Check answers here:
CCNA 1 v7 Practice FINAL Test Online
Quiz-summary
0 of 58 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
Information
Introduction to Networks v7.0 – ITNv7 Practice Final Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 58 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- Answered
- Review
-
Question 1 of 58
1. Question
1 pointsA client packet is received by a server. The packet has a destination port number of 22. What service is the client requesting?Correct
Incorrect
-
Question 2 of 58
2. Question
1 pointsRefer to the exhibit. What does the value of the window size specify?Correct
Incorrect
Hint
The window size determines the number of bytes that can be sent before expecting an acknowledgment. The acknowledgment number is the number of the next expected byte. -
Question 3 of 58
3. Question
1 pointsTo which TCP port group does the port 414 belong?Correct
Incorrect
Hint
Well Known Ports: 0 through 1023. Registered Ports: 1024 through 49151. Dynamic/Private : 49152 through 65535. -
Question 4 of 58
4. Question
1 pointsRefer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?Correct
Incorrect
Hint
In order to enter global configuration mode, the command configure terminal, or a shortened version such as config t, must be entered from privileged EXEC mode. In this scenario the administrator is in user EXEC mode, as indicated by the > symbol after the hostname. The administrator would need to use the enable command to move into privileged EXEC mode before entering the configure terminal command. -
Question 5 of 58
5. Question
1 pointsWhat is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?Correct
Incorrect
Hint
The ping destination command can be used to test connectivity. -
Question 6 of 58
6. Question
1 pointsWhat is a characteristic of a switch virtual interface (SVI)?Correct
Incorrect
Hint
Cisco IOS Layer 2 switches have physical ports for devices to connect. These ports do not support Layer 3 IP addresses. Therefore, switches have one or more switch virtual interfaces (SVIs). These are virtual interfaces because there is no physical hardware on the device associated with it. An SVI is created in software. The virtual interface lets you remotely manage a switch over a network using IPv4 and IPv6. Each switch comes with one SVI appearing in the default configuration “out-of-the-box.” The default SVI is interface VLAN1. -
Question 7 of 58
7. Question
1 pointsMatch the descriptions to the terms. (Not all options are used.)Sort elements
- GUI
- shell
- kernel
- CLI
- Telnet
-
enables the user to interact with the operating system by pointing and clicking
-
the part of the operating system that interfaces with applications and the user
-
the part of the OS that interacts directly with the device hardware
-
users interact with the operating system by typing commands
Correct
Incorrect
Hint
A GUI, or graphical user interface, allows the user to interact with the operating system by pointing and clicking at elements on the screen. A CLI, or command-line interface, requires users to type commands at a prompt in order to interact with the OS. The shell is the part of the operating system that is closest to the user. The kernel is the part of the operating system that interfaces with the hardware. -
Question 8 of 58
8. Question
1 pointsWhat happens when a switch receives a frame and the calculated CRC value is different than the value that is in the FCS field?Correct
Incorrect
Hint
The purpose of the CRC value in the FCS field is to determine if the frame has errors. If the frame does have errors, then the frame is dropped by the switch. -
Question 9 of 58
9. Question
1 pointsTwo network engineers are discussing the methods used to forward frames through a switch. What is an important concept related to the cut-through method of switching?Correct
Incorrect
Hint
Fast-forward switching offers the lowest level of latency and it is the typical cut-through method of switching. Fragment-free switching can be viewed as a compromise between store-and-forward switching and fast-forward switching. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors. -
Question 10 of 58
10. Question
1 pointsWhich two issues can cause both runts and giants in Ethernet networks? (Choose two.)Correct
Incorrect
Hint
Because collisions are a normal aspect of half-duplex communications, runt and giant frames are common by-products of those operations. A malfunctioning NIC can also place frames on the network that are either too short or longer than the maximum allowed length. CRC errors can result from using the wrong type of cable or from electrical interference. Using a cable that is too long can result in late collisions rather than runts and giants. -
Question 11 of 58
11. Question
1 pointsWhich two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.)Correct
Incorrect
Hint
The data link layer is actually divided into two sublayers: + Logical Link Control (LLC): This upper sublayer defines the software processes that provide services to the network layer protocols. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media. + Media Access Control (MAC): This lower sublayer defines the media access processes performed by the hardware. It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use. -
Question 12 of 58
12. Question
1 pointsWhich two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) (Other case)Correct
Incorrect
Hint
The data link layer is actually divided into two sublayers: + Logical Link Control (LLC): This upper sublayer defines the software processes that provide services to the network layer protocols. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media. + Media Access Control (MAC): This lower sublayer defines the media access processes performed by the hardware. It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use. -
Question 13 of 58
13. Question
1 pointsWhich two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) (Other case)Correct
Incorrect
Hint
The data link layer is actually divided into two sublayers: + Logical Link Control (LLC): This upper sublayer defines the software processes that provide services to the network layer protocols. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media. + Media Access Control (MAC): This lower sublayer defines the media access processes performed by the hardware. It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use. -
Question 14 of 58
14. Question
1 pointsWhich two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication? (Choose two.) (Other case)Correct
Incorrect
Hint
The data link layer is actually divided into two sublayers: + Logical Link Control (LLC): This upper sublayer defines the software processes that provide services to the network layer protocols. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to utilize the same network interface and media. + Media Access Control (MAC): This lower sublayer defines the media access processes performed by the hardware. It provides data link layer addressing and delimiting of data according to the physical signaling requirements of the medium and the type of data link layer protocol in use. -
Question 15 of 58
15. Question
1 pointsWhich two commands could be used to check if DNS name resolution is working properly on a Windows PC? (Choose two.)Correct
Incorrect
Hint
The ping command tests the connection between two hosts. When ping uses a host domain name to test the connection, the resolver on the PC will first perform the name resolution to query the DNS server for the IP address of the host. If the ping command is unable to resolve the domain name to an IP address, an error will result. Nslookup is a tool for testing and troubleshooting DNS servers. -
Question 16 of 58
16. Question
1 pointsA small advertising company has a web server that provides critical business service. The company connects to the Internet through a leased line service to an ISP. Which approach best provides cost effective redundancy for the Internet connection?Correct
Incorrect
Hint
With a separate DSL connection to another ISP, the company will have a redundancy solution for the Internet connection, in case the leased line connection fails. The other options provide other aspects of redundancy, but not the Internet connection. The options of adding a second NIC and adding multiple connections between the switches and the edge router will provide redundancy in case one NIC fails or one connection between the switches and the edge router fails. The option of adding another web server provides redundancy if the main web server fails. -
Question 17 of 58
17. Question
1 pointsOnly employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task?Correct
Incorrect
-
Question 18 of 58
18. Question
1 pointsRefer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on the new host?Floor(config)# interface gi0/1 Floor(config-if)# description Connects to the Registrar LAN Floor(config-if)# ip address 192.168.235.234 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface gi0/0 Floor(config-if)# description Connects to the Manager LAN Floor(config-if)# ip address 192.168.234.114 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface s0/0/0 Floor(config-if)# description Connects to the ISP Floor(config-if)# ip address 10.234.235.254 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# interface s0/0/1 Floor(config-if)# description Connects to the Head Office WAN Floor(config-if)# ip address 203.0.113.3 255.255.255.0 Floor(config-if)# no shutdown Floor(config-if)# end
Correct
Incorrect
-
Question 19 of 58
19. Question
1 pointsA router boots and enters setup mode. What is the reason for this?Correct
Incorrect
Hint
The startup configuration file is stored in NVRAM and contains the commands needed to initially configure a router. It also creates the running configuration file that is stored in in RAM. -
Question 20 of 58
20. Question
1 pointsWhat service is provided by POP3?Correct
Incorrect
-
Question 21 of 58
21. Question
1 pointsTwo students are working on a network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?Correct
Incorrect
Hint
In a peer-to-peer (P2P) networking model, data is exchanged between two network devices without the use of a dedicated server. -
Question 22 of 58
22. Question
1 pointsWhich command is used to manually query a DNS server to resolve a specific host name?Correct
Incorrect
Hint
The nslookup command was created to allow a user to manually query a DNS server to resolve a given host name. The ipconfig /displaydns command only displays previously resolved DNS entries. The tracert command was created to examine the path that packets take as they cross a network and can resolve a hostname by automatically querying a DNS server. The net command is used to manage network computers, servers, printers, and network drives. -
Question 23 of 58
23. Question
1 pointsWhich PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model?Correct
Incorrect
Hint
At the transport layer, a host computer will de-encapsulate a segment to reassemble data to an acceptable format by the application layer protocol of the TCP/IP model. -
Question 24 of 58
24. Question
1 pointsWhich two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)Correct
Incorrect
Hint
The OSI transport layer is functionally equivalent to the TCP/IP transport layer, and the OSI network layer is equivalent to the TCP/IP internet layer. The OSI data link and physical layers together are equivalent to the TCP/IP network access layer. The OSI session layer (with the presentation layer) is included within the TCP/IP application layer. -
Question 25 of 58
25. Question
1 pointsWhich three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.)Correct
Incorrect
Hint
The TCP/IP model consists of four layers: application, transport, internet, and network access. The OSI model consists of seven layers: application, presentation, session, transport, network, data link, and physical. The top three layers of the OSI model: application, presentation, and session map to the application layer of the TCP/IP model. -
Question 26 of 58
26. Question
1 pointsNetwork information: * local router LAN interface: 172.19.29.254 / fe80:65ab:dcc1::10 * local router WAN interface: 198.133.219.33 / 2001:db8:FACE:39::10 * remote server: 192.135.250.103 What task might a user be trying to accomplish by using the ping 2001:db8:FACE:39::10 command?Correct
Incorrect
-
Question 27 of 58
27. Question
1 pointsWhich two ICMP messages are used by both IPv4 and IPv6 protocols? (Choose two.)Correct
Incorrect
Hint
The ICMP messages common to both ICMPv4 and ICMPv6 include: host confirmation, destination (net, host, protocol, port) or service unreachable, time exceeded, and route redirection. Router solicitation, neighbor solicitation, and router advertisement are new protocols implemented in ICMPv6. -
Question 28 of 58
28. Question
1 pointsA network technician types the command ping 127.0.0.1 at the command prompt on a computer. What is the technician trying to accomplish?Correct
Incorrect
Hint
127.0.0.1 is an address reserved by TCP/IP to test the NIC, drivers and TCP/IP implementation of the device. -
Question 29 of 58
29. Question
1 pointsAlthough CSMA/CD is still a feature of Ethernet, why is it no longer necessary?Correct
Incorrect
Hint
The use of Layer 2 switches operating in full-duplex mode eliminates collisions, thereby eliminating the need for CSMA/CD. -
Question 30 of 58
30. Question
1 pointsWhat does a router do when it receives a Layer 2 frame over the network medium?Correct
Incorrect
Hint
Routers are responsible for encapsulating a frame with the proper format for the physical network media they connect. At each hop along the path, a router does the following:Accepts a frame from a medium De-encapsulates the frame Determines the best path to forward the packet Re-encapsulates the packet into a new frame Forwards the new frame appropriate to the medium of that segment of the physical network -
Question 31 of 58
31. Question
1 pointsWhich two acronyms represent the data link sublayers that Ethernet relies upon to operate? (Choose two.)Correct
Incorrect
Hint
For Layer 2 functions, Ethernet relies on logical link control (LLC) and MAC sublayers to operate at the data link layer. FCS (Frame Check Sequence) and SFD (Start Frame Delimiter) are fields of the Ethernet frame. CSMA (Carrier Sense Multiple Access) is the technology Ethernet uses to manage shared media access. -
Question 32 of 58
32. Question
1 pointsA network team is comparing topologies for connecting on a shared media. Which physical topology is an example of a hybrid topology for a LAN?Correct
Incorrect
Hint
An extended star topology is an example of a hybrid topology as additional switches are interconnected with other star topologies. A partial mesh topology is a common hybrid WAN topology. The bus and ring are not hybrid topology types. -
Question 33 of 58
33. Question
1 pointsGiven network 172.18.109.0, which subnet mask would be used if 6 host bits were available?Correct
Incorrect
Hint
