|Exam Name||:||CompTIA E2C Strata IT Technology|
|Questions and Answers||:||276 Q & A|
|Updated On||:||Click to Check Update|
|PDF Download Mirror||:||Pass4sure JK0-U31 Dump|
|Get Full Version||:||Pass4sure JK0-U31 Full Version|
|JK0-U31 killexams.com | JK0-U31 dumps | JK0-U31 exam dumps | JK0-U31 braindumps | JK0-U31 exam braindumps | JK0-U31 real questions | JK0-U31 practice test | JK0-U31 practice questions | JK0-U31 questions and answers | JK0-U31 dumps free | JK0-U31 dumps free pdf | JK0-U31 killexams|
instead of 2.5 volts used in DDR SDRAM. This results in less power consumption. DDR2 SDRAM transfers 64 bits of data twice every clock cycle. DDR2 SDRAM memory is not compatible with DDR SDRAM memory slots. Answer option B is incorrect. A smart card reader is an interface device, which is used to read information from or write information to a smart card. It does not use flash memory technology.
Which of the following statements about the DVI-D connector are true? Each correct answer represents a complete solution. Choose three.
It is used only for digital signal connections.
Its single link connector contains 18 pins.
It is used for both digital and analog signal connections.
Its dual link connector contains 24 pins.
The DVI-D is a type of DVI connector. This connector is used only for digital signal connections. DVI-D connectors come in dual and single links. The dual link connector contains 24 pins, whereas the single link connector comes with 18 pins. DVI stands for Digital Visual Interface. It is a standard for high speed, high resolution digital display invented by Digital Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital signals coming from DVI connections. However, some monitors come with both types of cables. DVI has three main categories of connectors. They are: DVI-A, DVI-D, and DVI-I. DVI-A is an analog-only connector, DVI-D is a digital-only connector, and DVI-I is an analog/digital connector. DVI-D and DVI-I connectors are of two types: single link and dual link. DVI supports UXGA and HDTV with a single set of links. Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links. Answer option C is incorrect. The DVI-I connector supports both digital and analog signal connections.
Mark purchases a new computer and installs the Windows 2000 Professional operating system on it. He wants to connect the computer to the Internet. Which of the following actions can he take to protect his computer from unauthorized access, adware, and malware? Each correct answer represents a complete solution. Choose two.
Configure a firewall on the computer.
Configure auditing on the computer.
Set hidden attributes on his important files.
Install all the service packs available for the operating system.
In order to protect his computer from unauthorized access, adware, and malware, Mark can take the following actions: Install all the service packs available for the operating system. Configure a firewall on the computer. What is Service Pack? A service pack is a collection of Fixes and Patches in a single product. A service pack can be used to handle a large number of viruses and bugs or to update an operating system with advanced and better capabilities. A service pack usually contains a number of file replacements. What is a firewall? A firewall is a tool to provide security to a network. It is used to protect an internal network or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Answer option C is incorrect. Setting hidden attributes on files cannot protect computers from unauthorized access, adware, and malware. Answer option B is incorrect. Configuring auditing will not protect computers from unauthorized access, adware, and malware. Auditing is used to track user accounts for file and object access, logon attempts, system shutdown, etc. This enhances the security of the network.
TechNet, Contents: " Chapter 2 - Malware Threats"
Which of the following slots on a motherboard are best for a video card? Each correct answer represents a complete solution. Choose two.
AGP and PCIe are the best slots for a video card. PCI Express (PCIe), also known as 3rd Generation I/O (3GIO), is a type of computer bus. It is a new I/O bus technology that has more bandwidth than PCI and AGP slots. It uses two low-voltage differential pairs, at 2.5Gb/s in each direction. It is designed to replace PCI and AGP expansion slots. The bus is available in several different bus widths: x1, x2, x4, x8, x12, x16, and
x32. PCIe is able to transfer data in both directions at a time. PCIe hardware will work on operating systems that support PCI. AGP is a high speed 32-bit bus designed for high performance graphics and video support. It allows a video card to have direct access to a computer's RAM, which enables fast video performance. AGP provides a bandwidth of up to 2,133 MB/second. Answer option D is incorrect. The Extended Industry Standard Architecture (EISA) is a 32-bit PC expansion bus designed as a superset of a 16-bit ISA bus. The EISA bus is designed to increase the speed and expand the data width of the legacy expansion bus while still supporting older ISA cards. EISA slots are obsolete now. Answer option B is incorrect. PCIe and AGP slots are better than PCI slot for a video card.
Which of the following do not support encrypted data transmissions?
The infrared devices do not encrypted data transmission. Infrared technology uses invisible infrared radiations to transmit signals to short distances. There are two types of communication possible: one in which the sender and the receiver are visible to each other and are situated in a straight line. This is known as line-of-sight mode; the other type of communication known as diffuse mode does not require the sender and receiver to be directly visible to each other. This technology is used in TV sets, cordless microphones, laptops, remote modems, printers, and other peripheral devices. Answer options D, A, and C are incorrect. The Bluetooth, Ethernet, and Wi-Fi devices supports encrypt data transmissions.
TechNet, Contents: "Wireless Networking"
Which of the following actions can a technician take to reduce the chances of static charges being built up? Each correct answer represents a complete solution. Choose three.
Wear silken clothes.
Do not wear wrist strap.
Remove carpets from computer rooms.
Wear cotton clothes.
E: Increase humidity level.
In order to reduce the chances of static charges being built up, users or technicians will have to take the following steps: Wear cotton clothes. This will reduce the chance of building up of static charges. Do not cover the computer room's floor with carpets. This stops neutralizing of static charges. Increase humidity level. Humidity helps dissipate static charges. What is ESD? ESD stands for Electrostatic discharge. The static electricity that we generate everyday creates ESD. If you walk across a carpet and touch someone, you experience a mild shock. Electrostatic discharge occurs when the electrostatic charge is transferred from one charged entity to another entity sensitive to that charge. To minimize Electrostatic discharge (ESD) problems, consider wearing a wrist strap when you are working with computer components. A wrist strap is a wire with a watchband-style strap at one end and a plug or clip on the other end. The wrist strap plug or clip is connected to the ground or to the piece of equipment being worked on. Answer option A is incorrect. A technician should not wear silken clothes during computer servicing, as silken clothes are more likely to generate static charges than cotton clothes. Answer option B is incorrect. Wearing wrist strap will keep a technician grounded. Hence, static charges cannot build up.
Which of the following are a form of online advertising on the World Wide Web intended to attract Web traffic or capture email addresses?
Signed script policy:
by other means as well. Answer option C is incorrect. A cookie is a small bit of text that accompanies requests and pages as they move between Web servers and browsers. It contains information that is read by a Web application, whenever a user visits a site. Cookies are stored in the memory or hard disk of client computers. A Web site stores information, such as user preferences and settings in a cookie. This information helps in providing customized services to users. There is absolutely no way a Web server can access any private information about a user or his computer through cookies, unless a user provides the information. A Web server cannot access cookies created by other Web servers. Answer option B is incorrect. Signed script policy is a policy in which testing is required to check the identity of a user sending requests from a Web browser. In this policy, when a receiver receives a request from the user to access some resources of his computer, he can grant or deny the access on the basis of whether the request is coming from a trusted or a non-trusted source. If the receiver permits the request, the code will run on the browser after further checks. An author converts the code in the form of an encrypted text, which is recreated on the browser as a simple text. The code will not run on the browser if there is any modification in the text. Answer option D is incorrect. A Java applet is a software program written in Java language. It is distributed as an attachment in a Web document and executed in a Java- enabled Web browser. Java applets can run on almost any operating system without requiring recompilation.
Which of the following is a fake target that deters hackers from locating your real network?
A honeypot is a term in computer terminology used for a trap that is set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, and monitored, and which seems to contain information or a resource of value to attackers. Answer option B is incorrect. KFSensor is a Windows-based honeypot Intrusion Detection System (IDS). It acts as a honeypot to attract and log potential hackers by simulating vulnerable system services and
Trojans. It has highly configurable features of detailed logging, analysis of attack, and
security alerts. When using the KFSensor, a user can create different types of scenarios, such as what action should be taken when access to a honeypot is attempted. KFSensor contains many innovative and unique features, such as remote management, a Snort compatible signature engine, and emulations of real servers (e.g. FTP, POP3, HTTP, Telnet and SMTP) to deceive the hacker and gain more valuable information about his
motives. Answer option C is incorrect. The term malware refers to malicious software, which is a broad class of malicious viruses, including spyware. Malware is designed to infiltrate or damage a computer without the consent of the owner. Answer option D is incorrect. Spyware is a program that takes partial control over a user's computer without user's permission. Spyware programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited. Spyware programs can also interfere with the control of a user's computer, such as installing additional software, redirecting Web browser activities, accessing Web sites blindly, etc.
Which of the following are removable storage devices/media? Each correct answer represents a complete solution. Choose three.
