Exam Title

: :

CompTIA FC0-U41 Strata IT Fundamentals

Version :Demo

Answer option D is incorrect. Lead (Pb) Mercury (Hg) Cadmium (Cd) Hexavalent chromium (CrVI) Polybrominated biphenyls (PBB) Polybrominated diphenyl ethers (PBDE) Answer option A is incorrect. and B Explanation: The following substances are restricted under Restriction of Hazardous Substances (RoHS). Manually uninstall and reinstall the device driver. Usually. Which of the following substances are restricted under Restriction of Hazardous Substances (RoHS)? Each correct answer represents a complete solution. the users who have scanners attached to their computers complain that they cannot access the scanners. Mercury (Hg) D. Roll back the patch. Patches often have key security updates. B. Find a Vista compatible scanner. Suddenly. When you check their Device Manager.      1. 2. Choose all that apply. A. you notice there is no exclamation point next to the scanner. Answer: A Explanation: Sometimes a patch may cause problems for an existing device driver. Lead (Pb) Answer: D. This way the driver is installed after the patch. C. This morning. What should you do now? A. Cadmium (Cd) C. C. Reinstall Vista. Iron (Fe) B. Simply leaving the machine . D. you simply uninstall and then reinstall the driver. a patch was applied automatically. Your office uses Windows Vista. Iron (Fe) is not restricted under RoHS.

Encapsulation isolates the internal complexity of an object's operation from the rest of the application. For example. such as internal data structures and code. removing unused protocols and services. when in reality it is not. and limiting the number of users with administrative privileges. It can be achieved by installing the latest service packs. and still have to deal with this problem. System hardening is a term used for securing an operating system. you do not need to know how the value is . Application virtualization D. when you set the width property on a command button. This drastic step will return you to the pre-patch state. Encapsulation is an object-oriented programming term used to define the ability to contain and hide information about an object. but then you will still need to apply that patch. although it is still executed as if it is. Which of the following terms describes software technologies that improve portability. Failover B. A fully virtualized application is not installed in the traditional sense. This indicates that it is Vista compatible. System hardening C. Encapsulation Answer: C Explanation: Application virtualization is an umbrella term that describes software technologies that improve portability. 3. the whole operating system is virtualized rather than only specific applications. The scanner worked with Vista before the patch. Answer option D is incorrect. Answer option B is incorrect. Answer option B is incorrect. Answer option C is incorrect.      unpatched is never a good idea. Application virtualization differs from operating system virtualization in that in the latter case. manageability and compatibility of applications by encapsulating them from the underlying operating system on which they are executed? A. The application is fooled at runtime into believing that it is directly interfacing with the original operating system and all the resources are managed by it. manageability and compatibility of applications by encapsulating them from the underlying operating system on which they are executed.

Failover is a term associated with cluster services. Software vendors do not immediately release new products for newer versions of Windows. What should you do? A. Answer: B Explanation: . not 64 bit. If the application services in a cluster-node fail. D. The video card has failed. Answer option D is incorrect. What is the most likely cause? A. Answer options B and A are incorrect. The video card is not recognized by Windows. 4. You will need a 32-bit version of Vista. You can run the 32-bit application on the 64 bit Vista using certain applications. The monitor is not compatible with the video card. You will have to uninstall the upgraded operating system. Answer option A is incorrect. the Cluster Service generally tries to restart them on the same node. Your customer is using Windows Vista and complains about the quality of picture he is getting on his monitor. Use compatibility mode to run the 32-bit application. The video card does not have enough video RAM. It refers to the ability of a server to immediately start servicing the requests if a primary server fails. all computers have been upgraded to Windows Vista 64 bit. B. You find that you cannot adjust the refresh rate or the resolution. C. then it moves the services to another node in the cluster and restarts them on that node. If the services do not start. Recently. However. You are responsible for technical support at a hospital. Answer: C Explanation: You can right-click on a programs icon and go to properties. C. D. 5. This will allow you to run individual programs in 32 bit.      stored and how the command button is resized. There you will find a compatibility mode tab. B. You will need to get the upgraded 64-bit version of the application. you have a particular custom application that runs only in 32 bit.

