[Free] 2017(Nov) Dumps4cert Testinsides CompTIA FC0-U41 Dumps with VCE and PDF Download 81-90

Dumps4cert 2017 Nov CompTIA Official New Released FC0-U41
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/FC0-U41.html

CompTIA Strata IT Fundamentals

Question No: 81 – (Topic 1)

Which of the following statements about theDVI-I connector are true? Each correct answer represents a complete solution. Choose two.

  1. It contains 4 more pins than the DVI-D connector.

  2. It is used only for digital signal connection.

  3. It is used for both digital and analog signal connections.

  4. It contains 15 more pins than the DVI-D connector.

Answer: A,C Explanation:

The DVI-I is a type of DVI connector. This connector is used for both digital and analog signal connections. DVI-I connectors come in dual and single links. To carry analogsignal, it contains 4 more pins than the DVI-D connector.

What is DVI?

DVI stands for Digital Visual Interface. It is a standard for high speed, high resolution digital display invented by Digital Display Working Group (DDWG). DVI accommodates analog anddigital interfaces with a single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital signals coming from DVI connections. However, some monitors come with both types of cables. DVI has three main categories of connectors. They are. DVI-A, DVI-D, and DVI-I. DVI-A is an analog-only connector,

DVI-D is a digital-only connector, and DVI-I is an analog/digital connector. DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and HDTV with a single set of links. Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links.

Answer option B is incorrect. The DVI-D connector is used only for digital signal connection.

Reference. quot;http.//en.wikipedia.org/wiki/DVIquot;

Question No: 82 – (Topic 1)

What does Wireless Transport Layer Security (WTLS) provide for wireless devices? Each correct Answer represents a complete solution. Choose all that apply.

  1. Data integrity

  2. Encryption

  3. Bandwidth

  4. Authentication

Answer: A,B,D Explanation:

Wireless Transport Layer Security (WTLS) is a security layer of WAP, which isspecifically designed for a wireless environment. It provides privacy, data integrity, and authentication for client-server communications over a wireless network. WTLS ensures that a client and server are authenticated so that wireless transactions remainsecure and the connection is encrypted. WTLS is required because a wireless network does not provide end-to-end security.

What is authentication? Authentication is a process of verifying the identity of a person, network host, or system process.

The authentication process compares the provided credentials with the credentials stored in the database of an authentication server. Answer option C is incorrect. WTLS cannot provide bandwidth to wireless devices.

Reference:http://en.wikipedia.org/wiki/Wireless_Transport_Layer_Security

Question No: 83 HOTSPOT – (Topic 1)

Identify the DVI-D single link male connector in the image given below.

Dumps4Cert 2017 PDF and VCE

Answer:

Dumps4Cert 2017 PDF and VCE

Explanation:

Dumps4Cert 2017 PDF and VCE

The DVI-D is a type of DVI connector. A DVI-D connector is used only for digital signals. DVI-D connectors come both in dual and single links. The single link connector contains 18 pins, whereas the dual link connector comes with 24 pins.

Dumps4Cert 2017 PDF and VCE

Question No: 84 HOTSPOT – (Topic 1)

Identify the area showing the DIMM slots in the image of the motherboard.

Dumps4Cert 2017 PDF and VCE

Answer:

Dumps4Cert 2017 PDF and VCE

Explanation:

Dumps4Cert 2017 PDF and VCE

Dual In-line Memory Module (DIMM) is a type of memory module that comes with 168 and 184 pins.

A DIMM slot is larger than a SIMM slot. DIMM with 168 pins has two notches on its base. 184-pin DIMMs are for DDR SDRAMmodules which are available in Pentium III and Pentium 4 and Athlon systems. 184-pin DIMMs are available in PC2100, PC2700, PC3200 and PC3500 and faster. The number of chips on a 184-pin DIMM may vary, but they have 92 pins on both side of DIMM for a totalof 184. 184-pin DIMMs are 5.375quot; long and 1.375quot; high, and the heights may vary. DIMMs have

a small notch on the bottom of the module. DIMM mounts onto its slots differently than SIMM.

What is SIMM?

Single Inline Memory Module (SIMM) is a type of memory module that comes in two types, 30-pin and 72-pin. A 72-pin SIMM can be easily identified by a single notch on its base. A 30-pin SIMM does not have a notch on its base.

