be the legitimate client.
Answer option C is incorrect. A buffer-overflow attack is performed when a hacker fills a field, typically an address bar, with more characters than it can accommodate. The excess characters can be run as executable code, effectively giving the hacker control of the computer and overriding any security measures set.
Answer option B is incorrect. A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers make Denial-of-Service attacks by sending a large number of protocol packets to a network. A DoS attack can cause the following to occur:
Saturate network resources.
Disrupt connections between two computers, thereby preventing communications between services.
Disrupt services to a specific computer.
A SYN attack is a common DoS technique in which an attacker sends multiple SYN packets to a target computer. For each SYN packet received, the target computer allocates resources and sends an acknowledgement (SYN-ACK) to the source IP address. Since the target computer does not receive a response from the attacking computer, it attempts to resend the SYN-ACK. This leaves TCP ports in the half-open state. When an attacker sends TCP SYNs repeatedly before the half-open connections are timed out, the target computer eventually runs out of resources and is unable to handle any more connections, thereby denying service to legitimate users.
Question No: 37 DRAG DROP – (Topic 1)
Drag and drop the appropriate class of fire extinguisher in front of types of fires.
Class A fire extinguisher is used for wood and paper fire.
Class B fire extinguisher is used for flammable liquid and gases fire. Class C fire extinguisher is used for electrical fire.
Class D fire extinguisher is used for combustible metals fire. Reference. quot;http.//en.wikipedia.org/wiki/Fire_extinguisherquot;
Question No: 38 – (Topic 1)
You are responsible for technical support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/passkey. What is the most likely problem?
His operating system is incompatible.
A firewall is blocking him.
His laptop isincompatible.
MAC filtering is blocking him.
Answer: D Explanation:
The most likely problem is that, since this is a new laptop, the laptop#39;s MAC address is not listed with the router, and is therefore blocked by MAC filtering.
What is MAC addressfiltering?
MAC address filtering is a security method that enables a device to allow only certain MAC addresses to access a network. It can be configured on a Wireless Access Point (WAP) to allow only certain system MAC addresses to communicate with the rest of the network.
MAC address filtering can be performed using either of the two policies: exclude all by
MAC filtering can also be used on a wireless networkto prevent certain network devices from accessing the wireless network. MAC addresses are allocated only to hardware devices, not to persons.
Answer option B is incorrect. Firewalls block certain types of traffic, but would not completely block an attemptto connect.
Answer options A and C are incorrect. Wireless networking is not operating system or hardware specific. Macintosh, Linux, Windows, all can connect to the same wireless network.
Question No: 39 – (Topic 1)
Which of the following isthe clock speed of the Accelerated Graphics Port (AGP) 8X expansion slot?
Answer: C Explanation:
The clock speed of the Accelerated Graphics Port (AGP) 8X expansion slot is 533 MHz. AGP expansion slot is a highspeed 32-bit bus designed for high performance graphics and video support. It allows a video card to have direct access to a computer#39;s RAM, which enables fast video performance. AGP provides a bandwidth of up to 2,133 MB/second.
Answer option A is incorrect. The clock speed of Accelerated Graphics Port (AGP) 4X expansion slot is
Answer option B is incorrect. The clock speed of Accelerated Graphics Port (AGP) 2X expansion slot is 133 MHz.
Answer option D is incorrect. The Accelerated Graphics Port(AGP) expansion slot does not support the clock speed of 633 MHz.
Question No: 40 – (Topic 1)
Which of the following features are related to power management? Each correct answer represents a complete solution. Choose two.
Answer: B,C Explanation:
The Hibernate mode and Standby mode are features related to power management. Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a computer is saved to the hard disk, and the computer shuts down. Auser will have to power on the computer to restore the previous settings. When a computer resumes from hibernate mode, it reads the saved settings from the disk and restores the system state as it was before it entered hibernate mode. By default, hibernatemode is disabled. If a computer is not ACPI-enabled or APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer to automatically hibernate after a certain time.
With ACPI-enabled and APM-enabled computers, users are able to set hibernate mode automatically.
The standby mode is a power saving feature for computers. In this mode, a computer does not shut down completely. The computer goes to low power state and, as a result, it consumes less power.
When the computer resumes from the standby mode, full power is restored to its devices. During the standby mode, if the power supply is disconnected or interrupted, data might be lost. The standby mode is available automatically on ACPI-enabled or APM-enabled computers. Users donot need to enable this mode manually. This mode is not available in non-ACPI and non-APM based computers.
Answer option A is incorrect. Hot plugging is a feature in which a device can be installed or removed while the computer is running.
Answer option Dis incorrect. Safe Mode is a Windows feature used to start a computer with basic drivers, such as mouse, keyboard, etc. It bypasses blocking issues, such as system corruption, or installation of incompatible drivers or system services, enabling the Administrator to resolve such issues.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|