CompTIA Strata Practice Exam 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Delano Vasquez
Delano Vasquez, Educator & Trainer
Denalo is an accomplished educator with over 20 years of teaching and training in technology. As an entrepreneur for 25+ years, he's excelled in technology, real estate, and sales. Additionally, Denalo serves as a Real Estate Broker, specializing in various real estate transactions and investments.
Quizzes Created: 1 | Total Attempts: 177
| Attempts: 177 | Questions: 89
Please wait...
Question 1 / 89
0 %
0/100
Score 0/100
1. Which of the following refers to the data rate supported by a network conncection or interface?

Explanation

Bandwidth refers to the data rate supported by a network connection or interface. It represents the amount of data that can be transmitted over a network in a given period of time. A higher bandwidth indicates a faster data transfer rate, allowing for quicker and more efficient communication between devices on the network.

Submit
Please wait...
About This Quiz
IT Fundamentals Quizzes & Trivia

This Comptia Strata Practice Exam 1 assesses knowledge in installing hard drives, understanding video technology, identifying power-hungry sleep modes, using XCOPY command switches, and the use of smart... see morecards. It is essential for learners aiming to certify in IT fundamentals. see less

2. Which of the following devices provides input by analyzing printed text, handwriting, or an abject?

Explanation

An image scanner is a device that provides input by analyzing printed text, handwriting, or an object. It uses optical character recognition (OCR) technology to convert physical documents into digital images, allowing the text or images to be edited, stored, or transmitted electronically. This makes it a useful tool for tasks such as document scanning, data entry, and image editing. Unlike a webcam, which captures live video, or other devices listed, an image scanner specifically focuses on analyzing printed text, handwriting, or objects.

Submit
3. Which of the following types of attacks is often performed by looking surreptitusly at the keyboard or monitor of an employees computer?

Explanation

A shoulder surfing attack is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer. This type of attack involves an unauthorized person trying to gain access to sensitive information by visually observing the victim's actions, such as passwords or confidential data, without their knowledge or consent. It is a form of social engineering that relies on exploiting human vulnerabilities and lack of awareness regarding privacy and security.

Submit
4. Which of the following software displays advertisements, whether or not the user has consented?

Explanation

Adware is a type of software that displays advertisements without the user's consent. It is often bundled with other software and installed without the user's knowledge. Adware generates revenue for its developers by displaying ads and collecting user data. Unlike other options listed, such as Trojan horse, Honeypot, and Spyware, which have different functionalities, Adware specifically focuses on displaying advertisements.

Submit
5. Which of the following ports on a computer are used to connect a keyboard? Choose two

Explanation

USB and PS/2 ports are used to connect a keyboard to a computer. USB (Universal Serial Bus) is a widely used port that allows for easy plug-and-play connectivity. It is the most common port for connecting peripherals, including keyboards. PS/2 (Personal System/2) is an older port specifically designed for connecting keyboards and mice. While it is less commonly used nowadays, some keyboards still utilize PS/2 connections. DB-25 and DB-9 ports are not typically used for connecting keyboards, but rather for other purposes such as serial or parallel communication.

Submit
6. Which of the following is the most common laptop battery found today?

Explanation

Lithium-ion batteries are the most common laptop batteries found today due to their numerous advantages. They have a high energy density, allowing them to store more power in a smaller size. They also have a low self-discharge rate, meaning they can hold their charge for longer periods of time. Additionally, lithium-ion batteries have a longer lifespan compared to other types of batteries and can be recharged multiple times. These factors make them the preferred choice for laptop manufacturers and users alike.

Submit
7. Which of the following devices contains no moving parts and stores data in a digital format?

Explanation

A solid state drive contains no moving parts and stores data in a digital format. Unlike other devices listed, such as cartridge tape drives, floppy disk drives, and hard disk drives, which all have mechanical components that physically move to read and write data, a solid state drive uses flash memory to store data electronically. This makes the solid state drive faster, more durable, and more reliable than traditional storage devices.

Submit
8. Which of the following stores user preferences related to a Web site?

Explanation

A cookie is a small piece of data that is stored on a user's computer by a website. It is used to store information about the user's preferences and interactions with the website. This allows the website to remember the user's preferences, such as language preference, login information, and personalized settings. Therefore, a cookie is the correct answer as it is specifically designed to store user preferences related to a website.

Submit
9. You have a wireless printer that is connected to your Windows XP laptop via infrared, and it prints proplerly. However, when you relocate the wireless infrared printer, you find that your laptop is not able to send print jobs to the printer. What is the most likely cause of the issue?

Explanation

The most likely cause of the issue is that the printer is located at a distance of more than three feet from the laptop. Infrared connections have a limited range, typically around three feet, so if the printer is moved further away, the laptop will not be able to send print jobs to the printer.

Submit
10. Which of the following types of parental controls is used to limit access to the internet contents?

Explanation

Content filter control is a type of parental control that is used to limit access to internet contents. It allows parents to block or filter specific websites, keywords, or types of content that they deem inappropriate or unsafe for their children. By using content filter control, parents can ensure that their children are only accessing age-appropriate and safe online content, protecting them from potentially harmful or inappropriate material.

Submit
11. Which of the following features are related to power management? Choose two

Explanation

Hibernate mode and Standby mode are both related to power management. Hibernate mode allows the computer to save the current state and power off completely, while Standby mode allows the computer to enter a low-power state but still be quickly resumed. Both modes help to conserve power and extend battery life in laptops or reduce electricity usage in desktop computers. Hot plugging and Safe mode, on the other hand, are not directly related to power management. Hot plugging refers to the ability to connect or disconnect devices without rebooting, while Safe mode is a troubleshooting mode used to diagnose and fix software or driver issues.

Submit
12. Which of the following interfaces has the ability to support digital audio as well as video through a single cable?

Explanation

HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only interface listed that has the ability to support both digital audio and video through a single cable. VGA (Video Graphics Array) and SVGA (Super Video Graphics Array) are analog interfaces that do not support audio, while DVI (Digital Visual Interface) supports video but requires a separate cable for audio. Therefore, HDMI is the only option that fulfills the requirement of supporting both digital audio and video through a single cable.

Submit
13. Which of the following is a technology that allows you to hear and watch video clips as soon as they start downloading from the web site, instead of waiting for the download to complete?

Explanation

Streaming media is a technology that allows users to hear and watch video clips as soon as they start downloading from a website, instead of waiting for the download to complete. This technology enables the continuous playback of audio and video content, delivering it in a real-time streaming format. Unlike downloading, where the entire file needs to be retrieved before playback can begin, streaming media allows for immediate access and playback while the content continues to be downloaded in the background. This enhances the user experience by reducing waiting times and providing seamless playback.

Submit
14. Which of the following programs can collect various types fo personal information, such as internet surfing habits, and Web sites that the user has visited?

Explanation

Spyware is a type of program that can collect various types of personal information, including internet surfing habits and the websites that the user has visited. Unlike malware, which is a broad term for malicious software, spyware specifically focuses on gathering personal information without the user's knowledge or consent. Honeypots are decoy systems used to lure hackers, and worms are self-replicating malware that spread across networks. Therefore, the correct answer is spyware.

Submit
15. Mark wants to connect a printer and mouse to his laptop. Which of the following is the best wireless technology to use?

Explanation

Bluetooth is the best wireless technology to use for connecting a printer and mouse to a laptop. Bluetooth is a widely supported wireless technology that allows for seamless and reliable connections between devices. It is designed for short-range communication and is commonly used for connecting peripherals such as printers and mice to laptops and other devices. Bluetooth offers low power consumption, easy pairing, and a secure connection, making it the ideal choice for this scenario.

Submit
16. Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio?

Explanation

HDMI (High-Definition Multimedia Interface) is the correct answer because it is the only option that transmits all ATSC HDTV standards and supports 8-channel digital audio. DVI (Digital Visual Interface) only supports video signals, S-Video transmits analog video signals, and SVGA (Super Video Graphics Array) is a video display standard. HDMI, on the other hand, is capable of transmitting high-definition video and audio signals, making it the most suitable option for connecting HDTVs and audio devices.

Submit
17. Which of the following is an international standard for energy efficient consumer products?

Explanation

The Energy Star rating is an international standard for energy efficient consumer products. It is a program developed by the United States Environmental Protection Agency (EPA) and the Department of Energy (DOE) to help consumers identify energy-efficient products. Products with the Energy Star rating meet strict energy efficiency guidelines set by these agencies and are proven to save energy and reduce greenhouse gas emissions. This rating is widely recognized and used by consumers and manufacturers worldwide to make informed decisions about energy-efficient products.

Submit
18. Which of the following can be installed in an AGP slot?

Explanation

An AGP slot is specifically designed to accommodate a video card. It provides a high-speed connection between the video card and the motherboard, allowing for efficient data transfer and improved graphics performance. Therefore, a video card is the correct answer as it is the only component listed that is compatible with an AGP slot. RAM, microprocessors, and modem cards are typically installed in different types of slots on a motherboard.

Submit
19. Which of the following refers to a location away from the computer center where document copies and backups are kept?

Explanation

Off Site storage refers to a location away from the computer center where document copies and backups are kept. This is done to ensure that in the event of any disaster or damage to the computer center, the data and documents stored in the off-site location remain safe and can be easily accessed. Off-site storage is a common practice in data management and helps to prevent loss of important information.

Submit
20. Which of the following protocols handles the reliable delivery data?

Explanation

TCP (Transmission Control Protocol) is the correct answer because it is a reliable transport protocol that ensures the delivery of data packets in a network. It provides error detection, flow control, and retransmission of lost packets, making it suitable for applications that require reliable and ordered data delivery, such as web browsing, file transfer, and email. TCP establishes a connection between the sender and receiver, guarantees the correct sequencing of packets, and acknowledges the successful delivery of data, ensuring reliable communication.

Submit
21. Which of the following statements is true about modem?

Explanation

A modem is a device that allows computers to transmit data over telephone lines. It converts digital signals from the computer into analog signals that can be transmitted over the telephone lines, and vice versa, it converts analog signals from the telephone lines back into digital signals that the computer can understand. This enables the computer to communicate with other computers or access the internet through the telephone network.

Submit
22. You are responsible for tenchincal support at a company. One of the employees complains that his new laptop cannot connect to the company wireless network. You have verified that he is entering a valid password/ passkey. What is the problem?

Explanation

The problem is that MAC filtering is blocking the employee's laptop from connecting to the company wireless network. MAC filtering is a security feature that only allows devices with specific MAC addresses to connect to the network. Since the employee's laptop is not on the approved list, it is being blocked from accessing the network.

Submit
23. Which of the following storage devices uses SRAM or DRAM?