Question No: 85 – (Topic 1)

Which of the following protocols transmits error messages and network statistics?

  1. ICMP

  2. DHCP

  3. TCP

  4. NNTP

Answer: A Explanation:

ICMP transmits error messages and network statistics.

Internet Control Message Protocol (ICMP) is an integral part of IP. It is used to report an error in datagram processing. The Internet Protocol (IP) is used for host-to-host datagram service in a network. The network is configured with connecting devices called gateways. When an error occurs in datagram processing, gateways or destination hosts report theerror to the source hosts through the ICMP protocol. The ICMP messages are sent in various situations, such as when a datagram cannot reach its destination, when the gateway cannot direct the host to send traffic on a shorter route, when the gateway does not have the buffering capacity, etc. Answer option C is incorrect.

Transmission Control Protocol (TCP) is a reliable, connection-oriented protocol operating at the transport layer of the OSI model. It provides a reliable packet delivery serviceencapsulated within the Internet

Protocol (IP). TCP guarantees the delivery of packets, ensures proper sequencing of data, and provides a checksum feature that validates both the packet header and its data for accuracy. If the network corrupts or loses a TCP packet during transmission, TCP is responsible for retransmitting the faulty packet. It can transmit large amounts of data.

Application-layer protocols, such as HTTP and

FTP, utilize the services of TCP to transfer files between clients and servers.

Answer option D is incorrect. NNTP stands for Network News Transfer Protocol (NNTP). It is a simple

ASCII text-based protocol used to post, distribute, and retrieve network news messages from NNTP servers and NNTP clients on the Internet. Answer option B is incorrect.

Dynamic Host Configuration

Protocol (DHCP) is a TCP/IP standard used to dynamically assign IP addresses to computers, so that they can communicate with other network services. It reduces the complexity of managing network client IP address configuration. A DHCP server configures DHCP-enabled client computers on the network. It runs on servers only. It also provides integration with the Active Directory directory service.

Reference:http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol

Question No: 86 – (Topic 1)

In which of the following conditions does BIOS need to be updated? Each correct answer represents a complete solution. Choose two.

  1. If users have to use new hardware features or options that are supported by motherboard, but not supported by the computer BIOS.

  2. If the operating system installed on the computer has bugs.

  3. If the BIOS does not support new devices.

  4. If the software application installed on the computer stops respondingfrequently.

Answer: A,C Explanation:

The BIOS on a computer should be updated in the following conditions. If the BIOS does not support new devices.

If users need to use new hardware features or options that are supported by motherboard, but not supportedby the computer BIOS.

The BIOS can also be updated if a user has a device problem, and it is confirmed that the problem is due to BIOS.

What is BIOS?

Basic Input/ Output System (BIOS) are software that manages hardware and enables the operating system tocommunicate with the computer#39;s hardware components. The BIOS software is built-in on

a ROM chip, known as Complementary Metal Oxide Semiconductor (CMOS) chip, on the motherboard.

Answer option D is incorrect. In this case, a user needs to contact the helpdesk of the software application provider to fix the issue.

Answer option B is incorrect. In case of operating system#39;s bug, users need to install patches and service packs provided by the operating system vendor.

Question No: 87 – (Topic 1)

You are installing two hard disk drives on a computer. Which of the following possible combinations can be used? Each correct answer represents a complete solution. Choose all that apply.

  1. Install the second hard disk drive on the primary IDE controller. Designate one drive as Master and the other as Slave.

  2. Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on primary IDE controller. Designate both drives as Master.

  3. Install the second hard disk drive on the secondary IDE controller ensuring that the first hard disk drive is on the primary controller. Designate the second hard disk drive as Slave.

  4. Install both the hard disk driveson the primary IDE controller. Designate both drives as

    Secondary.

    Answer: A,B Explanation:

    While installing two hard disk drives on a computer, any one of the following two combinations can be used.

    1. Install the drives, one each on the primary and secondary IDE controllers and designate both as Master.

    2. Install both drives on the primary IDE controller and designate one as Master and the other as

      Slave.

      What are the jumper settings on IDE/EIDE drives?

      Each IDE/EIDE drive must support the Master, Slave, and Cable Select types of jumper settings. The

      Master/Slave setting is accomplished by jumpering a set of pins on the hard disk/CD-ROM drive.

      If two drives are attached to one controller, one drive should be set as Master and the other as

      Slave. If bothdrives using the same controller are set as Master, or Slave, none of them will work.

      Answer option D is incorrect. There is no setting such as Secondary.

      Question No: 88 – (Topic 1)

      Which of the following refers to the data rate supported by a network connection or interface?

      1. Bandwidth

      2. Preboot Execution Environment (PXE)

      3. Branding

      4. Spam

Answer: A Explanation:

Bandwidth is a term that refers to the data rate supported by a network connection or interface.

Bandwidth (or digital bandwidth) is a measurement of how much data can be sent in a period of time. It is a data rate measured in bits. The standardunit of digital bandwidth is bits per second (bps). In radio communication, bandwidth (analogue bandwidth) is the range of frequencies occupied by the radio signals. The standard unit of analogue

bandwidth is Hertz (Hz).

Answer option C is incorrect. In Web site designing, branding refers to the look and feel of a Web site. Branding helps in differentiating a site from its competitors and also helps the customer to develop a relationship with the Web site. The look and feel of a Web site comes through logo, fonts, color schemes, and symbols used in the Web site. The overall look of the Web site should be consistent.

Answer option B is incorrect. Preboot Execution Environment (PXE) is an environment to boot computers using a network interface independentlyof available data storage devices like hard disks or installed operating systems. PXE is also known as Pre-Execution Environment.

Answer option D is incorrect. Spam is a term that refers to the unsolicited e-mails sent to a large number of e-mail users. The number of such e-mails is increasing day by day, as most companies now prefer to use e-mails for promoting their products. Because of these unsolicited e-mails, legitimate e-mails take a much longer time to deliver to their destination. The attachments sent through spam may also contain viruses. However, spam can be stopped by implementing spam filters on servers and e-mail clients.

Reference: quot;http://en.wikipedia.org/wiki/Bandwidth_(computing)quot;

Question No: 89 DRAG DROP – (Topic 1)

Choose the communication technologies in descending order of their data transfer rates.

Dumps4Cert 2017 PDF and VCE

Answer:

Dumps4Cert 2017 PDF and VCE

Explanation:

Following are the communication technologies in descending order of their data transfer rates.

USB 2.0 IEEE 802.11g 802.11b

Bluetooth

USB 2.0 has a maximum data transfer rate of 480Mbps. IEEE 802.11g has a maximum data transfer rate of 54Mbps. IEEE 802.11b has a maximum data transfer rate of 11Mbps. Bluetooth has a maximum data transfer rate of 1Mbps.

UTP Category 5 and Category 6 are types of communication cables. Reference. TechNet, Contents. quot;Planning a Secure Wireless Servicequot;

Question No: 90 – (Topic 1)

Which of the following enables third-party developers to create capabilities to extend an application?

  1. Plug-in

  2. Virtual machine

  3. Hotfix

  4. JavaScript

Answer: A Explanation:

Plug-in enables third-party developers to create capabilities to extend an application.

A plug-in is a computer program that is used with host applications such as Web browsers, e-mail clients, etc. It is created to provide certain specific functions. Plug-ins are separate

from a host application. However, they are dependent on the services provided by the host application and do not usually work by themselves.

Answer option D is incorrect. JavaScript is a simple, light weight, and dynamic World Wide Web

(WWW) scripting language developed by Netscape Communications. The syntax of JavaScript resembles that of C . JavaScript facilitates integration of HTML documents, Web components, and multimedia plug-ins. It also aids in the development of server-side Web applications.

Answer option C isincorrect. Hotfix is a collection of files used by Microsoft for software updates that are released between major service pack releases. A hotfix is about a problem, occurring under specific circumstances, which cannot wait to be fixed till the next service pack release. Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as soon as possible.

Answer option B is incorrect. A virtual machine (VM) is a software implementation of a computer (machine) that executesprograms like a real machine. Virtual machines are separated into two major categories, based on their use and degree of correspondence to any real machine. A system virtual machine provides a complete system platform which supports the execution of a complete operating system. In contrast, a process virtual machine is designed to run a single program, which means that it supports a single process. An essential characteristic of a virtual machine is that the software running inside is limited to the resources and abstractions provided by the virtual machine. Multiple virtual machines with different operating system can co-exist on the same computer.

100% Free Download!
Download Free Demo:FC0-U41 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert FC0-U41 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *