CompTIA Strata IT Fundamentals
Question No: 81 – (Topic 1)
Which of the following statements about theDVI-I connector are true? Each correct answer represents a complete solution. Choose two.
It contains 4 more pins than the DVI-D connector.
It is used only for digital signal connection.
It is used for both digital and analog signal connections.
It contains 15 more pins than the DVI-D connector.
Answer: A,C Explanation:
The DVI-I is a type of DVI connector. This connector is used for both digital and analog signal connections. DVI-I connectors come in dual and single links. To carry analogsignal, it contains 4 more pins than the DVI-D connector.
What is DVI?
DVI stands for Digital Visual Interface. It is a standard for high speed, high resolution digital display invented by Digital Display Working Group (DDWG). DVI accommodates analog anddigital interfaces with a single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital signals coming from DVI connections. However, some monitors come with both types of cables. DVI has three main categories of connectors. They are. DVI-A, DVI-D, and DVI-I. DVI-A is an analog-only connector,
DVI-D is a digital-only connector, and DVI-I is an analog/digital connector. DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and HDTV with a single set of links. Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.
Answer option B is incorrect. The DVI-D connector is used only for digital signal connection.
Question No: 82 – (Topic 1)
What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct Answer represents a complete solution. Choose all that apply.
Answer: A,B,D Explanation:
Wireless Transport Layer Security (WTLS) is a security layer of WAP, which isspecifically designed for a wireless environment. It provides privacy, data integrity, and authentication for client-server communications over a wireless network. WTLS ensures that a client and server are authenticated so that wireless transactions remainsecure and the connection is encrypted. WTLS is required because a wireless network does not provide end-to-end security.
What is authentication? Authentication is a process of verifying the identity of a person, network host, or system process.
The authentication process compares the provided credentials with the credentials stored in the database of an authentication server. Answer option C is incorrect. WTLS cannot provide bandwidth to wireless devices.
Question No: 83 HOTSPOT – (Topic 1)
Identify the DVI-D single link male connector in the image given below.
The DVI-D is a type of DVI connector. A DVI-D connector is used only for digital signals. DVI-D connectors come both in dual and single links. The single link connector contains 18 pins, whereas the dual link connector comes with 24 pins.
Question No: 84 HOTSPOT – (Topic 1)
Identify the area showing the DIMM slots in the image of the motherboard.
Dual In-line Memory Module (DIMM) is a type of memory module that comes with 168 and 184 pins.
A DIMM slot is larger than a SIMM slot. DIMM with 168 pins has two notches on its base. 184-pin DIMMs are for DDR SDRAMmodules which are available in Pentium III and Pentium 4 and Athlon systems. 184-pin DIMMs are available in PC2100, PC2700, PC3200 and PC3500 and faster. The number of chips on a 184-pin DIMM may vary, but they have 92 pins on both side of DIMM for a totalof 184. 184-pin DIMMs are 5.375quot; long and 1.375quot; high, and the heights may vary. DIMMs have
a small notch on the bottom of the module. DIMM mounts onto its slots differently than SIMM.
What is SIMM?
Single Inline Memory Module (SIMM) is a type of memory module that comes in two types, 30-pin and 72-pin. A 72-pin SIMM can be easily identified by a single notch on its base. A 30-pin SIMM does not have a notch on its base.
Question No: 85 – (Topic 1)
Which of the following protocols transmits error messages and network statistics?
Answer: A Explanation:
ICMP transmits error messages and network statistics.
Internet Control Message Protocol (ICMP) is an integral part of IP. It is used to report an error in datagram processing. The Internet Protocol (IP) is used for host-to-host datagram service in a network. The network is configured with connecting devices called gateways. When an error occurs in datagram processing, gateways or destination hosts report theerror to the source hosts through the ICMP protocol. The ICMP messages are sent in various situations, such as when a datagram cannot reach its destination, when the gateway cannot direct the host to send traffic on a shorter route, when the gateway does not have the buffering capacity, etc. Answer option C is incorrect.
Transmission Control Protocol (TCP) is a reliable, connection-oriented protocol operating at the transport layer of the OSI model. It provides a reliable packet delivery serviceencapsulated within the Internet
Protocol (IP). TCP guarantees the delivery of packets, ensures proper sequencing of data, and provides a checksum feature that validates both the packet header and its data for accuracy. If the network corrupts or loses a TCP packet during transmission, TCP is responsible for retransmitting the faulty packet. It can transmit large amounts of data.
Application-layer protocols, such as HTTP and
FTP, utilize the services of TCP to transfer files between clients and servers.
Answer option D is incorrect. NNTP stands for Network News Transfer Protocol (NNTP). It is a simple
ASCII text-based protocol used to post, distribute, and retrieve network news messages from NNTP servers and NNTP clients on the Internet. Answer option B is incorrect.
Dynamic Host Configuration
Protocol (DHCP) is a TCP/IP standard used to dynamically assign IP addresses to computers, so that they can communicate with other network services. It reduces the complexity of managing network client IP address configuration. A DHCP server configures DHCP-enabled client computers on the network. It runs on servers only. It also provides integration with the Active Directory directory service.
Question No: 86 – (Topic 1)
In which of the following conditions does BIOS need to be updated? Each correct answer represents a complete solution. Choose two.
If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS.
If the operating system installed on the computer has bugs.