Explanation

Solid state drives (SSDs) use either SRAM (Static Random Access Memory) or DRAM (Dynamic Random Access Memory) as storage devices. SRAM and DRAM are types of volatile memory that are commonly used in computers. Unlike traditional hard disk drives (HDDs) that use spinning disks to store data, SSDs use flash memory technology, which is faster and more reliable. SSDs are known for their high-speed performance, durability, and low power consumption. Therefore, the correct answer is Solid state drive (SSD).

Submit
24. Which of the following conditions does BIOS need to be updated? Choose two

Explanation

BIOS needs to be updated if users want to utilize new hardware features or options that are supported by the motherboard but not supported by the computer BIOS. Additionally, BIOS should be updated if the current BIOS does not support new devices.

Submit
25. Which of the following statements about a riser card is true?

Explanation

A riser card is a hardware component used to extend the slots for expansion cards in a computer. It allows additional expansion cards to be connected to the motherboard by raising them up vertically, providing more space for installation. This is particularly useful in compact computer cases where there is limited horizontal space for expansion cards. By using a riser card, users can add more functionality to their computer by connecting additional expansion cards such as graphics cards, sound cards, or network cards.

Submit
26. You are implementing wireless access at a defense contractor. Specifications say, you must implement the AES Encryption algorith. Which encryption standards should you use?

Explanation

The correct answer is WPA 2 because it is the most secure encryption standard among the options given. WEP (Wired Equivalent Privacy) is an outdated and weak encryption standard that can be easily hacked. WPA (Wi-Fi Protected Access) and TKIP (Temporal Key Integrity Protocol) are also outdated and have known vulnerabilities. WPA 2 (Wi-Fi Protected Access 2) is the current industry standard and provides strong encryption and security features, making it the best choice for implementing wireless access at a defense contractor.

Submit
27. Which of the following color code is used for a PS/2 keyboard connector on new motherboards?

Explanation

The color code used for a PS/2 keyboard connector on new motherboards is purple. This color coding is a standard convention followed by motherboard manufacturers to differentiate the PS/2 keyboard connector from other connectors. The purple color makes it easier for users to identify and connect their PS/2 keyboards to the correct port on the motherboard.

Submit
28. Which of the following aims to restrict certain dangerous substances commonly used in electronics equipment?

Explanation

The RoHS directive aims to restrict certain dangerous substances commonly used in electronics equipment. It stands for Restriction of Hazardous Substances and is a European Union directive that restricts the use of substances such as lead, mercury, cadmium, and certain flame retardants in electrical and electronic products. The directive aims to protect human health and the environment by reducing the negative impact of these substances on both. It requires manufacturers to ensure that their products comply with the specified restrictions before they can be sold in the European market.

Submit
29. Which of the following devices is used for accessing the data on Secure Digital SD card, MMC and CompactFlash(CF)?

Explanation

A memory card reader is used for accessing the data on Secure Digital SD card, MMC, and CompactFlash (CF). This device allows users to connect their memory cards to a computer or other device and transfer data between them. It provides a convenient way to access and transfer files, photos, videos, and other data stored on these types of memory cards.

Submit
30. Your office uses Windows vista. A patch was applied automatically. Suddenly the users who have scanners attached to their computers complain that they cannot access the scanners. When you check their device manager, you notice there is on exlamation point next to the scanner. What should you do now?

Explanation

When a patch is applied automatically and users with scanners attached to their computers complain about not being able to access the scanners, the presence of an exclamation point next to the scanner in the device manager suggests that the issue may be related to the device driver. Manually uninstalling and reinstalling the device driver can help resolve compatibility issues caused by the patch, allowing the scanners to be accessed again.

Submit
31. Which of the following are types social engineering attacks? Choose two

Explanation

The correct answer is "An unauthorized person gains entrance to the building where the company's database server resides and accesses the server by pretending to be an employee" and "An unauthorized person calls a user to be a system administrator in order to get the user's password". These two scenarios describe social engineering attacks. In the first scenario, the attacker manipulates their way into the building by impersonating an employee, gaining physical access to the server. In the second scenario, the attacker tricks a user into believing they are a system administrator and convinces them to disclose their password. Both of these attacks exploit human vulnerabilities to gain unauthorized access to systems or information.

Submit
32. Which of the following software can also be used as a basic security measure?

Explanation

A screensaver can be used as a basic security measure because it helps to protect sensitive information on a computer screen from being viewed by unauthorized individuals. When a screensaver is activated after a certain period of inactivity, it obscures the contents of the screen, preventing others from seeing what is displayed. This can be particularly useful in shared spaces or public areas where there is a risk of someone accessing the computer without permission. By activating a screensaver, users can ensure that their information remains secure when they are away from their computer.

Submit
33. Which of the following terms refers to properitary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, vailability or convenice?

Explanation

Shareware refers to proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience.

Submit
34. Which of the following can occur if the power cable runs along with the computer network cable?

Explanation

If the power cable runs along with the computer network cable, electromagnetic interference (EMI) can occur. EMI is the disturbance caused by electromagnetic radiation from external sources that can interfere with the signals transmitted through the network cable. This interference can lead to data corruption, signal degradation, and communication errors. It is important to keep power cables and network cables separated to minimize the risk of EMI.

Submit
35. Which of the following are types of LCD monitors? Choose two

Explanation

Active Matrix and Passive Matrix are both types of LCD monitors. Active Matrix LCD monitors use a transistor for each pixel, resulting in faster response times and better image quality. Passive Matrix LCD monitors, on the other hand, use a grid of conductors to control the pixels, which is less expensive but also less efficient. X-Matrix is not a recognized type of LCD monitor, and SVGA refers to a type of video graphics array, not a type of LCD monitor.

Submit
36. Which of the following maximum resolutions does the UXGA video technology supports?

Explanation

UXGA video technology supports a maximum resolution of 1600 x 1200.

Submit
37. Which of the following ports is also known as PS/2

Explanation

The 6-pin Mini-Din connector is also known as PS/2.

Submit
38. Which of the following statements are true about USB? Choose two

Explanation

USB supports hot plugging, which means that devices can be connected or disconnected from a USB port without having to restart the computer. Additionally, you can connect up to 127 peripheral devices to a single USB port, allowing for a high level of connectivity and versatility.

Submit
39. Which of the following devices can cause great harm to ones life with lethal electric shocks? Choose two

Explanation

SMPS (Switched Mode Power Supply) and Monitor can cause great harm to one's life with lethal electric shocks. SMPS is responsible for converting the AC power from the wall outlet to the DC power required by the computer components. If not handled properly, it can deliver high voltage electric shocks. Similarly, monitors can store high levels of electrical charge which can be dangerous if mishandled. Floppy drives and keyboards, on the other hand, do not possess the same level of electrical risk.

Submit
40. At what voltage does a USB host supply power to the USB bus?

Explanation

A USB host supplies power to the USB bus at a voltage of 5 volts. This is the standard voltage for USB power delivery and is used to power and charge various USB devices such as smartphones, tablets, and other peripherals. It is important to note that different USB versions may have different power delivery capabilities, but the most common and widely used voltage is 5 volts.

Submit
41. Which of the following terms refers to an anti virus software file that is updated from time to time to protect a computer from new viruses?

Explanation

An anti-virus software file that is updated from time to time to protect a computer from new viruses is referred to as a "definition." Definitions contain information about the characteristics and behavior of specific viruses, allowing the anti-virus software to identify and remove them. Regularly updating the definition file ensures that the anti-virus software can effectively detect and eliminate new threats.

Submit
42. Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computer, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend?

Explanation

Mac Filtering is the most appropriate security measure that can be recommended in this scenario. Mac Filtering allows the customer to create a list of specific MAC addresses (unique identifiers for network devices) that are authorized to connect to the Wi-Fi network. This ensures that only the authorized computers can access the network, providing an additional layer of security.

Submit
43. Which of the following devics has its own BIOS?

Explanation

A video adapter is a device that is responsible for generating and displaying visual output on a computer monitor. It has its own BIOS (Basic Input/Output System) which is a firmware that initializes and controls the hardware settings of the video adapter. The BIOS allows the computer to communicate with the video adapter and ensures that it functions properly. This includes configuring display settings, resolution, color depth, and other parameters. Having its own BIOS allows the video adapter to operate independently and ensures compatibility with the computer system.

Submit
44. Which of the following statements about multi or authentication is true?

Explanation

The correct answer is "it involves two or more methods as part of the authentication process". This means that multi-factor authentication requires the use of multiple methods or factors to verify the identity of a user. These factors can include something the user knows (such as a password), something the user has (such as a smart card), or something the user is (such as a fingerprint). By combining multiple factors, multi-factor authentication provides an extra layer of security compared to single-factor authentication methods.

Submit
45. You are handling IT support for a sales company. One of the sales representitives complains that his laptop does not have a network card. You wish to add a type of expansion card should you use?

Explanation

PCMCIA stands for Personal Computer Memory Card International Association. PCMCIA cards are commonly used for adding functionality to laptops, such as network cards, modems, and wireless adapters. Therefore, if the sales representative's laptop does not have a network card, adding a PCMCIA card would be the appropriate choice to address the issue. MCA, PCI, and AGP are not relevant in this scenario as they are different types of expansion slots used in desktop computers, not laptops.

Submit
46. Which of the following are the most likely causes of virus attack? Choose all that apply

Explanation

The most likely causes of a virus attack include installing an application from an unreliable source, downloading a file from an unknown website, installing a DLL file from an unreliable source, and using a floppy, a compact disk, or a pen drive from an unreliable source. These actions can expose a computer to malicious software that can infect the system and compromise its security.

Submit
47. You are selecting RAM for a new PC. You are very concerned about making sure errors are handled. Which of the following types of RAM should you select?

Explanation

ECC RAM (Error Correcting Code RAM) should be selected because it is specifically designed to detect and correct errors in data that is being read from or written to the RAM. This type of RAM uses additional bits to store error correction codes, allowing it to identify and fix single-bit errors, and detect multiple-bit errors. By using ECC RAM, the chances of data corruption or system crashes due to memory errors are significantly reduced, making it a reliable choice for those concerned about error handling.

Submit
48. Your customers Windows XP machine has become ususable due to some uknown cause. You want to put the computer into a working state again. What is the best way to do this?

Explanation

The best way to put the customer's Windows XP machine back into a working state is to use the Windows recovery console with the Windows recovery CD. This will allow the user to access advanced troubleshooting options and repair any system errors or issues that are causing the computer to be unusable. Reinstalling Windows or uninstalling new software may not address the underlying cause of the problem, while using the recovery console provides a more comprehensive solution.

Submit
49. Which of the following buses has a maximum data transfer rate of 2400 Mbps?

Explanation

eSATA (External Serial ATA) is the correct answer because it has a maximum data transfer rate of 2400 Mbps. FireWire 800 has a maximum data transfer rate of 800 Mbps, USB 1.1 has a maximum data transfer rate of 12 Mbps, and USB 2.0 has a maximum data transfer rate of 480 Mbps. Therefore, eSATA is the only option that matches the given data transfer rate.

Submit
50. What is the mazimum resolution that the WUXGA video technology supports?

Explanation

WUXGA video technology supports a maximum resolution of 1920 x 1200.

Submit
51. Andrew has a personal computer. One morning, he starts his computer and hinds the following error message: "CMOS checksum failure. "What are the most likely causes of this error? Choose two

Explanation

The error message "CMOS checksum failure" indicates that there is an issue with the CMOS (Complementary Metal-Oxide-Semiconductor) settings. The CMOS battery is responsible for powering the CMOS chip, which stores the computer's BIOS settings. If the CMOS battery fails, it can cause the CMOS chip to fail as well, leading to the checksum failure error message. Therefore, the most likely causes of this error are the failure of both the CMOS battery and the CMOS chip.

Submit
52. Which of the following are dual core processors? Choose two.

Explanation

The correct answer is AMD Athlon(tm) 64 X2 and Intel(r) Pentium(r) processor Extreme Edition. These two processors are known for their dual-core architecture, which means they have two separate processing units within a single chip. This allows for better multitasking and improved performance compared to single-core processors. The other options, Intel Pentium 4 and AMD Athlon(tm), do not have dual-core architecture and therefore are not considered dual-core processors.

Submit
53. Which of the following methods is based on the usrs roles and responsibilites?

Explanation

Role-based access control is a method that is based on the users' roles and responsibilities. In this method, access to resources is granted or denied based on the user's role within the organization. Each user is assigned a specific role, and access permissions are defined based on that role. This ensures that users only have access to the resources that are necessary for their job function, reducing the risk of unauthorized access or data breaches.

Submit
54. Which of the following switches of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files?

Explanation

The /o switch of the XCOPY command copies the ownership and NTFS permissions on the files while copying the files. This means that when using the /o switch, the copied files will retain the same ownership and NTFS permissions as the original files.

Submit
55. Which of the following enables third pary developers to create capabilites to extend an application?

Explanation

A plug-in is a software component that adds specific features or functionality to an existing application. It allows third-party developers to create additional capabilities and extend the functionality of the application. By integrating a plug-in, developers can customize the application to meet their specific needs, enhancing its functionality and providing additional features that were not originally included. This enables the application to be more versatile and adaptable to different user requirements.

Submit
56. Which of the following sleep modes is the most power hungry mode?

Explanation

S1 is the most power hungry sleep mode because it is the deepest sleep mode where the processor is completely powered off. In this mode, all the processor's caches and registers are flushed, and the voltage to the processor is turned off, resulting in the lowest power consumption. However, it takes more time and power to wake up from this mode compared to other sleep modes.

Submit
57. Which of the following statements about a smart card are true? Each correct Answer represents a complete solution. Choose two.

Explanation

A smart card is a device that contains a microprocessor and permanent memory. It is used to securely store public and private keys for a log on, e-mail signing and encryption, and file encryption. This means that it can securely store sensitive information and perform cryptographic operations, making it a secure solution for authentication and data protection.

Submit
58. Which of the following statements about the DVI-I connector are true? Choose two

Explanation

The DVI-I connector is capable of transmitting both digital and analog signals, making it suitable for a wide range of devices. Additionally, it has 4 more pins compared to the DVI-D connector, allowing for the transmission of additional information or signals.

Submit
59. Matk works as a Network admin. for NetTech inc. The network has 150 Windows 2000 professional client computers and four Windows 2000 servers. All the client computers are able to connect to the internet. Mark is concerned about malware infecting the client computers through the internet. What will Mark do to protect the client computers from malware? Choose two.

Explanation

Mark will educate the users of the client computers about the problems arising due to malware and also educate them on how to avoid malware. By educating the users, they will become aware of the risks associated with malware and the precautions they need to take to prevent infection. This will help in creating a security-conscious environment where users will be more cautious while browsing the internet and downloading files, reducing the chances of malware infecting the client computers.

Submit
60. You have a customer who wants to install Windows XP professional on her computer. What is the minimum amount of RAM she must have for this to work?

Explanation

Windows XP Professional requires a minimum of 64 Megabytes of RAM to function properly.

Submit
61. What is the difference between the USB 2.0 and IEEE 1394 bus standards?

Explanation

IEEE 1394 is slower than USB 2.0 because USB 2.0 has a higher data transfer rate compared to IEEE 1394. USB 2.0 has a maximum data transfer rate of 480 Mbps, while IEEE 1394 has a maximum data transfer rate of 400 Mbps. Therefore, USB 2.0 is faster in terms of data transfer speed.

Submit
62. Your client currently has Windows 98 and wishes to upgrade to Windows XP. What is the best way to accomplish this?

Explanation

The best way to upgrade from Windows 98 to Windows XP is to buy and install the Windows XP Upgrade. This option allows for a smooth transition from the older operating system to the newer one, ensuring compatibility and preserving files and settings. Installing a full copy of Windows XP would require a clean installation, which may result in data loss and the need to reinstall all applications. Upgrading first to Windows 2000 and then to Windows XP would be a longer and more complicated process.

Submit
63. You are working with a team that will be bringing new computers to a sales department at a company. The sales team would like to keep not only their old find on the new PCs. What should you do?

