Strata Practice Exam 151-200

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ranger1
R
Ranger1
Community Contributor
Quizzes Created: 3 | Total Attempts: 694
| Attempts: 139 | Questions: 43
Please wait...
Question 1 / 43
0 %
0/100
Score 0/100
1. Which of the following refers to the process of verifying the identity of a person, network host, or system process?

Explanation

Authentication refers to the process of verifying the identity of a person, network host, or system process. It involves confirming that the entity trying to access a system or network is who they claim to be. This can be done through various methods such as passwords, biometrics, tokens, or certificates. Authentication is crucial for ensuring the security and integrity of a system or network by preventing unauthorized access and protecting sensitive information.

Submit
Please wait...
About This Quiz
Strata Practice Exam 151-200 - Quiz

This practice exam, titled 'STRATA Practice Exam 151-200', assesses knowledge in IT fundamentals covering topics like wireless networking, PC components, NTFS file system, content-control software, and connectivity interfaces. It prepares learners for CompTIA certification, enhancing skills in IT infrastructure and troubleshooting.

2. Which of the following can be used to maintain data related to the user during navigation, possibly across multiple visits?

Explanation

Cookies can be used to maintain data related to the user during navigation, possibly across multiple visits. Cookies are small text files that are stored on the user's device by the web browser. They can store information such as user preferences, login credentials, and shopping cart contents. When the user visits a website again, the browser sends the stored cookies back to the server, allowing the website to retrieve the stored data and provide a personalized experience.

Submit
3. Which of the following devices is used to provide visual input that can be easily transferred over the internet?

Explanation

A webcam is a device that is used to provide visual input that can be easily transferred over the internet. It is a camera that captures video and sends it to a computer or network, allowing users to have real-time video communication or to record videos that can be shared online. Unlike solid-state drives, Iomega Zip drives, or trackballs, webcams are specifically designed for capturing and transmitting visual content over the internet, making them the correct answer for this question.

Submit
4. Which of the following relies on a physical characteristic of the user to verify his identity?

Explanation

Biometrics relies on a physical characteristic of the user, such as fingerprints, facial recognition, or iris scans, to verify their identity. This technology uses unique biological traits that are difficult to forge or replicate, providing a high level of security. Social engineering, CHAP, and Kerberos v5 do not rely on physical characteristics but rather use other methods such as manipulation, authentication protocols, or encryption for identity verification.

Submit
5. Which of the following indicates the subjects that can use them?

Explanation

An access control list is a mechanism used to define and control access permissions to resources in a computer system. It lists the subjects (users, groups, or processes) that are allowed or denied access to specific objects (files, directories, devices). Therefore, the correct answer indicates that access control lists are used by subjects to determine their access privileges.

Submit
6. Which of the following ports does not support hot pluggings?

Explanation

The correct answer is Serial port (RS-232). Unlike USB 2.0 and FireWire ports, which support hot plugging, the Serial port (RS-232) does not. Hot plugging refers to the ability to connect and disconnect devices while the computer is running, without the need to restart or shut down the system. The Serial port (RS-232) requires the computer to be turned off before connecting or disconnecting devices, making it incompatible with hot plugging.

Submit
7. Which of the following options will you use to minimize ESD problems?

Explanation

A wrist strap is used to minimize ESD (electrostatic discharge) problems. ESD occurs when there is a sudden flow of electricity between two objects with different charges, and it can damage electronic components. Wearing synthetic clothes in the computer lab, using a plastic CPU cover, or an artiglare screen do not directly address ESD issues. However, a wrist strap is designed to safely discharge static electricity from the body to prevent damage to sensitive electronic equipment, making it the most suitable option for minimizing ESD problems.

Submit
8. Which of the following term is used for software designed and optimized for controlling what content is pertmitted to a reader, especially when it is used to restrict material delivered over the Web?

Explanation

Content-control software is the correct answer because it refers to software that is specifically designed and optimized for controlling what content is permitted to a reader, particularly when it is used to restrict material delivered over the internet. This type of software allows users to filter and block certain websites, keywords, or types of content to ensure a safe and controlled browsing experience.

Submit
9. You are selecting upgrade components for a PC. What sort of memory will you find specifically used in video?

Explanation

VRAM, which stands for Video Random Access Memory, is a type of memory specifically used in video. It is a dedicated memory used by the graphics card to store and quickly access video data such as textures, frame buffers, and other graphical information. Unlike system memory (DRAM), VRAM is optimized for high-speed data transfer and is crucial for smooth video playback and rendering in games and other graphic-intensive applications.

Submit
10. You work as a Network Administrator for Infonet Inc. The company used Wired Equivalent Privacy (WEP) for wireless security. Who among the following can authenticate from the access point of the network?

Explanation

Only users with the correct WEP key can authenticate from the access point of the network. Wired Equivalent Privacy (WEP) is a security protocol that provides encryption for wireless networks. It requires users to have the correct WEP key in order to authenticate and access the network. This means that only authorized users who possess the correct WEP key can connect to the network and authenticate themselves.

Submit
11. Which of the following is a case sensitive text string used in wireless network and having a maxiumum length of 32 characters?

Explanation

SSID stands for Service Set Identifier. It is a case sensitive text string used in wireless networks to identify a specific network. It is used by devices to connect to the correct network. The maximum length of an SSID is 32 characters.

Submit
12. Which of the following is a curcuit board that is used to extend slots for expansion cards and provides the ability to connect additional expansion cards to the computer?

Explanation

A riser card is a circuit board that is used to extend slots for expansion cards and provides the ability to connect additional expansion cards to the computer. It allows for more expansion options by allowing additional cards to be connected to the computer's motherboard.

Submit
13. Which of the following types of display takes the lease space on a desk?

Explanation

LCD (Liquid Crystal Display) takes the least space on a desk compared to the other types of displays mentioned. LCD screens are thin and compact, making them ideal for saving space on a desk. On the other hand, CRT (Cathode Ray Tube) displays are bulky and take up a significant amount of space. LED (Light Emitting Diode) displays are also relatively slim, but LCD screens are known for their sleek design and minimalistic footprint. Therefore, LCD is the correct answer as it occupies the least amount of desk space.

Submit
14. Which of the following modes saves maximum battery power while maintaining the current state of a computing session?

Explanation

Hibernate mode saves maximum battery power while maintaining the current state of a computing session. In this mode, the computer saves the current state, including all open documents and applications, to the hard drive and then shuts down. When the computer is turned on again, it restores the previous state, allowing the user to continue where they left off. This mode is particularly useful when the computer needs to be powered off for an extended period but the user wants to resume their work without losing any data or progress.

Submit
15. How many IEEE 1394 devices can be connected to a single IEEE 1394 port through daisy chaining?

Explanation

A single IEEE 1394 port can support up to 63 devices through daisy chaining. Daisy chaining is a method of connecting multiple devices in a series, where each device is connected to the previous one. This allows for efficient use of the limited number of ports available on a device. Therefore, the correct answer is 63.

Submit
16. Which of the following is an e-mail message retrieval protocol that allows e-mail clients to retrieve email messages from e-mail servers?

Explanation

IMAP (Internet Message Access Protocol) is an e-mail message retrieval protocol that allows e-mail clients to retrieve email messages from e-mail servers. It is commonly used by email clients to access and manage emails stored on a remote mail server. Unlike POP (Post Office Protocol), which downloads emails to the client device and removes them from the server, IMAP allows users to view and manipulate emails directly on the server, providing a more synchronized and versatile email experience. SMTP (Simple Mail Transfer Protocol) is used for sending emails, SNMP (Simple Network Management Protocol) is used for network management, and PPTP (Point-to-Point Tunneling Protocol) is used for virtual private networks (VPNs).

Submit
17. What is the maximum cable length that FireWire 800 supports?

Explanation

FireWire 800 supports a maximum cable length of 4.5 meters. This means that the cable connecting FireWire devices should not exceed this length in order to ensure proper functioning and data transfer. Going beyond this length may result in signal degradation and loss of data integrity. Therefore, it is important to adhere to the specified cable length to maintain optimal performance.

Submit
18. Which of the following protocols has recently been succeeded by Transport Layer Security (TLS) protocol?

Explanation

SSL (Secure Sockets Layer) is the correct answer. SSL is a cryptographic protocol that provides secure communication over a computer network. It was widely used for secure communication on the internet, but it has been succeeded by Transport Layer Security (TLS) protocol. TLS is an updated and more secure version of SSL, providing encryption and authentication for internet communications. Therefore, SSL has recently been succeeded by TLS.

Submit
19. Your customer complains that some of his older WinXP programs, particularly some games, won;t work in Windows Vista. What should you recommend?

Explanation

The recommended solution is to use the Windows Vista Compatibility Mode. This mode allows older programs, such as the WinXP programs mentioned, to run on Windows Vista by emulating the environment of the previous operating system. By enabling compatibility mode, the customer can potentially resolve compatibility issues and continue using their older programs without having to purchase new versions or dual boot between operating systems.

Submit
20. Which of the following is used by Wi-Fi Protected Access (WPA) to provide data encryption?

Explanation

TKIP (Temporal Key Integrity Protocol) is used by Wi-Fi Protected Access (WPA) to provide data encryption. TKIP is a security protocol that was designed to replace the original WEP (Wired Equivalent Privacy) encryption protocol, which had several vulnerabilities. TKIP uses a combination of encryption techniques, including RC4 for data confidentiality and a message integrity check to ensure data integrity. It also provides a key mixing function to dynamically generate encryption keys, making it more secure than WEP.

Submit
21. What is the thickness of Type II PCMCIA Card?

Explanation

The thickness of a Type II PCMCIA card is 5.5mm.

Submit
22. Which of the following statements about the XCPOPY command is true?

Explanation

The correct answer is that the XCOPY /s command copies both files and subdirectories. This means that when using the XCOPY command with the /s option, it will copy not only the specified files but also any subdirectories within the source directory.

Submit
23. Which of the following interfaces provides the fastest data transfer rate for printing a document on a printer?

Explanation

FireWire 800 provides the fastest data transfer rate for printing a document on a printer. FireWire 800, also known as IEEE 1394b, is a high-speed interface that can transfer data at a rate of up to 800 Mbps. This makes it ideal for tasks that require fast data transfer, such as printing large documents or high-resolution images. IEEE 802.11b and IEEE 802.11a are wireless networking standards, which may not offer the same level of speed as FireWire 800. USB 2.0 is a popular interface but has a lower data transfer rate compared to FireWire 800.

Submit
24. Which of the following protocols allows an e-mail client to access e-mails that are stored ona  remote mail server?

Explanation

IMAP (Internet Message Access Protocol) is the correct answer because it is a protocol that allows an email client to access and manage emails that are stored on a remote mail server. It enables users to view, organize, and manipulate their email messages on the server, without needing to download them to their local device. This allows for convenient remote access to emails from multiple devices, as well as the ability to synchronize changes made on different devices. The other options listed, PPPoE, SMTP, and ICMP, are not specifically designed for accessing and managing emails on remote servers.

Submit
25. Which of the following PCMCIA card supports hard disk drives?

Explanation

TYPE III PCMCIA cards support hard disk drives. Type III cards are the thickest and provide the most space for components, making them suitable for larger devices such as hard disk drives. Type I and Type II cards are thinner and are typically used for smaller devices like modems and network cards. Type VI is not a valid PCMCIA card type.

Submit
26. You work as a Network Administrator for Infonet Inc. The companys office has a wireless netowork. Wireless access point on the network works as a router and DHCP server. You want to configure a laptop to connect to the wireless network. What will you configure on the laptop to accomplish the task?

Explanation

To connect the laptop to the wireless network, you will need to configure the Service Set Identifier (SSID) on the laptop. The SSID is a unique name that identifies a wireless network. By configuring the correct SSID on the laptop, it will be able to identify and connect to the specific wireless network provided by the wireless access point.

Submit
27. Which of the following terms describes software technologies that improve portability, manageability and compatibility of applications by encapsulating them from the underlying operating ststem on which they are executed?

Explanation

Application virtualization is the correct answer because it refers to the software technologies that enhance the portability, manageability, and compatibility of applications by isolating them from the underlying operating system. This allows applications to run independently of the specific operating system, making them easier to deploy and maintain across different environments. Encapsulation, failover, and system hardening do not specifically address the encapsulation of applications from the underlying operating system.

Submit
28. Which is the maximum resolution that the XGA video technology supports?

Explanation

XGA (Extended Graphics Array) video technology supports a maximum resolution of 1024 x 768. This resolution refers to the number of pixels displayed horizontally and vertically on a screen. In the given options, 1024 x 768 is the only resolution that matches the maximum supported by XGA.

Submit
29. How many pins are used in HDMI Type A and Type B connectors?