The SXGA video technology supports a maximum resolution of 1280 x 1024. Answer option A is incorrect. Thin client . resolution. Terminal services B. It is a display standard that refers to video adapters. A UXGA display provides four times more pixels than an 800 x 600 display. Practice exams also include self assessment and reporting features! 5 where 1600 refers to horizontal pixels. there would have been no picture at all on the monitor screen. it gives a set of simplified default settings for refresh rate. Answer option C is incorrect. The QXGA video technology supports a maximum resolution of 2048 x 1536. and 1200 refers to vertical pixels. Which of the following maximum resolutions does the UXGA video technology supports? A. Lack of sufficient video RAM would just prevent certain graphics from being displayed. Answer option D is incorrect. Answer option B is incorrect. If the video card had failed. 1600 x 1200 B. 2560 x 1600 C. As long as the monitor can plug into the card. Answer option D is incorrect. 6. This display standard is capable of displaying the resolution of 1600 x 1200 pixels. 2048 x 1536 Answer: A Explanation: UXGA stands for Ultra eXtended Graphics Array. The WQXGA video technology supports a maximum resolution of 2560 x 1600. 1280 x 1024 D. Which of the following typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet? A. it is compatible. etc. Answer option C is incorrect.      When Windows does not recognize the video card. 7.

Application virtualization is an umbrella term that describes software technologies that improve portability. A thin client is a low-cost computer. mouse and display information are transmitted over the network. Answer option D is incorrect. often legacy desktops. Answer option B is incorrect. E-mail virus Practice exams also include self assessment and reporting features! 6 Answer: B Explanation: . and only the keyboard. 8. When a user runs a program on a Terminal Server. the maintenance tasks are centralized.      C. There is no requirement to install and configure applications on each computer. Hence. as the software are installed and configured in a centralized location on the server. Boot sector B. which is managed transparently by the server operating system. It provides common business applications online that are accessed from a web browser. manageability and compatibility of applications by encapsulating them from the underlying operating system on which they are executed. Terminal Services is a multisession environment that provides remote computers access to Windows-based programs running on a server. Answer option A is incorrect. Trojan horse D. Which of the following virus is a script that attaches itself to a file or template? A. Thin clients run the latest operating systems (Windows 2000 Server and Windows Server 2003) and applications through special software such as the Terminal Services application. the application execution takes place on the server. Each user sees only his individual session. Application Virtualization Answer: C Explanation: Cloud computing typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet. while the software and data are stored on the servers. Macro virus C. Cloud computing D. and is independent of any other client session. with limited resources.

A Trojan horse program can contain viruses. A network administrator often uses a public SSID that is set on the access point. 9. WTLS Answer: B Explanation: SSID stands for Service Set Identifier. When the computer is turned on or restarted. which is used to start the computer. Which of the following is a case sensitive text string used in wireless network and having a maximum length of 32 characters? A. the instructions of the macro or script are executed. and usually replicates itself by automatically mailing itself to many people in the their e-mail address book. WAP B. which is equivalent to wired networks.      A macro virus is a macro or script that attaches itself to a file or template. It provides security. . Configuring the same SSID as that of the other Wireless Access Points (WAPs) of other networks will create a conflict. A boot-sector virus infects the boot record on hard disks and floppy disks. When the file is loaded. SSID C. An infected boot disk may stop the computer from starting up. It has two components. The SSID on computers and the devices in WLAN can be set manually or automatically. but it is not a virus itself. Answer option C is incorrect. Answer option D is incorrect. An e-mail virus moves around in e-mail messages. All wireless devices on a wireless network must have the same SSID in order to communicate with each other. the virus is automatically executed. WEP encrypts data on a wireless network by using a fixed secret key. Answer option A is incorrect. SSIDs are case sensitive text strings and have a maximum length of 32 characters. Answer option C is incorrect. WEP D. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream. It is used to identify a wireless network. Some newer wireless access points have the ability to disable the automatic SSID broadcast feature in order to improve the network security. authentication and encryption. for wireless networks. Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). The access point broadcasts SSID to all wireless devices within its range.

It operates at the network layer of the OSI model. rather than the source/destination or connection between the two. Stateful inspection firewall D. Answer option D is incorrect. WTLS is required because a wireless network does not provide end-to-end security. An Application level firewall operates at the application layer of the OSI model. Circuit-level firewall Answer: B Explanation: The application level firewall inspects the contents of packets. Wireless Transport Layer Security (WTLS) is a security layer of WAP. It provides privacy. The packet filtering firewall filters traffic based on the headers. WTLS ensures that a client and server are authenticated so that wireless transactions remain secure and the connection is encrypted. Application-level firewall C. Answer option C is incorrect. Answer option D is incorrect. 10. The circuit-level firewall regulates traffic based on whether or not a trusted connection has been established. . It operates at the session layer of the OSI model. Packet filtering firewall B. The functionality of WAP is equivalent to that of TCP/IP.      Answer option A is incorrect. which is specifically designed for a wireless environment. Which of the following firewalls inspects the actual contents of packets? A. WAP uses a smaller version of HTML called Wireless Markup Language (WML) to display Internet sites. and authentication for client-server communications over a wireless network. The Wireless Access Protocol (WAP) is a technology used with wireless devices. Answer option A is incorrect. The stateful inspection firewall assures the connection between the two parties is valid and inspects packets from this connection to assure the packets are not malicious. data integrity.