Explanation

The User State Migration Tool is specifically designed to transfer system settings and files from one computer to another. It allows for a seamless transition of user profiles, data, and settings to new machines. This ensures that the sales team can keep not only their old files but also their personalized system settings on the new computers. Using the User State Migration Tool is the most efficient and effective way to transfer all necessary data and settings to the new machines.

Submit
64. Which of the following AT Attachment(ATA) standards supports transfer mode UltraDMA/133?

Explanation

ATA-7 is the correct answer because it is the AT Attachment (ATA) standard that supports the transfer mode UltraDMA/133. The UltraDMA/133 transfer mode allows for data transfer rates of up to 133 MB/s, making it the fastest transfer mode supported by the ATA standards listed. ATA-6, ATA-4, and ATA-5 do not support the UltraDMA/133 transfer mode, so they are not the correct answers.

Submit
65. Which of the following statements is true about a brownout?

Explanation

A brownout refers to the situation of a voltage drop in the power supply. This means that the voltage provided by the power source decreases temporarily, causing a decrease in the power available for devices connected to it. Unlike a blackout, where the power supply is completely cut off, a brownout results in a reduced voltage level, which can lead to dimming lights, slower device performance, and potential damage to electrical equipment.

Submit
66. What does Wireless transport layer security (WTLS) provide for wireless devices? Choose all that apply

Explanation

Wireless Transport Layer Security (WTLS) provides data integrity, encryption, and authentication for wireless devices. Data integrity ensures that the data remains unchanged during transmission, encryption protects the data from unauthorized access by encrypting it, and authentication verifies the identity of the communicating parties to ensure secure communication. Bandwidth, on the other hand, is not directly provided by WTLS.

Submit
67. Which of the following power sources are used to power a laptop?

Explanation

AC power and battery are both used to power a laptop. AC power refers to the electricity provided by an outlet, which is used to charge the laptop's battery and power it directly. The battery, on the other hand, stores electrical energy and allows the laptop to be used without being connected to a power source. Both power sources are essential for the functioning of a laptop, as the AC power charges the battery and the battery provides power when the laptop is not plugged in.

Submit
68. Which of the following cryptographic algorithm uses public key and private key to enrypt or decrypt data?

Explanation

Asymmetric cryptography is the correct answer because it uses both a public key and a private key to encrypt and decrypt data. In this type of algorithm, the public key is used to encrypt the data, while the private key is used to decrypt it. This allows for secure communication between two parties, as the public key can be freely shared while the private key remains secret. Asymmetric cryptography is commonly used in applications such as secure email, digital signatures, and secure online transactions.

Submit
69. Which of the following protocols transmits error messages and network statistics?

Explanation

ICMP (Internet Control Message Protocol) is the correct answer because it is specifically designed to transmit error messages and network statistics between network devices. It is used by network devices to report errors, such as unreachable hosts or network congestion, and to provide network statistics, such as round-trip time and packet loss. ICMP is an integral part of the Internet Protocol Suite and is commonly used by network administrators for troubleshooting network connectivity issues. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses, TCP (Transmission Control Protocol) is responsible for reliable data transmission, and NNTP (Network News Transfer Protocol) is used for distributing news articles.

Submit
70. Which of the following display standards provides four times more pixels than an 800x600 display?

Explanation

UXGA stands for Ultra eXtended Graphics Array and it provides a display resolution of 1600x1200 pixels, which is four times more than the 800x600 display resolution. Therefore, UXGA is the correct answer.

Submit
71. Which of the following bus interfaces are used by the video capture cards? Choose two.

Explanation

Video capture cards typically use the AGP and PCIe bus interfaces. AGP (Accelerated Graphics Port) was a high-speed bus interface specifically designed for graphics cards, making it suitable for video capture cards as well. PCIe (Peripheral Component Interconnect Express) is the modern and faster replacement for AGP, providing high-bandwidth communication between the video capture card and the computer's motherboard. VESA (Video Electronics Standards Association) and EISA (Extended Industry Standard Architecture) are not commonly used for video capture cards.

Submit
72. What is the maximum data transmission speed of IEE 802. 11b Wireless networks?

Explanation

The maximum data transmission speed of IEEE 802.11b wireless networks is 11 Mbps. This standard was introduced in 1999 and operates in the 2.4 GHz frequency range. While it may seem slow compared to modern standards, such as 802.11n or 802.11ac, 802.11b was a significant improvement over its predecessor, 802.11a, which had a maximum speed of 2 Mbps. It provided a more reliable and faster wireless connection for devices at that time.

Submit
73. Which fo the following substances are restricted under restriction of hazardous Substances (RoHS)?

Explanation

The substances that are restricted under the Restriction of Hazardous Substances (RoHS) are Mercury (Hg), Lead (Pb), and Cadmium (Cd). These substances are considered hazardous to the environment and human health. The RoHS directive aims to limit the use of these substances in electrical and electronic equipment to reduce their negative impact on the environment and human well-being. Iron (Fe) is not restricted under RoHS as it is not considered hazardous in the same way as the other substances mentioned.

Submit
74. Which of the following switches is used with XCOPY command to copy directories and subdirectoris, including empty directions?

Explanation

The /e switch is used with the XCOPY command to copy directories and subdirectories, including empty directories. This switch ensures that all directories and subdirectories are copied during the process, even if they are empty.

Submit
75. Which of the following can be used to accomplish authentication? Choose all that apply

Explanation

Biometrics, password, and token can all be used to accomplish authentication. Biometrics refers to using unique physical or behavioral characteristics of an individual, such as fingerprints or facial recognition, to verify their identity. Passwords are a common method of authentication where users must enter a secret code or phrase known only to them. Tokens, such as smart cards or key fobs, provide an additional layer of authentication by generating one-time passwords or digital signatures. By choosing any combination of these methods, organizations can ensure secure access to their systems and data.

Submit
76. Which of the following is the clock speed of the accelerated graphics port 8X expansion slot?

Explanation

The clock speed of the accelerated graphics port 8X expansion slot is 533 MHz. This is the correct answer because the AGP 8X standard operates at a maximum clock speed of 533 MHz, providing faster data transfer rates between the graphics card and the computer's motherboard.

Submit
77. Which of the following sleep modes is also known as Hibernation in Windows operating systems?

Explanation

S4 is the correct answer because it refers to the sleep mode known as Hibernation in Windows operating systems. In this mode, the computer saves all open documents and running applications to the hard drive and then shuts down completely. When the computer is turned back on, it restores the previously saved state, allowing the user to resume their work from where they left off. This sleep mode is particularly useful for laptops and other portable devices as it helps conserve battery life while still allowing quick access to the system.

Submit
78. What is the maximum cable length to connect a device to an IEEE 1394 a port?

Explanation

The maximum cable length to connect a device to an IEEE 1394 a port is 4.5 meters.

Submit
79. In which of the following sizes are the Express card modules available? Choose two

Explanation

Express card modules are available in two sizes: 54 mm wide and 34 mm wide. These sizes refer to the width of the modules. Therefore, the correct answer is 54 mm Wide and 34 mm Wide.

Submit
80. Which of the following is the most common method used by attackers to identify wireless networks?

Explanation

War driving is the most common method used by attackers to identify wireless networks. War driving involves driving around with a device that can detect and map out wireless networks in the vicinity. Attackers can then use this information to target vulnerable networks for unauthorized access or other malicious activities. This method allows attackers to easily identify potential targets and exploit any vulnerabilities in the wireless network's security.

Submit
81. Which of the following are serial interfaces? Choos all that apply

Explanation

USB and Firewire are both serial interfaces. USB (Universal Serial Bus) is a widely used interface for connecting various devices to a computer. It allows for the transfer of data and power between devices. Firewire (IEEE 1394) is another serial interface commonly used for high-speed data transfer, particularly in audio and video applications. EPP (Enhanced Parallel Port) and IEEE 1284 are parallel interfaces, not serial interfaces.

Submit
82. WHich of the following provides authentication, enryption and data integrity for wireless devices?

Explanation

WTLS stands for Wireless Transport Layer Security. It is a security protocol specifically designed for wireless devices. WTLS provides authentication, encryption, and data integrity for wireless communication. It ensures that the data transmitted between wireless devices is secure and protected from unauthorized access or tampering. WTLS is commonly used in wireless applications such as mobile banking, e-commerce, and secure messaging.

Submit
83. You are installing two hard disk drives which of the following possible combinations can be used? Each correct answer represnts a complete solution. Choose all that apply.

Explanation

The correct answers are both options mentioned. In the first option, installing the second hard drive on the primary IDE controller and designating one drive as Master and the other as Slave allows for proper configuration and communication between the drives. In the second option, installing the second hard disk drive on the secondary IDE controller and ensuring that the first hard disk drive is on the primary IDE controller, while designating both drives as Master, also allows for proper configuration and communication between the drives.

Submit
84. Which of the following statements about the G3 state of a computer are true? Choose two

Explanation

In the G3 state of a computer, a complete power loss occurs, such as when the power cord is unplugged from the computer. Additionally, a computer can be disassembled in this state.

Submit
85. Mark has purchased a new working USB webcam. He connects the webcam to a USB port on his computer and ginds that the computer does not detect it. He connects other working USB devices to the port and discovers that the USB port is not functional. What should Mark do first to resolve the issure?

Explanation

Mark should first verify that the USB webcam is functioning properly. This can be done by connecting the webcam to another computer or device to see if it is detected. If the webcam works on another device, then the issue is likely with the USB port on Mark's computer. In that case, he can try troubleshooting the USB port or consider replacing it if necessary.

Submit
86. What are the benefits of using Universal Serial bus 2.0 over legacy communication ports such as RS-232 and parallel ports? Choose all that apply

Explanation

The benefits of using Universal Serial Bus 2.0 (USB 2.0) over legacy communication ports such as RS-232 and parallel ports are easy configuration of hardware devices, expansion, and speed. USB 2.0 allows for plug-and-play functionality, making it easier to connect and configure hardware devices without the need for manual settings. It also supports daisy-chaining and the connection of multiple devices through hubs, providing expansion capabilities. Furthermore, USB 2.0 offers faster data transfer speeds compared to RS-232 and parallel ports, enabling quicker and more efficient communication between devices.

Submit
87. Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

Explanation

Anycast is the correct answer because it refers to a single IPv6 address that can be assigned to multiple interfaces. When a packet is sent to an anycast address, it is delivered to the nearest interface that is assigned that address. This allows for efficient routing and load balancing, as the network automatically directs traffic to the closest available interface. Anycast is commonly used for services such as DNS or content delivery networks, where multiple servers can provide the same service.

Submit
88. Which of the following expansion slots can be used to plug a SCSI adapter? Choose all that apply.

