[Free] 2018(Aug) Dumps4cert CompTIA FC0-U41 Dumps with VCE and PDF Download 151-160

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released FC0-U41
100% Free Download! 100% Pass Guaranteed!

CompTIA Strata IT Fundamentals

Question No: 151 – (Topic 2)

Mark works as a Network Administrator for Net Tech Inc. The company has a Windows 2000 domain-based network. A user working on a Windows 2000 Professional client computer reportsthat he is unable to access some files on the hard disk. However, he is able to successfully log on and access other files. What should Mark do to resolve the issue?

  1. Check the hard disk drive using the SCANDISK utility.

  2. Enable the user account on the computer.

  3. Instruct the user to log off and log on again.

  4. Check the file permissions on the hard disk drive.

Answer: D Explanation:

In order to resolve the issue, Mark should check the file permissions for the user on the hard disk drive. Accordingto the question, the user is able to access other files on the hard disk. Hence, the most likely cause of the issue is that the user does not have sufficient privileges on those files.

Answer option C is incorrect. Logging off and then logging on will nothelp resolve the issue. Answer option A is incorrect. Checking the hard disk drive using the SCANDISK utility will not help, as the issue is related to permissions.

Answer option B is incorrect. According to the question, the user is able to successfullylog on to the computer. This indicates that his user account is already enabled. Hence, there is no need to enable it.

Reference: TechNet, Contents: quot;Security and Administrationquot;

Question No: 152 – (Topic 2)

You have a problem in your company. People often use laptops and will forget they have them turned on and let the battery run down. You want to have them go to a low power mode if they are left inactive. Power savings is the most important issue, but saving programs and files is also important. It is not important whether or not they return to active state very quickly. Which low power state should you use?

  1. Standby mode

  2. Sleep mode

  3. Shutdown

  4. Hibernate mode

Answer: D Explanation:

You should use Hibernate mode. Hibernate mode is a low power state, which saves all data and open programs to the hard disk and the laptop shuts down. Since it shuts down that saves power, however, it takes significantly more timeto return to an active state.

What is hibernate mode? Hide

Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a computer is saved to the hard disk, and the computer shuts down. A user will have to power on the computer to restore the previous settings.

When a computer resumes from hibernate mode, it reads the saved settings from the disk and restores the system state as it was before it entered hibernate mode. By default, hibernate mode is disabled. If a computeris not ACPI-enabled or

APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer to automatically hibernate after a certain time. With ACPI-enabled and APM- enabled computers, users are able to set hibernate mode automatically.

Answer option C is incorrect. Simply shutting down won#39;t save any files or settings. And that may cause serious problems.

Answer options B and A are incorrect. These are low power modes that do not completely shut down. This means that power is still going and thus it is not saving power as much as hibernate.

What is sleep mode? Hide

Sleep mode is the state of a computer where it requires a small amount of power needed to keep available data in active memory. When a user presses a key on thekeyboard, the computer awakes from sleep mode. The memory data is also written to a file and saved in the hard disk. If the computer is not awakened after fifteen minutes, the operating system

puts the computer in hibernate mode, cuts the power, and discards the data in RAM. What is standby mode? Hide

The standby mode is a power saving feature for computers. In this mode, a computer does not shut down completely. The computer goes to low power state and, as a result, it consumes less power. When the computer resumes from the standby mode, full power is restored to its devices. During the standby mode, if the power supply is disconnected or interrupted, data might be lost. The standby mode is available automatically on ACPI- enabled or APM-enabled computers. Users do not need to enable this mode manually.

This mode is not available in non-ACPI and non-APM based computers. Reference:

http://www.timeatlas.com/mos/Term_to_Learn/General/Understanding_Differences_Betwe en_Hib


Question No: 153 HOTSPOT – (Topic 2)

Identify the Ethernet port in the image given below.

Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE

Ethernet is a standard for local area networks (LANs), initially developed by Xerox. An Ethernet port is used to connect a computer to the local area network. In Ethernet standard networks, computers communicate using the CSMA/CD mechanism.

Dumps4Cert 2018 PDF and VCE

Question No: 154 – (Topic 2)

Which of the following protocols has recently been succeeded by Transport Layer Security (TLS) protocol?

  1. SNMP

  2. IPX/SPX

  3. HTTP

  4. SSL

Answer: D Explanation:

The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet#39;s Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP)

layers. SSL is included as part of both the Microsoft and Netscape browsers and most Web server products. URLs that require an SSL connection start with https: instead of http:.

Transport Layer Security (TLS) is a cryptographic protocol that provides security and data integrity for communications over networks such asthe Internet.

Answer option B is incorrect. Internet Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is a protocol used by Novell NetWare clients to connect to NetWare server. IPX/SPX is a routable protocol. It is supported by Microsoft operating systems. IPX/SPX can be used for both large and small networks. The Internet does not use this protocol. Answer option A is incorrect. Simple Network Management Protocol (SNMP) is a part of the TCP/IP protocol suite, which allows users to manage the network. SNMP is used to keep track of what is being used on the network and how the object is behaving.

Answer option C is incorrect. Hypertext Transfer Protocol (HTTP) is a client/server TCP/IP protocol used on the World Wide Web (WWW) to display Hypertext MarkupLanguage (HTML) pages. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when a client application or browser sends a request to the server using HTTP commands, the server responds with a message containing the protocol version, success or failure code, server information, and body content, depending on the request. HTTP uses TCP port 80 as the default port.

Reference: quot;http://www.webopedia.com/TERM/S/SSL.htmlquot;

Question No: 155 – (Topic 2)

Which of the following devices has an acoustic sensor that provides input by converting sound into electrical signals?

  1. Microphone

  2. Trackball

  3. Webcam

  4. Sound card

Answer: A Explanation:

Microphone has an acoustic sensor that provides input by converting sound into electrical signals.

Answer option C is incorrect. Webcam is a low resolution video camera used to provide visual input that can be easily transferred over the internet.

Answer option B is incorrect. Trackball is a pointing device consisting of an exposed protruding ball housed in a socket that detects rotation about two axes.

Answer option D is incorrect. A sound card is a computer expansion card that facilitates the input and output of audio signals to and from a computerunder control of computer programs.

Reference: quot;http://en.wikipedia.org/wiki/Computer_hardwarequot;

Question No: 156 – (Topic 2)

You are selecting memory for a new computer. You need to useDDR2 memory. However, the catalog from which you are ordering has incomplete information. Which of the following types of

RAM does DDR2 come under?

  1. DRAM

  2. RDRAM

  3. SDRAM

  4. SIMM

Answer: C Explanation:

The types of synchronous Data RAM are DDR, DDR2,and DDR3 RAM.

Answer option A is incorrect. Dynamic Random Access Memory is not the same as DDR. Answer option B is incorrect. Rambus DRAM is actually an alternative to DDR and is more expensive.

Answer option D is incorrect. SIMM is a legacy memory type. Reference: http://www.answers.com/topic/sdram-2

Question No: 157 – (Topic 2)

Which of the following program is used to collect personal information stored in the computer and send it to a third party without the permission of the user?

  1. Grayware

  2. Spyware

  3. Adware

  4. Firewall

Answer: B Explanation:

Spyware is used to collect personalinformation stored in the computer and send it to a third party without the permission of the user. Spyware is a program that takes partial control over a user#39;s computer without user#39;s permission. Spyware programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited. Spyware programs can also interfere with the control of a user#39;s computer, such as installing additional software, redirecting Web browser activities, accessing

Web sites blindly, etc.

Answer option C is incorrect. Adware is software that automatically downloads and display advertisements in the Web browser without user permission. When a user visits a site or downloads software, sometimes hidden adware software is also downloaded to display advertisement automatically. This can be quite irritating to user. Some adware can also be spyware.

Answer option A is incorrect. Grayware refers to applications or files that are not classified as viruses or trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization.

Often grayware performs a variety of undesired actions such as irritating users with pop-up windows, tracking user habits and unnecessarily exposing computer vulnerabilities to attack.

Answer option D is incorrect. A firewall is a program or hardware device that prevents data packets from coming in or going out to a specified network or computer. It is used to separate aninternal network from the Internet. A firewall restricts inbound and outbound access, and can analyze all the traffic between a network and the Internet. It checks the protocol through which the packet is being delivered, and the port number to which it is being sent.

Reference: quot;http://en.wikipedia.org/wiki/Spywarequot;

Question No: 158 – (Topic 2)

Which of the following indicates the subjects that can use them?

  1. Access control list

  2. Audit policy

  3. Intrusion detection system

  4. Single sign-on

Answer: A Explanation:

Access control listindicates what subjects can use them.

Access Control List (ACL) is the most commonly used object in Cisco IOS. It filters packets

or network traffic by controlling whether routed packets are forwarded or blocked at the router#39;s interfaces.

According to thecriteria specified within the access lists, router determines whether the packets to be forwarded or dropped. Access control list criteria could be the source or destination address of the traffic or other information. The types of Cisco ACLs are StandardIP, Extended IP, IPX, Appletalk, etc.

Answer option B is incorrect. Audit policy defines the type of security events that will be logged for the servers of a domain or for an individual computer. It does not indicate what subjects can use them.

Answer option C is incorrect. An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks, as examples, by crackers, malware and/or disgruntled employees. An IDS cannot directly detect attacks within properly encrypted traffic. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).

Answer option D is incorrect. Single sign-on is a process that enables a user with a domain account to log on to a network once, using a password or smart card, and to gain access to multiple computers in the domain without being prompted to log in again.

Reference: quot;http://en.wikipedia.org/wiki/Access_control_listquot;

Question No: 159 – (Topic 2)

Which of the following encryption algorithm is used by Wired Equivalent Privacy (WEP)?

  1. RC4

  2. RSA

  3. IDEA

  4. SHA

    Answer: A Explanation:

    The RC4 encryption algorithm is used by Wired Equivalent Privacy (WEP).

    Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has twocomponents, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless

    network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.

    Answer option D is incorrect. The Secure Hash Algorithm (SHA) is a cryptographic hash algorithm. It generates a fixed-length digital representation (message digest) of an input data sequence ofany length. The SHA algorithm is very secure, as it is computationally very difficult to find a message that corresponds to a given message digest. In this algorithm, any change to a message will result in a completely different message digest. There arefive SHA algorithms: SHA-1, SHA-224, SHA-256, SHA- 384, and SHA-512.

    Answer option B is incorrect. The RSA algorithm is an example of the public key algorithm in which the public key is generated from the private key. In the RSA algorithm, public and private keys are generated as follows:

    1. Choose two large prime numbers p and q of equal lengths, and compute n=p*q.

    2. Choose a random public key e such that e and (p-1)*(q-1) are relatively prime.

    3. Calculate e*d=1*mod[(p-1)*(q-1)]. Here, d is a private key. 4. Calculate d=e^(-1)*mod[(p-1)*(q-1)].

  1. Now (e,n) and (d,n) are the public and private keys respectively.

    Answer option C is incorrect. International Data Encryption Algorithm (IDEA) is a block cipher. IDEA operates on 64-bit blocks using a 128-bit key. This algorithm was intended as a replacement for the Data Encryption Standard. IDEA was used in Pretty Good Privacy (PGP) v2.0, and was incorporated after the original cipher used in v1.0 was found to be insecure. It is an optional algorithm in

    OpenPGP.The cipher is patented in a number of countries but is freely available for non- commercial use. IDEA is a minor revision of an earlier cipher, PES (Proposed Encryption Standard). It was originally known as IPES (Improved PES).


    Question No: 160 HOTSPOT – (Topic 2)

    Identify the serial port on an Apple Macintosh computer.

    Dumps4Cert 2018 PDF and VCE


    Dumps4Cert 2018 PDF and VCE


    Dumps4Cert 2018 PDF and VCE

    The serial port of a Macintosh is 8-pin Mini DIN port which is used to connect modem or printer.

    Dumps4Cert 2018 PDF and VCE

    100% Dumps4cert Free Download!
    FC0-U41 PDF
    100% Dumps4cert Pass Guaranteed!
    FC0-U41 Dumps

    Dumps4cert ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com