[Free] 2017(Nov) Dumps4cert Testinsides CompTIA FC0-U41 Dumps with VCE and PDF Download 101-110

Dumps4cert 2017 Nov CompTIA Official New Released FC0-U41
100% Free Download! 100% Pass Guaranteed!

CompTIA Strata IT Fundamentals

Question No: 101 – (Topic 2)

Which of the following virus is a script that attaches itself to a file or template?

  1. E-mail virus

  2. Boot sector

  3. Macro virus

  4. Trojan horse

Answer: C Explanation:

A macro virus is a macro or script that attaches itself to afile or template. When the file is loaded, the instructions of the macro or script are executed.

Answer option B is incorrect. A boot-sector virus infects the boot record on hard disks and floppy disks, which is used to start the computer. When the computer is turned on or restarted, the virus is automatically executed. An infected boot disk may stop the computer from starting up.

Answer option A is incorrect. An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to many people in the their e-mail address book.

Answer option D is incorrect. A Trojan horse program can contain viruses, but it is not a virus itself.

Reference: quot;http://en.wikipedia.org/wiki/Macro_virus_(computing)quot;

Question No: 102 – (Topic 2)

Which of the following term is used for any small mobile hand-held device that provides computing, information storage and retrieval capabilities for business or personal use?

  1. Solid-state drive

  2. Personal Digital Assistant

  3. Pen drive

  4. SocketShield

Answer: B Explanation:

Personal digital assistant (PDA) is a term for any small mobile hand-held device that provides computing and information storage and retrieval capabilities for business or personal use such as keeping schedule calendarsand address book information. Most PDAs have a small keyboard. Some

PDAs have an electronically sensitive pad that accepts handwriting.

Answer option D is incorrect. SocketShield provides a protection shield to a computer system against

malware, viruses, spyware, and various types of keyloggers. SocketShield provides protection at the following two levels: 1.Blocking: In this level, SocketShield uses a list of IP addresses that are known as purveyor of exploits. All http requests for any page in these domains are simply blocked. 2.Shielding: In this level, SocketShield blocks all the current and past IP addresses that are the cause of unauthorized access. Answer option A is incorrect. A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data. An SSD emulates a hard disk drive interface, thus easily replacing it in most applications. It is also known as solid-state hard disk drive.

SSDs have no moving parts; hence, they are less fragile and silent than hard disks.As there are no mechanical delays, SSDs usually enjoy low access time and latency. An SSD using SRAM or DRAM (instead of flash memory) is often called a RAM-drive, which should not be confused with a RAM disk.

Answer option C is incorrect. A USB flash drive consists of flash memory data storage device integrated with a USB (Universal Serial Bus) 1.1 or 2.0 interface.

Reference: quot;http://en.wikipedia.org/wiki/Personal_digital_assistantquot;

Question No: 103 – (Topic 2)

Which of the following resolutions is supported by the SVGA video technology?

A. 640 x 200

B. 640 x 480

C. 800 x 600

D. 1024 x 768

Answer: C Explanation:

The SVGA video technology supports the resolution of 800 x 600, where 800 refers to the number of pixels from side to side across the screen, and 600 refers to the number of pixels vertically from top to bottom.

Answer option B is incorrect. The VGA video technology supports the resolution of640 x 480 with 16 colors.

Answer option A is incorrect. The CGA video technology supports the resolution of 640 x 200 with 2 colors.

Answer option D is incorrect. The XGA video technology supports the resolution of 1024 x 768.

Question No: 104 – (Topic 2)

Which of the following can be used to maintain data related to the user during navigation, possiblyacross multiple visits?

  1. Web caching

  2. CPU cache

  3. Cookie

  4. Access control list

Answer: C Explanation:

Cookie can be used to maintain data related to the user during navigation, possibly across multiple visits.

Cookie is a block of data, which a Web server stores on the client computer. If no expiration date is set for the cookie, it expires when the browser closes. If the expiration date is set for a future date, the cookie will be stored on the client#39;s disk after the session ends. If the expirationdate is set for a past date, the cookie is deleted.

Answer option D is incorrect. Access Control List (ACL) is the most commonly used object in Cisco IOS. It filters packets or network traffic by controlling whether routed packets are forwarded or blockedat the router#39;s interfaces. According to the criteria specified within the access lists, router determines whether the packets to be forwarded or dropped. Access control list criteria could be the source or destination address of the traffic or other information. The types of Cisco ACLs are Standard IP, Extended IP, IPX, Appletalk, etc.

Answer option A is incorrect. Web caching is a method for minimizing performance bottlenecks and reducing network traffic by serving locally cached Web content. Web cachinghelps in reducing bandwidth utilization during periods of high network traffic. High network traffic is usually caused when a large number of users use the network at the same time. With a caching solution in place, users#39; requests will be returned from the cache without having to travel over a WAN link to

the destination Web server.

Answer option B is incorrect. A CPU cache is a smaller faster memory used by the central processing unit of a computer to reduce the average time to access memory. It stores

copies of the data from the most frequently used main memory locations. When the processor needs to read from or write to a location in main memory, it first checks whether a copy of that data is in the cache. If so, the processor immediately reads from or writes to the cache, which is much faster than reading from or writing to main memory.

Reference: quot;http://en.wikipedia.org/wiki/Cookiequot;

Question No: 105 – (Topic 2)

Which of the following statements about the compression feature of the NTFS file system are true? Each correct answer represents a complete solution. Choose two.

  1. Compressed files on an NTFS volume can be read and written by any Windows-based application after they are decompressed.

  2. Users can work with NTFS-compressed files without decompressing them.

  3. It supports compression only on volumes.

  4. Itsupports compression on volumes, folders, and files.

    Answer: B,D Explanation:

    NTFS compression is available on volumes that use the NTFS file system. It has the following features:

    Users can work with NTFS-compressed files without decompressing them. It supports compression on volumes, folders, and files.

    NTFS-compressed file and folder names can be displayed in a different color to make them easier to identify.

    FactWhat is NTFS compression? Hide

    Compression is a process of reducing the actual size of a file stored on the hard disk. The compression that is available only on NTFS-formatted volumes is called NTFS compression. The following rules are applied to the compressed files or folders when they are moved or copied from one location to another:

    1. Whenfiles and folders are moved within the same NTFS volume, they retain their original state.

    2. When files and folders are copied within the same NTFS volume, the original compression attribute is lost and the files and folders inherit the compression attribute of the destination folder.

    3. When files and folders are moved or copied between NTFS volumes, the files and folders inherit the compression attribute of the destination folder.

      Note: File compression is available on a Windows XP Professional computeronly on NTFS volumes.

      Reference: TechNet, Contents: quot;How NTFS Worksquot;

      Question No: 106 – (Topic 2)

      Which of the following is generally defined as the difference between the brightest color (white) and the darkest color (black)?

      1. Reconnaissance

      2. Characterizing

      3. Pixel aspect ratio (PAR)

      4. Contrast ratio

Answer: D Explanation:

The contrast ratio is a measure of a display system, definedas the ratio of the luminance of the brightest color (white) to that of the darkest color (black) that the system is capable of producing. A high contrast ratio is a desired aspect of any display, but with the various methods of measurement for a system or its part, remarkably different measured values can sometimes produce similar results. Contrast ratio ratings provided by different manufacturers of display devices are not necessarily comparable to each other due to differences in method of measurement,operation, and unstated variables.

Answer option C is incorrect. Pixel aspect ratio (PAR) is a mathematical ratio that describes how the width of pixels in a digital image compares to their height. Most digital imaging systems describe an image as a grid of very small but nonetheless square pixels. However, some imaging systems, especially those which must maintain compatibility with Standard- definition television motion pictures, define an image as a grid of rectangular pixels in which the width of the pixel is slightly different from that of its height. Pixel Aspect Ratio describes this difference.

