All Posts

Comptia A+ 1001 2023 Questions and answer - Part 43

Mary Mary Smith
03 Mar 2023
2 min
0

1. A space-saving fiber optic connector type MTRJ can be used with which of the following cable types?

A) A. SMF
B) B. MMF
C) C. Neither SMF or MMF
D) D. Both SMF and MMF



2. What happens when a second SATA 3.0 device is added to a SATA cable that already contains a SATA 1.5 device?Answer: SATA 3.0Explanation: A+ 220-1001 Main Domain 3.0 - HardwareSub-Objective: 3.1 - -Explain basic cable types, features, and their purposes.Click here for more info about our A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002Question 13

A) A. Errors occur on faster device.
B) B. Bus speed reduces to 1.5.
C) C. Slower device will not be detected.
D) D. It cannot be added.



3. Which SATA standard supports a maximum transfer rate of 600 MBps?

A) A. SATA 1.0
B) B. SATA 1.5
C) C. SATA 2.0
D) D. SATA 3.0



4. Which one of the following does NOT specify equipment that uses the 2.4-GHz ISM band?

A) A. 802.11
B) B. 802.11a
C) C. 802.11b
D) D. 802.11g



5. A wireless DMZ is located on which network device?

A) A. Firewall
B) B. Switch
C) C. Hub
D) D. Access Point



1. Right Answer: D
Explanation: MTRJ can be used with both SMF and MMF fiber.

2. Right Answer: D
Explanation: SATA specifications and hardware permit only one device on each SATA cable. Multiple cable connections are available on the SATA controller for expansion.

3. Right Answer: D
Explanation: The SATA 3 interface operates at 6 Gbps however the interface supports up to 600 MB/s (Megabytes per second) throughput.

4. Right Answer: B
Explanation: Operation in the UNII bands automatically makes 802.11a devices incompatible with all other devices complying with the other 802.11 series of standards. The reason for this incompatibility is simple: systems using 5-GHz frequencies do not communicate with systems using 2.4 -GHz frequencies.

5. Right Answer: A
Explanation: Another idea in implementing security for wireless LAN segments is to create a wireless demilitarized zone (WDMZ). Depending on the level of implementation, creating WDMZs using firewalls or routers can be costly. WDMZs are generally implemented in medium- and large-scale wireless LAN deployments. Because access points are basically insecure and untrusted devices, they should be separated from other network segments by a firewall device.

0 Comments
Leave a comment