With an IPv4 network, the subnet mask is determined by the hosts bits that are required: 11 host bits required – 255.255.248.0 10 host bits required – 255.255.252.0 9 host bits required – 255.255.254.0 8 host bits required – 255.255.255.0 7 host bits required – 255.255.255.128 6 host bits required – 255.255.255.192 5 host bits required – 255.255.255.224 4 host bits required – 255.255.255.240 3 host bits required – 255.255.255.248 2 host bits required – 255.255.255.25 -
Question 34 of 58
34. Question
1 pointsWhat type of address is 198.133.219.162?Correct
Incorrect
-
Question 35 of 58
35. Question
1 pointsWhat does the IP address 192.168.1.15/29 represent?Correct
Incorrect
Hint
A broadcast address is the last address of any given network. This address cannot be assigned to a host, and it is used to communicate with all hosts on that network. -
Question 36 of 58
36. Question
1 pointsWhy is NAT not needed in IPv6?Correct
Incorrect
Hint
The large number of public IPv6 addresses eliminates the need for NAT. Sites from the largest enterprises to single households can get public IPv6 network addresses. This avoids some of the NAT-induced application problems that are experienced by applications that require end-to-end connectivity. -
Question 37 of 58
37. Question
1 pointsWhat routing table entry has a next hop address associated with a destination network?Correct
Incorrect
Hint
Routing table entries for remote routes will have a next hop IP address. The next hop IP address is the address of the router interface of the next device to be used to reach the destination network. Directly-connected and local routes have no next hop, because they do not require going through another router to be reached. -
Question 38 of 58
38. Question
1 pointsWhich term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address?Correct
Incorrect
-
Question 39 of 58
39. Question
1 pointsIf the default gateway is configured incorrectly on the host, what is the impact on communications?Correct
Incorrect
Hint
A default gateway is only required to communicate with devices on another network. The absence of a default gateway does not affect connectivity between devices on the same local network. -
Question 40 of 58
40. Question
1 pointsWhich is the compressed format of the IPv6 address fe80:0000:0000:0000:0220:0b3f:f0e0:0029?Correct
Incorrect
-
Question 41 of 58
41. Question
1 pointsRefer to the exhibit. A user issues the command netstat –r on a workstation. Which IPv6 address is one of the link-local addresses of the workstation?Correct
Incorrect
Hint
In the IPv6 address scheme, the network of fe80::/10 is reserved for link-local addresses. The address fe80::/64 is a network address that indicates, in this workstation, fe80::/64 is actually used for link-local addresses. Thus the address fe80::30d0:115:3f57:fe4c/128 is a valid IPv6 link-local address. -
Question 42 of 58
42. Question
1 pointsWhat type of IPv6 address is represented by ::1/128?Correct
Incorrect
-
Question 43 of 58
43. Question
1 pointsWhich statement describes network security?Correct
Incorrect
-
Question 44 of 58
44. Question
1 pointsWhich two devices would be described as intermediary devices? (Choose two.)Correct
Incorrect
-
Question 45 of 58
45. Question
1 pointsWhat characteristic describes spyware?Correct
Incorrect
-
Question 46 of 58
46. Question
1 pointsRefer to the exhibit. The exhibit shows a small switched network and the contents of the MAC address table of the switch. PC1 has sent a frame addressed to PC3. What will the switch do with the frame?Correct
Incorrect
Hint
The MAC address of PC3 is not present in the MAC table of the switch. Because the switch does not know where to send the frame that is addressed to PC3, it will forward the frame to all the switch ports, except for port 4, which is the incoming port. -
Question 47 of 58
47. Question
1 pointsWhich destination address is used in an ARP request frame?Correct
Incorrect
Hint
The purpose of an ARP request is to find the MAC address of the destination host on an Ethernet LAN. The ARP process sends a Layer 2 broadcast to all devices on the Ethernet LAN. The frame contains the IP address of the destination and the broadcast MAC address, FFFF.FFFF.FFFF. The host with the IP address that matches the IP address in the ARP request will reply with a unicast frame that includes the MAC address of the host. Thus the original sending host will obtain the destination IP and MAC address pair to continue the encapsulation process for data transmission. -
Question 48 of 58
48. Question
1 pointsRefer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC3. In this scenario, what will happen next?Correct
Incorrect
Hint
When a network device has to communicate with a device on another network, it broadcasts an ARP request asking for the default gateway MAC address. The default gateway (RT1) unicasts an ARP reply with the Fa0/0 MAC address. -
Question 49 of 58
49. Question
1 pointsA network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent?Correct
Incorrect
Hint