The Pixel Aspect Ratio value is used mainly in digital video software, where the motion pictures are to be converted or reconditioned so that they are used inother video systems than the original. The video player software may use pixel aspect ratio to properly render digital video on screen. The video editing software uses Pixel Aspect Ratio to properly scale and render a video into a new format.

Answer optionA is incorrect. Reconnaissance is a term that refers to information gathering behaviors that aim to profile the organization, employees, network, and systems before an attack is performed efficiently. It is the first step in the process of intrusion and involves unauthorized discovery and mapping of systems, services, or vulnerabilities. These discovery and mapping techniques are commonly known as scanning and enumeration.

Common tools, commands, and utilities used for scanning and enumeration include ping, telnet, nslookup, rpcinfo,

File Explorer, finger, etc.

Reconnaissance activities take place before performing a malicious attack. These activities are used to increase the probability of successful operation against the target, and to increase the probability of hiding the attacker#39;s identity.

Answer option B is incorrect. Characterizing is a term used to describe how a particular device currently reproduces color. Characterizing is also known as profiling. Once you have calibrated a device, it is profiled. The profile is a record of how a particular device matches with an objective standard for color reproduction so that it can produce most accurate results possible.

Reference: quot;http://en.wikipedia.org/wiki/Contrast_ratioquot;

Question No: 107 – (Topic 2)

Which of the following is an e-mail message retrieval protocol that allows e-mail clients to retrieve email messages from e-mail servers?

  1. SMTP

  2. IMAP

  3. SNMP

  4. PPTP

Answer: B Explanation:

IMAP is an e-mail message retrieval protocol that allows e-mail clients to retrieve e-mail messages from e-mail servers.

IMAP stands forInternet Message Access Protocol. This protocol helps to retrieve e-mail messages stored on a shared e-mail server. Through this protocol, a user can use a client e-mail program/Mail

User Agent (MUA) for downloading an e-mail from the shared server. A user can also use this protocol to edit or delete an e-mail from the shared e-mail server.

Answer option C is incorrect. Simple Network Management Protocol (SNMP) is a part of the TCP/IP protocol suite, which allows users to manage the network. SNMP is used to keep track of what is being used on the network and how the object is behaving. Answer option D is incorrect. The Pointto-

Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP does not provide confidentiality or encryption. It relies on the protocol being tunneled to provide privacy.

It is used to provide secure, low-cost remote access to corporate networks through public networks such as the Internet. Using PPTP, remote users can use PPP-enabled client computers todial a local

ISP and connect securely to the corporate network through the Internet. PPTP has been made obsolete by Layer 2 Tunneling Protocol (L2TP) and IPSec.

Answer option A is incorrect. Simple Mail Transfer Protocol (SMTP) is a protocol for sending e-mail messages between servers. E-mailing systems use this protocol to send mails over the Internet.

SMTP works on the application layer of the TCP/IP or OSI reference model. The SMTP client typically initiates a Transmission Control Protocol (TCP)connection to the SMTP server on the well-known port designated for SMTP, port number 25. However, e-mail clients require POP or IMAP to retrieve mails from e-mail servers.

Reference: quot;http://en.wikipedia.org/wiki/Internet_Message_Access_Protocolquot;


Which of the following terms describes software technologies that improve portability, manageability and compatibility of applications by encapsulating them from the underlying operating system on which they are executed?

  1. Encapsulation

  2. Application virtualization

  3. Failover

  4. System hardening Answer:B Explanation:

Application virtualization is an umbrella term that describes software technologies that improve portability, manageability and compatibility of applications by encapsulating themfrom the underlying operating system on which they are executed. A fully virtualized application is not installed in the traditional sense, although it is still executed as if it is. The application is fooled at runtime into believing that it is directlyinterfacing with the original operating system and all the resources are managed by it, when in reality it is not.

Application virtualization differs from operating system virtualization in that in the latter case, the whole operating system is virtualizedrather than only specific applications.

Answer option D is incorrect. System hardening is a term used for securing an operating system. It can be achieved by installing the latest service packs, removing unused protocols and services, and limiting the number of users with administrative privileges.

Answer option A is incorrect.