Hard disk drive
USB Pen drive
CD-ROM, SD card, USB Pen drive, floppy disk, etc., are removable storage media. CD-ROM (Compact Disc Read-Only Memory) is a type of removable storage optical media. It can store up to 1GB of data, although most common CD-ROMs store 700MB of data. It comes in a standard size and format, so users can load any type of CD-ROM into any CD drive or CD-ROM player. Once data is written to a CD-ROM, it cannot be erased or changed. SD card is a removable storage device. Secure Digital (SD) card is a non-volatile memory card format used in portable devices such as mobile phones, digital cameras, and handheld computers. SD cards are based on the older MultiMediaCard (MMC) format, but they are a little thicker than MMC cards. Generally an SD card offers a write-protect switch on its side. SD cards generally measure 32 mm x 24 mm x 2.1 mm, but they can be as thin as 1.4 mm. The devices that have SD card slots can use the thinner MMC cards, but the standard SD cards will not fit into the thinner MMC slots. Some SD cards are also available with a USB connector. SD card readers allow SD cards to be accessed via many connectivity ports such as USB, FireWire, and the common parallel port. USB Pen drive is a removable storage device. A pen drive is also known as a USB flash drive. It is a small device used to transfer data from one computer to another through USB ports. Pen drives are available in various capacities. When a pen drive is plugged into the USB port, Windows
Explorer shows it as a removable drive. Answer option C is incorrect. The hard disk
drive is not a removable storage media. It is installed inside the computer case. It can store large amounts of data and provides fast read/write performance. HDD can be connected to a computer with the Integrated Device Electronics (IDE), Small Computer System Interface (SCSI), and SATA interface. It consists of inflexible
platters coated with material in which data is recorded magnetically with read/write heads. Note: Only external hard disk drives are removable devices.
Which of the following statements about Hardware Compatibility List (HCL) are true? Each correct answer represents a part of the solution. Choose two.
It ensures that a computer and its components are compatible with the operating system before the operating system is installed.
It contains the listing of all the hardware that operating systems vendors have tested with their operating systems.
It ensures that a computer and its components are working properly.
It contains the license to use operating systems.
The Hardware Compatibility List (HCL) contains the listing of all the hardware that operating systems vendors have tested with their operating systems. Through HCL, an administrator can be sure that a computer and its components are compatible with the operating system before the operating system is installed. HCL helps administrators to verify that the CPU, RAM, storage devices, various interface cards, and other hardware components are supported by the operating systems.
Which of the following is the bandwidth of an SCSI Ultra2 Wide I/O port?
The SCSI Ultra2 Wide I/O port has a bandwidth of 80 MBps. Small Computer System Interface (SCSI) is the second most popular drive interface in use today after the Integrated Drive Electronics (IDE) interface. SCSI is faster than IDE and supports more devices. SCSI devices, such as hard disk drives and CD-ROM drives, are better suited to a network environment in which many users access shared drives
simultaneously. SCSI has three standards: SCSI-1, SCSI-2, and SCSI-3. Answer option A is incorrect. The IEEE 1394a S400 I/O port has a bandwidth of 50 MBps. Answer option B is incorrect. The SCSI Ultra3 I/O port has a bandwidth of 160 MBps. Answer option C is incorrect. The SCSI Ultra4 port has a bandwidth of 320 MBps.
How many pins are available on a PS/2 Mini-DIN connector?
A PS/2 Mini-DIN connector has 6-pins , while only four are used. Pin 1 is used for keyboard data signal, pin 3 is ground, pin 4 has +5 Volt DC, pin 5 is used for keyboard clock, and pins 2 and 6 are not used. The PS/2 6-pin Mini-DIN connector is used for both keyboard and mouse. Older keyboard connectors use 5-pin DIN connector.
Which of the following does the image denote?
You are selecting memory to put in to a laptop. Which of the following types of RAM chips would you most likely select?