Explanation

VESA, PCI, and EISA expansion slots can be used to plug a SCSI adapter. SCSI adapters require high-speed data transfer capabilities, and these expansion slots provide the necessary bandwidth and compatibility for connecting SCSI devices. VESA, PCI, and EISA slots are commonly found on older computer systems and are designed to support various types of expansion cards, including SCSI adapters.

Submit
89. Which of the following are the types of parental control? Choose all that apply

Explanation

The types of parental control include content filter control, usage control, monitoring control, and usage management tool. Content filter control allows parents to block or filter inappropriate content. Usage control enables parents to set limits on the amount of time their children can spend on certain devices or applications. Monitoring control allows parents to monitor their children's online activities and track their usage. Usage management tools provide parents with tools and resources to manage and control their children's technology usage.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 01, 2013
    Quiz Created by
    Delano Vasquez
Cancel
  • All
    All (89)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following refers to the data rate supported by a network...
Which of the following devices provides input by analyzing printed...
Which of the following types of attacks is often performed by looking...
Which of the following software displays advertisements, whether or...
Which of the following ports on a computer are used to connect a...
Which of the following is the most common laptop battery found today?
Which of the following devices contains no moving parts and stores...
Which of the following stores user preferences related to a Web site?
You have a wireless printer that is connected to your Windows XP...
Which of the following types of parental controls is used to limit...
Which of the following features are related to power management?...
Which of the following interfaces has the ability to support digital...
Which of the following is a technology that allows you to hear and...
Which of the following programs can collect various types fo personal...
Mark wants to connect a printer and mouse to his laptop. Which of the...
Which of the following transmits all ATSC HDTV standards and supports...
Which of the following is an international standard for energy...
Which of the following can be installed in an AGP slot?
Which of the following refers to a location away from the computer...
Which of the following protocols handles the reliable delivery data?
Which of the following statements is true about modem?
You are responsible for tenchincal support at a company. One of the...
Which of the following storage devices uses SRAM or DRAM?
Which of the following conditions does BIOS need to be updated? Choose...
Which of the following statements about a riser card is true?
You are implementing wireless access at a defense contractor....
Which of the following color code is used for a PS/2 keyboard...
Which of the following aims to restrict certain dangerous substances...
Which of the following devices is used for accessing the data on...
Your office uses Windows vista. A patch was applied automatically....
Which of the following are types social engineering attacks? Choose...
Which of the following software can also be used as a basic security...
Which of the following terms refers to properitary software that is...
Which of the following can occur if the power cable runs along with...
Which of the following are types of LCD monitors? Choose two
Which of the following maximum resolutions does the UXGA video...
Which of the following ports is also known as PS/2
Which of the following statements are true about USB? Choose two
Which of the following devices can cause great harm to ones life with...
At what voltage does a USB host supply power to the USB bus?
Which of the following terms refers to an anti virus software file...
Your customer is very concerned about security for Wi-Fi at his home....
Which of the following devics has its own BIOS?
Which of the following statements about multi or authentication is...
You are handling IT support for a sales company. One of the sales...
Which of the following are the most likely causes of virus attack?...
You are selecting RAM for a new PC. You are very concerned about...
Your customers Windows XP machine has become ususable due to some...
Which of the following buses has a maximum data transfer rate of 2400...
What is the mazimum resolution that the WUXGA video technology...
Andrew has a personal computer. One morning, he starts his computer...
Which of the following are dual core processors? Choose two.
Which of the following methods is based on the usrs roles and...
Which of the following switches of the XCOPY command copies the...
Which of the following enables third pary developers to create...
Which of the following sleep modes is the most power hungry mode?
Which of the following statements about a smart card are true? Each...
Which of the following statements about the DVI-I connector are true?...
Matk works as a Network admin. for NetTech inc. The network has 150...
You have a customer who wants to install Windows XP professional on...
What is the difference between the USB 2.0 and IEEE 1394 bus...
Your client currently has Windows 98 and wishes to upgrade to Windows...
You are working with a team that will be bringing new computers to a...
Which of the following AT Attachment(ATA) standards supports transfer...
Which of the following statements is true about a brownout?
What does Wireless transport layer security (WTLS) provide for...
Which of the following power sources are used to power a laptop?
Which of the following cryptographic algorithm uses public key and...
Which of the following protocols transmits error messages and network...
Which of the following display standards provides four times more...
Which of the following bus interfaces are used by the video capture...
What is the maximum data transmission speed of IEE 802. 11b Wireless...
Which fo the following substances are restricted under restriction of...
Which of the following switches is used with XCOPY command to copy...
Which of the following can be used to accomplish authentication?...
Which of the following is the clock speed of the accelerated graphics...
Which of the following sleep modes is also known as Hibernation in...
What is the maximum cable length to connect a device to an IEEE 1394 a...
In which of the following sizes are the Express card modules...
Which of the following is the most common method used by attackers to...
Which of the following are serial interfaces? Choos all that apply
WHich of the following provides authentication, enryption and data...
You are installing two hard disk drives which of the following...
Which of the following statements about the G3 state of a computer are...
Mark has purchased a new working USB webcam. He connects the webcam to...
What are the benefits of using Universal Serial bus 2.0 over legacy...
Which of the following IPv6 address types is a single address that can...
Which of the following expansion slots can be used to plug a SCSI...
Which of the following are the types of parental control? Choose all...
Alert!

Advertisement