Explanation

The correct answer is 19 pins and 29 pins. HDMI Type A connectors have 19 pins, while HDMI Type B connectors have 29 pins.

Submit
30. Which of the following is the default resolution for a VGA monitor?

Explanation

The default resolution for a VGA monitor is 640x480-pixels. VGA stands for Video Graphics Array, and it is an analog video standard commonly used for computer displays. The resolution refers to the number of pixels in the display, with 640x480 meaning there are 640 pixels horizontally and 480 pixels vertically. This resolution was widely used in older computer systems and is still supported by many VGA monitors today.

Submit
31. Your customer is using WinXP Service pack 1 with wireless zero configuration. Which is the most modern encryption supported with wireless zero configuration?

Explanation

WPA (Wi-Fi Protected Access) is the most modern encryption supported with wireless zero configuration. It provides better security than WEP (Wired Equivalent Privacy) and WEP2. PKI (Public Key Infrastructure) is not an encryption method but a framework for managing and verifying digital certificates. Therefore, WPA is the correct answer as it is the most advanced encryption option for wireless zero configuration in WinXP Service pack 1.

Submit
32. Which of the following techniques are used to secure wireless networks? Choose three

Explanation

MAC address filtering is a technique used to secure wireless networks by allowing only specific devices with pre-approved MAC addresses to connect to the network. A closed network is another technique that enhances security by hiding the network's existence, making it invisible to unauthorized users. SSID spoofing is a method used by attackers to mimic a legitimate network's SSID, tricking users into connecting to the attacker's network and potentially compromising their data. IP spoofing, on the other hand, is not a technique used to secure wireless networks but rather a method used to deceive or impersonate another IP address.

Submit
33. Which of the following devices also works as a video capture card?

Explanation

A TV tuner card is a device that allows a computer to receive television signals and display them on the computer screen. In addition to receiving TV signals, a TV tuner card also has the capability to capture video content from sources such as cable or satellite boxes, VCRs, or camcorders. This makes it possible to record live TV shows or transfer video footage to the computer for editing or storage. Therefore, a TV tuner card also functions as a video capture card.

Submit
34. How many devices, excluding the SCSI adapter, does a Fast-Wide SCSI-2 bus support?

Explanation

A Fast-Wide SCSI-2 bus supports a maximum of 15 devices, excluding the SCSI adapter. This means that up to 15 devices can be connected to the bus, such as hard drives, CD/DVD drives, scanners, and printers, allowing for efficient data transfer and communication between the devices.

Submit
35. A customer has come to you wanting upgrade the video card in his laptop. What would you recommend?

Explanation

Upgrading the video card in a laptop is usually not possible because most laptops have integrated graphics, meaning the video card is soldered onto the motherboard and cannot be easily replaced or upgraded. Unlike desktop computers, laptops do not have expansion slots like PCI Express or AGP, and PCMCIA cards are typically used for other purposes such as adding additional ports or wireless capabilities. Therefore, the correct answer is that upgrading the video card is not possible in this scenario.

Submit
36. Your computer has an internal SCSI hard disk drive and an external SCSI CD drive connected to a SCSI controller. Where will you place the terminators?

Explanation

You should place one terminator at the end of each drive. Terminators are used to prevent signal reflections and ensure proper communication on the SCSI bus. Placing a terminator at the end of each drive helps to terminate the bus properly and prevent any signal issues.

Submit
37. Which of the following energy saving standards is used to control only monitors and video cards?

Explanation

DPMS stands for Display Power Management Signaling, which is an energy-saving standard used to control only monitors and video cards. It allows the computer to automatically turn off the display or put it into a low-power mode when it is not in use. This helps to reduce energy consumption and extend the lifespan of the display. ACPI (Advanced Configuration and Power Interface), APM (Advanced Power Management), and ASPI (Advanced SCSI Programming Interface) are not specifically designed for controlling monitors and video cards.

Submit
38. Which of the following statements about SRAM and true? Choose three.

Explanation

SRAM is more expensive than DRAM because it requires more transistors to store each bit of data. SRAM is made of a special circuit called a flip-flop, which is composed of multiple transistors. SRAM is used for caching, as it provides faster access to data compared to DRAM.