The login block-for 180 attempts 2 within 30 command will cause the device to block authentication after 2 unsuccessful attempts within 30 seconds for a duration of 180 seconds. A device inspecting the traffic on a link has nothing to do with the router. The router configuration cannot prevent unauthorized access to the equipment room. A worm would not attempt to access the router to propagate to another part of the network. -
Question 50 of 58
50. Question
1 pointsWhich statement describes the characteristics of packet-filtering and stateful firewalls as they relate to the OSI model?Correct
Incorrect
Hint
Packet filtering firewalls can always filter Layer 3 content and sometimes TCP and UDP-based content. Stateful firewalls monitor connections and thus have to be able to support up to the session layer of the OSI model. -
Question 51 of 58
51. Question
1 pointsWhat are two ways to protect a computer from malware? (Choose two.)Correct
Incorrect
Hint
At a minimum, a computer should use antivirus software and have all software up to date to defend against malware. -
Question 52 of 58
52. Question
1 pointsThe employees and residents of Ciscoville cannot access the Internet or any remote web-based services. IT workers quickly determine that the city firewall is being flooded with so much traffic that a breakdown of connectivity to the Internet is occurring. Which type of attack is being launched at Ciscoville?Correct
Incorrect
Hint
A DoS (denial of service) attack prevents authorized users from using one or more computing resources. -
Question 53 of 58
53. Question
1 pointsWhich two statements describe the characteristics of fiber-optic cabling? (Choose two.)Correct
Incorrect
Hint
Fiber-optic cabling is primarily used for high-traffic backbone cabling and does not conduct electricity. Multimode fiber uses LEDs for signaling and single-mode fiber uses laser technology. FIber-optic cabling carries signals from only one device to another. -
Question 54 of 58
54. Question
1 pointsWhat OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time?Correct
Incorrect
-
Question 55 of 58
55. Question
1 pointsRefer to the exhibit. What is the maximum possible throughput between the PC and the server?Correct
Incorrect
Hint
The maximum throughput between any two nodes on a network is determined by the slowest link between those nodes. -
Question 56 of 58
56. Question
1 pointsMatch the command with the device mode at which the command is entered. (Not all options are used.)Sort elements
- R1(config-line)#
- R1(config)#
- R1(config-if)#
- R1#
- R1>
- R1(config-router)#
-
login
-
service password-encryption
-
ip address 192.168.4.4 255.255.255.0
-
copy running-config startup-config
-
enable
Correct
Incorrect
Hint
The enable command is entered in R1> mode. The login command is entered in R1(config-line)# mode. The copy running-config startup-config command is entered in R1# mode. The ip address 192.168.4.4 255.255.255.0 command is entered in R1(config-if)# mode. The service password-encryption command is entered in global configuration mode. -
Question 57 of 58
57. Question
1 pointsThree devices are on three different subnets. Match the network address and the broadcast address with each subnet where these devices are located. (Not all options are used.) Device 1: IP address 192.168.10.77/28 on subnet 1 Device 2: IP address192.168.10.17/30 on subnet 2 Device 3: IP address 192.168.10.35/29 on subnet 3Sort elements
- 192.168.10.64
- 192.168.10.79
- 192.168.10.16
- 192.168.10.19
- 192.168.10.32
- 192.168.10.39
- 192.168.10.95
- 192.168.10.47
- 192.168.10.48
- 192.168.10.0
- 192.168.10.255
-
Subnet 1 network number
-
Subnet 1 broadcast address
-
Subnet 2 network number
-
Subnet 2 broadcast address
-
Subnet 3 network number
-
Subnet 3 broadcast address
Correct
Incorrect
Hint
To calculate any of these addresses, write the device IP address in binary. Draw a line showing where the subnet mask 1s end. For example, with Device 1, the final octet (77) is 01001101. The line would be drawn between the 0100 and the 1101 because the subnet mask is /28. Change all the bits to the right of the line to 0s to determine the network number (01000000 or 64). Change all the bits to the right of the line to 1s to determine the broadcast address (01001111 or 79). -
Question 58 of 58
58. Question
1 pointsMatch the description with the media. (Not all options are used.)Sort elements
- industrial or similar environments where there is a lot of interference.
- This type of media provides the most mobility options
- This type of media is used for high transmission speed and can also transfer data over long distances.
- Traditionally used for television but can now be used in a network to connect the customer location to the wiring of the customer premises.
- This type of media is used in wired office environments.
-
STP
-
wireless
-
optical fiber
-
coaxial
Correct
Incorrect
Hint
UTP cables are used in wired office environments. Coaxial cables are used to connect cable modems and televisions. Fiber optics are used for high transmission speeds and to transfer data over long distances. STP cables are used in environments where there is a lot of interference.