If the BIOS does not support new devices.
If the software application installed on the computer stops respondingfrequently.
Answer: A,C Explanation:
The BIOS on a computer should be updated in the following conditions. If the BIOS does not support new devices.
If users need to use new hardware features or options that are supported by motherboard, but not supportedby the computer BIOS.
The BIOS can also be updated if a user has a device problem, and it is confirmed that the problem is due to BIOS.
What is BIOS?
Basic Input/ Output System (BIOS) are software that manages hardware and enables the operating system tocommunicate with the computer#39;s hardware components. The BIOS software is built-in on
a ROM chip, known as Complementary Metal Oxide Semiconductor (CMOS) chip, on the motherboard.
Answer option D is incorrect. In this case, a user needs to contact the helpdesk of the software application provider to fix the issue.
Answer option B is incorrect. In case of operating system#39;s bug, users need to install patches and service packs provided by the operating system vendor.
Question No: 87 – (Topic 1)
You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a complete solution. Choose all that apply.
Install the second hard disk drive on the primary IDE controller. Designate one drive as Master and the other as Slave.
Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on primary IDE controller. Designate both drives as Master.
Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on the primary controller. Designate the second hard disk drive as Slave.
Install both the hard disk driveson the primary IDE controller. Designate both drives as
Answer: A,B Explanation:
While installing two hard disk drives on a computer, any one of the following two combinations can be used.
Install the drives, one each on the primary and secondary IDE controllers and designate both as Master.
Install both drives on the primary IDE controller and designate one as Master and the other as
What are the jumper settings on IDE/EIDE drives?
Each IDE/EIDE drive must support the Master, Slave, and Cable Select types of jumper settings. The
Master/Slave setting is accomplished by jumpering a set of pins on the hard disk/CD-ROM drive.
If two drives are attached to one controller, one drive should be set as Master and the other as
Slave. If bothdrives using the same controller are set as Master, or Slave, none of them will work.
Answer option D is incorrect. There is no setting such as Secondary.
Question No: 88 – (Topic 1)
Which of the following refers to the data rate supported by a network connection or interface?
Preboot Execution Environment (PXE)
Answer: A Explanation:
Bandwidth is a term that refers to the data rate supported by a network connection or interface.
Bandwidth (or digital bandwidth) is a measurement of how much data can be sent in a period of time. It is a data rate measured in bits. The standardunit of digital bandwidth is bits per second (bps). In radio communication, bandwidth (analogue bandwidth) is the range of frequencies occupied by the radio signals. The standard unit of analogue
bandwidth is Hertz (Hz).
Answer option C is incorrect. In Web site designing, branding refers to the look and feel of a Web site. Branding helps in differentiating a site from its competitors and also helps the customer to develop a relationship with the Web site. The look and feel of a Web site comes through logo, fonts, color schemes, and symbols used in the Web site. The overall look of the Web site should be consistent.
Answer option B is incorrect. Preboot Execution Environment (PXE) is an environment to boot computers using a network interface independentlyof available data storage devices like hard disks or installed operating systems. PXE is also known as Pre-Execution Environment.
Answer option D is incorrect. Spam is a term that refers to the unsolicited e-mails sent to a large number of e-mail users. The number of such e-mails is increasing day by day, as most companies now prefer to use e-mails for promoting their products. Because of these unsolicited e-mails, legitimate e-mails take a much longer time to deliver to their destination. The attachments sent through spam may also contain viruses. However, spam can be stopped by implementing spam filters on servers and e-mail clients.
Question No: 89 DRAG DROP – (Topic 1)
Choose the communication technologies in descending order of their data transfer rates.
Following are the communication technologies in descending order of their data transfer rates.
USB 2.0 IEEE 802.11g 802.11b
USB 2.0 has a maximum data transfer rate of 480Mbps. IEEE 802.11g has a maximum data transfer rate of 54Mbps. IEEE 802.11b has a maximum data transfer rate of 11Mbps. Bluetooth has a maximum data transfer rate of 1Mbps.
UTP Category 5 and Category 6 are types of communication cables. Reference. TechNet, Contents. quot;Planning a Secure Wireless Servicequot;
Question No: 90 – (Topic 1)
Which of the following enables third-party developers to create capabilities to extend an application?
Answer: A Explanation:
Plug-in enables third-party developers to create capabilities to extend an application.
A plug-in is a computer program that is used with host applications such as Web browsers, e-mail clients, etc. It is created to provide certain specific functions. Plug-ins are separate
from a host application. However, they are dependent on the services provided by the host application and do not usually work by themselves.
Answer option C isincorrect. Hotfix is a collection of files used by Microsoft for software updates that are released between major service pack releases. A hotfix is about a problem, occurring under specific circumstances, which cannot wait to be fixed till the next service pack release. Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as soon as possible.
Answer option B is incorrect. A virtual machine (VM) is a software implementation of a computer (machine) that executesprograms like a real machine. Virtual machines are separated into two major categories, based on their use and degree of correspondence to any real machine. A system virtual machine provides a complete system platform which supports the execution of a complete operating system. In contrast, a process virtual machine is designed to run a single program, which means that it supports a single process. An essential characteristic of a virtual machine is that the software running inside is limited to the resources and abstractions provided by the virtual machine. Multiple virtual machines with different operating system can co-exist on the same computer.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|