Both MicroDIMM and SO-DIMM come in a 144 pin configuration, and are used for laptops. What is SO-DIMM? Small Outline Dual Inline Memory Module (SO-DIMM) is a type of memory module that comes in 72 pins and 144 pins. The 72-pin SO-DIMM supports 32-bit transfers, and the 144-pin SO-DIMM supports 64-bit transfers. It was introduced for laptops. SO-DIMMs come in smaller packages, consume lesser power, but are more expensive than DIMMs. Answer option B is incorrect. The 72-pin is a legacy chip used in PC's. Answer option D is incorrect. The 184-pin is used in DDR RAM in PC's. Answer option C is incorrect. The 240-pin is used in DDR2 and DDR3 RAM in PC's. What is DDR3 SDRAM? DDR3 SDRAM or double-data-rate three synchronous dynamic random access memory is a random access memory interface technology used for high bandwidth storage of the working data of a computer or other digital electronic devices. DDR3 is part of the SDRAM family of technologies and is one of the many DRAM implementations. DDR3 SDRAM is an improvement over its predecessor, DDR2 SDRAM, and the two are not compatible. The primary
benefit of DDR3 is the ability to transfer at twice the data rate of DDR2, thus enabling
higher bus rates and higher peak rates than earlier memory technologies. DDR3 memory power consumption is 30% less as compared to DDR2 modules.
Which of the following is the lightest but most expensive battery used in laptops?
Li-Ion or Lithium Ion battery is the lightest but most expensive battery used in laptops. Li-Ion battery has a longer life as compared to NiCad and NiMH batteries. Answer option B is incorrect. Nickel-Cadmium (NiCad) batteries are no longer used in laptops. NiCad batteries are heavy and have shorter life as compared to NiMH batteries. Answer option D is incorrect. There is no battery such as Sodium-Ion. Answer option A is incorrect. A Nickel-Metal Hydride (NiMH) battery has 30 percent more life than a NiCad battery. NiMH is more expensive and takes more time to recharge as compared to NiCad. Some laptops still use NiMH batteries.
Your customer complains that some of his older Windows XP programs, particularly some games, won't work in Windows Vist a. What should you recommend?
That he buy Vista versions of those programs.
That he dual boot XP and Vista in order to handle old and new programs.
That he use the Windows Vista Compatibility Mode.
Unfortunately he won't be able to use those programs.
The Windows Vista Compatibility mode was created for just this sort of issue. The application compatibility mode is a feature of Windows Vista. The compatibility mode allows application installed on Windows Vista computer to run in an environment that emulates a previous version of Windows. Windows Vista's application compatibility mode can emulate the following environments :
Windows NT 4.0 (SP5) Windows 2000 Windows XP (SP2) Windows Server 2003 (SP1) Note: Windows Vista compatibility mode works only for programs that are not part of Windows Vista. Answer option B is incorrect. Dual booting is more complex and in this case unnecessary. Answer option A is incorrect. Eventually he may wish to buy Vista versions, but he can run the XP versions now with the Windows Vista Compatibility mode. Answer option D is incorrect. He can use the old XP programs.
Research IT certifications that are available, match your interest and will help you achieve your career goals. Use the CompTIA Career Pathway and the CompTIA Career Roadmap to learn about different IT career paths and IT salaries so you can decide which IT certification is best for you.
CompTIA IT certifications span from entry-level knowledge in computer hardware and computer software to advanced skills in IT security, cybersecurity, IT networking and cloud computing.
Browse CompTIA Certifications
Before you start training for your IT certification, make sure you understand the big picture of what’s on the exam. Download and study the exam objectives and practice test questions to see what’s covered and the type of questions that will be asked. While the same exact questions will not be on your exam, these practice test questions will give you a good idea of what to expect when you’re taking your certification exam, building your confidence and setting you up for success.
Be sure to check out online communities on Facebook, LinkedIn and Reddit to see what others are saying about CompTIA exams.
DOWNLOAD EXAM OBJECTIVES
DOWNLOAD PRACTICE TEST QUESTIONS
CompTIA offers a wealth of certification training and learning options that will prepare you for your CompTIA certification exam.
Choose from traditional study guides and books, online training, interactive labs, online exam prep and video training to create a learning experience that works for you. If you prefer an instructor-led certification training program to self-study training, you can find options for classroom training as well.
EXPLORE ALL IT CERTIFICATION TRAINING
When you’ve learned the skills and knowledge required by the certification, it’s time to take the exam. First, buy your exam voucher. Then, find a Pearson VUE testing center near you and register for your exam. Head over to CompTIA Testing to learn about your exam options, how to schedule your exam and what to expect before, during and after your exam.
SAVE 10% ON YOUR NEXT EXAM OR CERTMASTER
BUY AN EXAM VOUCHER
With your certification in hand, you’re joining a community of more than 2 million IT professionals who are CompTIA certified. You’ve earned a powerful, globally recognized IT certification that will help you advance your IT career.
Don’t forget to promote and share your achievement with CompTIA digital badges that you can showcase on social media profiles and digital resumes.
LEARN ABOUT DIGITAL BADGES