Encapsulation is an object-oriented programming term used to define the ability to contain and hide information about an object, such as internal data structures and code.

Encapsulation isolates the internal complexity of an object#39;s operation from the rest of the application. For example, when you set the width property on a command button, you do

not need to know how the value is stored and how the command button is resized. Answeroption C is incorrect. Failover is a term associated with cluster services. It refers to the ability of a server to immediately start servicing the requests if a primary server fails. If the application services in a cluster-node fail, the Cluster Servicegenerally tries to restart them on the same node. If the services do not start, then it moves the services to another node in the cluster and restarts them on that node.

Reference: quot;http://en.wikipedia.org/wiki/Application_virtualizationquot;

Question No: 108 – (Topic 2)

You have just taken over network support for a small company. They are currently usingMAC filtering to secure their wireless network. Is this adequate or not and why or why not?

  1. Yes, in fact MAC filtering is the most security you can have.

  2. No, you should have WEP or WPA encryption as well.

  3. Yes, MAC filtering includes encryption.

  4. No, MAC filtering is not secure at all.

Answer: B Explanation:

MAC filtering allows the possibility of someone using a packet sniffer and obtaining the MAC addresses of the computers that connect to your network. A skilled hacker can then emulate or fakethose MAC addresses and gain access to your network. You need to also implement some form of encryption.

FactWhat is WEP? Hide

Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components,authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection againstthe attacks that attempt to reveal the key stream.

FactWhat is WPA? Hide

WPA stands for Wi-Fi Protected Access. It is a wireless security standard. It provides better security than WEP (Wired Equivalent Protection). Windows Vista supports both WPA-PSK andWPA-EAP. Each of these is described as follows:

WPA-PSK: PSK stands for Preshared key. This standard is meant for home environment. WPA-PSK requires a user to enter an 8-character to 63-character passphrase into a wireless client. The WPA

converts thepassphrase into a 256-bit key.

WPA-EAP: EAP stands for Extensible Authentication Protocol. This standard relies on a back-end server that runs Remote Authentication Dial-In User Service for user authentication.

Note: Windows Vista supports a user to use asmart card to connect to a WPA-EAP protected network.

Answer option A is incorrect. MAC filtering by itself is not very secure. Answer option C is incorrect. MAC filtering does not include encryption.

Answer option D is incorrect. MAC filtering does provide a certain measure of security, but by itself is usually not sufficient.

Reference: http://articles.techrepublic.com.com/5100-10878_11-5031628.html

Question No: 109 – (Topic 2)

You are responsible for technical support at a company. An employee complains that they cannot open a particular file. When you see the file in Windows Explorer you note that it is in green. What is causing their problem?

  1. The file has been corrupted.

  2. The file was created by another user.

  3. The file is from an earlier version of Windows.

  4. The file was encrypted by another user.

Answer: D Explanation:

Encrypted files show up in green text and can only be opened by the person who encrypted them (or an administrator with the encryption key).

Answer option B is incorrect. Another user creating a file would not make it unopenable nor would it make it appear in green.

Answeroption A is incorrect. Corrupted files do not appear in green text.

Answer option C is incorrect. You can open files created in other versions of Windows. Reference: http://www.ntfs.com/ntfs-encrypted.htm

Question No: 110 – (Topic 2)

Which of the following types of batteries has shortest life?

  1. NiMH

  2. Lead-acid

  3. Silver-zinc

  4. NiCd

Answer: D Explanation:

The Nickel-cadmium (NiCd) battery has shortest life that ofthose Lead-acid and Silver-zinc batteries.

This battery has a nominal voltage of 1.2 volts.

Answer options B, A, and C are incorrect. Lead-acid, Nickel-metal hydride (NiMH), and Silver-zinc batteries have more life than NiCd batteries. A NiMH battery can have two to three times the capacity of an equivalent size NiCd.

Reference: quot;http://en.wikipedia.org/wiki/Nickel-cadmium_batteryquot;

100% Free Download!
Download Free Demo:FC0-U41 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert FC0-U41 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *