|Exam Name||:||CompTIA Strata Fundamentals of PC Functionality 1|
|Questions and Answers||:||114 Q & A|
|Updated On||:||Click to Check Update|
|PDF Download Mirror||:||Pass4sure JK0-U11 Dump|
|Get Full Version||:||Pass4sure JK0-U11 Full Version|
|JK0-U11 killexams.com | JK0-U11 dumps | JK0-U11 exam dumps | JK0-U11 braindumps | JK0-U11 exam braindumps | JK0-U11 real questions | JK0-U11 practice test | JK0-U11 practice questions | JK0-U11 questions and answers | JK0-U11 dumps free | JK0-U11 dumps free pdf | JK0-U11 killexams|
The FireWire 400 port is now referred to as the IEEE 1394 port. The maximum speed of FireWire 400
is 400 Mbps. The standard FireWire 400 connector for ports found on Macintosh computers is a six-pin connector. Another popular FireWire 400 connector, found on devices such as camcorders and Windows computers, is the 4-pin connector. The image displayed in the question has 6-pin FireWire 400 port.
You want to add broadband wireless access to a laptop. What type of card will you use to accomplish this?
Network interface card
Aircards are used to provide wireless broadband access. They are often PCI Express type cards. Answer: B is incorrect. A NIC would help in accessing the local network,
but not broadband wireless. Answer: A is incorrect. MCA is a very outdated expansion
type for PC's. Answer: C is incorrect. PC's use PCI, laptops use PCI mini express.
Which of the following software displays advertisements, whether or not the user has consented?
Adware is software that displays advertisements, whether or not the user has consented. Adware is software that automatically downloads and display advertisements in the Web browser without user permission. When a user visits a site or downloads software, sometimes a hidden adware software is also downloaded to
display advertisement automatically. This can be quite irritating to user. Some adware can also be spyware. Answer: B is incorrect. Spyware is a program that takes partial control over a user's computer without user's permission. Spyware programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited. Spyware programs can also interfere with the control of a user's computer, such as installing additional software, redirecting Web browser activities, accessing Web sites blindly, etc. Answer: D is incorrect. A honeypot is a term in computer terminology used for a trap that is set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, and monitored, and which seems to contain information or a resource of value to attackers. Answer: A is incorrect. Trojan horse is a malicious software program code that masquerades itself as a normal program. When a Trojan horse program is run, its hidden code runs to destroy or scramble data on the hard disk. An example of a Trojan horse is a program that masquerades as a computer logon to retrieve user names and password information. The developer of a Trojan horse can use this information later to gain unauthorized access to computers. Trojan horses are normally spread by e- mail attachments. Unlike viruses, Trojan horses do not replicate themselves but only destroy information on hard disks.
Which of the following are a form of online advertising on the World Wide Web intended to attract Web traffic or capture email addresses?
Signed script policy:
other Web servers. Answer: B is incorrect. Signed script policy is a policy in which testing is required to check the identity of a user sending requests from a Web browser. In this policy, when a receiver receives a request from the user to access some resources of his computer, he can grant or deny the access on the basis of whether the request is coming from a trusted or a non-trusted source. If the receiver permits the request, the code will run on the browser after further checks. An author converts the code in the form of an encrypted text, which is recreated on the browser as a simple text. The code will not run on the browser if there is any modification in the text. Answer: A is incorrect. A Java applet is a software program written in Java language. It is distributed as an attachment in a Web document and executed in a Java- enabled Web browser. Java applets can run on almost any operating system without requiring recompilation.
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You install a sound driver on a computer running Windows XP Professional. After installation, you reboot the computer and logged in. You find that the speakers attached to the computer are not working anymore. You re- install the original driver, but it does not work. Which of the following steps will you take to resolve the issue?
Restart the computer with Last Known Good Configuration.
Use System Restore.
Use Disk Management on the computer.
Restore Windows XP Professional using an Automated System Recovery (ASR) backup.
The System Restore is a part of System Recovery Options in Windows. It is used to restore a computer to its previous state without losing any personal data files. System Restore automatically creates restore points while monitoring changes made to the computer and application files. These restore points are used to revert the system to its previous state. Restore points are created daily and at the time of major system events such as installation of an application or driver. Restore points can also be created and named manually at any time. Answer: A is incorrect. The Last Known Good Configuration feature provides a copy of the system state that was in effect the last time a user successfully logged on. This configuration is stored in the HKLM/System/Current/ControlSet registry key. Last Known Good Configuration is the quickest way to resolve issues caused by faulty drivers. This option will not resolve the issue as you have already restarted the computer and logged in. Answer: C is incorrect. Disk Management is a graphical tool used to analyze the situation of local volumes. It is used for managing disks and volumes. Answer: D is incorrect. Automated System Recovery (ASR) is an advanced option of Backup Tool. ASR is
used when other recovery methods fail. It restores the last system backup taken through the ASR backup utility. You will lose all configurations since the last ASR backup.
You work as a Network Administrator for Tech Perfect Inc. The company has a WPAN network. You have a Bluetooth enabled laptop. You are communicating with an employee who is working in another cabin. Which of the following transmission technologies does the Bluetooth enabled laptop use while establishing communication with the employee?
Frequency Hopping Spread Spectrum
Orthogonal frequency division multiplexing
Direct sequence spread spectrum
Bluetooth uses FHSS (Frequency Hopping Spread Spectrum) technology for communication. Bluetooth is a standard for very low powered and short-range radio connections. It is used to link personal access devices (PDA), mobile phones and laptops, and provides them with Internet access via hot spots. Bluetooth uses the 2.4
Ghz spectrum with a data rate of about 1 Mbps. As a radio technology, Bluetooth does
not require line of sight like an infrared connection requires. The maximum transmission range of Bluetooth is around 10 meters. High-powered Bluetooth would extend the range to 100 meters. Answer: D, C, and B are incorrect. Bluetooth does not use these three technologies for communication.
You are selecting memory for a new computer. You need to use DDR2 memory. However, the catalog from which you are ordering has incomplete information. Which of the following types of RAM does DDR2 come under?
The types of synchronous Data RAM are DDR, DDR2, and DDR3 RAM. Answer: B is incorrect. Dynamic Random Access Memory is not the same as DDR. Answer: A is incorrect. Rambus DRAM is actually an alternative to DDR and is more expensive. Answer: D is incorrect. SIMM is a legacy memory type.
Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware? Each correct answer represents a complete solution. Choose two.
Prevent users of the client computers from executing any programs.
Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.
Educate users of the client computers to avoid malware.
Educate users of the client computers about the problems arising due to malware.
Mark will do the following to protect the client computers from malware: Educate users of client computers about the problems arising due to malware. Educate users of
client computers to avoid malware. If an executable program is attached to an e-mail and the user is unsure about the source, then he should delete the e-mail immediately. Moreover, users should not download any applications or executable files from unknown sources, and should be careful when exchanging files with other users. Malware are malicious software programs that cause damage to a computer, server, or computer network. All software such as a virus, spyware, and Trojan, etc., are malware. Answer: A is incorrect. Preventing users from executing any programs will create problems, as they will not be able to do their work properly. This will affect users' performance and total productivity. Answer: B is incorrect. Assigning Read- Only permission to the users for accessing the hard disk drives will prevent them from writing or saving any files on the hard disk. This will also not be a good practice.
Which of the following is the bandwidth of an SCSI Ultra2 Wide I/O port?
The SCSI Ultra2 Wide I/O port has a bandwidth of 80 MBps. Small Computer System Interface (SCSI) is the second most popular drive interface in use today after the Integrated Drive Electronics (IDE) interface. SCSI is faster than IDE and supports more devices. SCSI devices, such as hard disk drives and CD-ROM drives, are better suited to a network environment in which many users access shared drives simultaneously. SCSI has three standards: SCSI-1, SCSI-2, and SCSI-3. Answer: C is incorrect. The IEEE 1394a S400 I/O port has a bandwidth of 50 MBps. Answer: D is incorrect. The SCSI Ultra3 I/O port has a bandwidth of 160 MBps. Answer: A is incorrect. The SCSI Ultra4 port has a bandwidth of 320 MBps.
Research IT certifications that are available, match your interest and will help you achieve your career goals. Use the CompTIA Career Pathway and the CompTIA Career Roadmap to learn about different IT career paths and IT salaries so you can decide which IT certification is best for you.
CompTIA IT certifications span from entry-level knowledge in computer hardware and computer software to advanced skills in IT security, cybersecurity, IT networking and cloud computing.
Browse CompTIA Certifications
Before you start training for your IT certification, make sure you understand the big picture of what’s on the exam. Download and study the exam objectives and practice test questions to see what’s covered and the type of questions that will be asked. While the same exact questions will not be on your exam, these practice test questions will give you a good idea of what to expect when you’re taking your certification exam, building your confidence and setting you up for success.
Be sure to check out online communities on Facebook, LinkedIn and Reddit to see what others are saying about CompTIA exams.
DOWNLOAD EXAM OBJECTIVES
DOWNLOAD PRACTICE TEST QUESTIONS
CompTIA offers a wealth of certification training and learning options that will prepare you for your CompTIA certification exam.
Choose from traditional study guides and books, online training, interactive labs, online exam prep and video training to create a learning experience that works for you. If you prefer an instructor-led certification training program to self-study training, you can find options for classroom training as well.
EXPLORE ALL IT CERTIFICATION TRAINING
When you’ve learned the skills and knowledge required by the certification, it’s time to take the exam. First, buy your exam voucher. Then, find a Pearson VUE testing center near you and register for your exam. Head over to CompTIA Testing to learn about your exam options, how to schedule your exam and what to expect before, during and after your exam.
SAVE 10% ON YOUR NEXT EXAM OR CERTMASTER
BUY AN EXAM VOUCHER
With your certification in hand, you’re joining a community of more than 2 million IT professionals who are CompTIA certified. You’ve earned a powerful, globally recognized IT certification that will help you advance your IT career.
Don’t forget to promote and share your achievement with CompTIA digital badges that you can showcase on social media profiles and digital resumes.
LEARN ABOUT DIGITAL BADGES