Submit
39. Which of the following statements about a serial port are true? Choose all that apply

Explanation

A serial port is a hardware interface that allows devices such as printers and scanners to be connected to a computer. It sends data one bit at a time, over a single wire. Personal computers typically have serial ports with either 9-pin or 25-pin connectors.

Submit
40. Which of the following statements about CPU throtting are true? Choose two

Explanation

CPU throttling is a process that involves reducing the CPU processing time for an application that is malfunctioning. This helps to prevent the application from consuming excessive resources and causing system instability. Additionally, CPU throttling also involves limiting the amount of CPU time that applications can use within a specific time frame. This helps to prevent a single application from monopolizing the CPU and ensures fair resource allocation among multiple applications running on the system.

Submit
41. Which of the following statements about the compression feature of the NTFS file system are true? Choose two.

Explanation

The correct answer is that a user can work with NTFS-compressed files without decompressing them. This means that the user can access and modify the files directly without the need to decompress them first. This feature of the NTFS file system allows for efficient storage of files while still allowing easy access and manipulation by users. Additionally, it is worth noting that the other statements provided in the question are not true.

Submit
42. Which of the following protocols are used by Network Attached Storage (NAS)?

Explanation

Network Attached Storage (NAS) is a file-level storage architecture that allows multiple users and client devices to access data over a computer network. The protocols used by NAS include Server Message Block (SMB), Network File System (NFS), and Apple Filing Protocol (AFP). SMB is a protocol used by Windows-based systems, NFS is commonly used in UNIX and Linux environments, and AFP is used by Apple devices. These protocols enable seamless file sharing and access to data stored on the NAS device from different operating systems and client devices.

Submit
43. Which of the following statements about hibernate mode are true? Choose two.

Explanation

The given statement states that users have to enter hibernate mode manually on computers that are not ACPI-enabled or APM-enabled. This means that on computers that do not have the necessary power management features, the user needs to manually put the computer into hibernate mode. This suggests that hibernate mode is not automatically activated on these computers.

Submit
View My Results

Quiz Review Timeline (Updated): Aug 6, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 06, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 26, 2011
    Quiz Created by
    Ranger1
Cancel
  • All
    All (43)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of the following refers to the process of verifying the identity...
Which of the following can be used to maintain data related to the...
Which of the following devices is used to provide visual input that...
Which of the following relies on a physical characteristic of the user...
Which of the following indicates the subjects that can use them?
Which of the following ports does not support hot pluggings?
Which of the following options will you use to minimize ESD problems?
Which of the following term is used for software designed and...
You are selecting upgrade components for a PC. What sort of memory...
You work as a Network Administrator for Infonet Inc. The company used...
Which of the following is a case sensitive text string used in...
Which of the following is a curcuit board that is used to extend slots...
Which of the following types of display takes the lease space on a...
Which of the following modes saves maximum battery power while...
How many IEEE 1394 devices can be connected to a single IEEE 1394 port...
Which of the following is an e-mail message retrieval protocol that...
What is the maximum cable length that FireWire 800 supports?
Which of the following protocols has recently been succeeded by...
Your customer complains that some of his older WinXP programs,...
Which of the following is used by Wi-Fi Protected Access (WPA) to...
What is the thickness of Type II PCMCIA Card?
Which of the following statements about the XCPOPY command is true?
Which of the following interfaces provides the fastest data transfer...
Which of the following protocols allows an e-mail client to access...
Which of the following PCMCIA card supports hard disk drives?
You work as a Network Administrator for Infonet Inc. The companys...
Which of the following terms describes software technologies that...
Which is the maximum resolution that the XGA video technology...
How many pins are used in HDMI Type A and Type B connectors?
Which of the following is the default resolution for a VGA monitor?
Your customer is using WinXP Service pack 1 with wireless zero...
Which of the following techniques are used to secure wireless...
Which of the following devices also works as a video capture card?
How many devices, excluding the SCSI adapter, does a Fast-Wide SCSI-2...
A customer has come to you wanting upgrade the video card in his...
Your computer has an internal SCSI hard disk drive and an external...
Which of the following energy saving standards is used to control only...
Which of the following statements about SRAM and true? Choose three.
Which of the following statements about a serial port are true? Choose...
Which of the following statements about CPU throtting are true? Choose...
Which of the following statements about the compression feature of the...
Which of the following protocols are used by Network Attached Storage...
Which of the following statements about hibernate mode are true?...
Alert!

Advertisement