CCNA 3 Chapter 1 Discovery 4.0

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By E2d34christ
E
E2d34christ
Community Contributor
Quizzes Created: 2 | Total Attempts: 484
Questions: 20 | Attempts: 185

SettingsSettingsSettings
CCNA Discovery Quizzes & Trivia

Questions and Answers
  • 1. 

    What can be found at the enterprise edge?

    • A.

      Internet, VPN, and WAN modules

    • B.

      Internet, PSTN, and WAN services

    • C.

      Server farms and network management

    • D.

      Campus infrastructure, including access layer devices

    Correct Answer
    A. Internet, VPN, and WAN modules
    Explanation
    At the enterprise edge, various modules and services can be found to facilitate connectivity and communication. This includes internet, VPN (Virtual Private Network), and WAN (Wide Area Network) modules. These modules allow for secure remote access and communication between different locations within the enterprise network. Additionally, these modules enable connectivity to external networks and services, such as the internet and other WAN connections. Therefore, the presence of internet, VPN, and WAN modules at the enterprise edge is essential for maintaining a robust and secure network infrastructure.

    Rate this question:

  • 2. 

    In which functional area of the Cisco Enterprise Architecture should IDS and IPS be located to detect and prevent services from accessing hosts?

    • A.

      Enterprise Campus

    • B.

      Edge Distribution

    • C.

      Enterprise Edge

    • D.

      Service Provider Edge

    Correct Answer
    C. Enterprise Edge
    Explanation
    IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) should be located in the Enterprise Edge functional area of the Cisco Enterprise Architecture. The Enterprise Edge is responsible for connecting the internal network to external networks, such as the internet. By placing IDS and IPS in the Enterprise Edge, they can monitor and analyze network traffic coming into the organization from external sources. This allows them to detect and prevent any unauthorized access attempts or malicious activities before they reach the internal hosts, ensuring the security of the network.

    Rate this question:

  • 3. 

    A business consultant must use Internet websites to research a report on the e-business strategies of several firms and then electronically deliver the report to a group of clients in cities throughout the world. Which two teleworker tools can the consultant use to accomplish this project? (Choose two.)

    • A.

      VoIP

    • B.

      VPN

    • C.

      HTTP

    • D.

      Telnet

    • E.

      E-mail

    Correct Answer(s)
    C. HTTP
    E. E-mail
    Explanation
    The business consultant can use HTTP and E-mail as teleworker tools to accomplish this project. HTTP (Hypertext Transfer Protocol) allows the consultant to access and research information on Internet websites for the report on e-business strategies. E-mail can be used to electronically deliver the report to clients in different cities around the world.

    Rate this question:

  • 4. 

    Which two measures help ensure that a hardware problem does not cause an outage in an enterprise LAN that supports mission critical services? (Choose two.)

    • A.

      Providing failover capability

    • B.

      Installing redundant power supplies

    • C.

      Purchasing more bandwith from the ISP

    • D.

      Implementing broadcast containment with VLANS

    • E.

      Installing routers that can handle a greater amount of throughput

    Correct Answer(s)
    A. Providing failover capability
    B. Installing redundant power supplies
    Explanation
    Providing failover capability ensures that if there is a hardware problem in one component, the system can automatically switch to a backup component, minimizing or eliminating any downtime or outage. Installing redundant power supplies ensures that if one power supply fails, there is a backup power supply to keep the system running, preventing any interruption in services. Both measures contribute to the overall resilience and reliability of the enterprise LAN, ensuring that mission-critical services are not affected by hardware problems.

    Rate this question:

  • 5. 

    Which task would typically only require services located at the access layer of the hierarchical design model?

    • A.

      Connecting to the corporate web server to update sales figures

    • B.

      Using a VPN from home to send data to the main office servers

    • C.

      Printing a meeting agenda on a local departmental network printer

    • D.

      Placing a VoIP call to a business associate in another country

    • E.

      Responding to an e-mail from a co-worker in another department

    Correct Answer
    C. Printing a meeting agenda on a local departmental network printer
    Explanation
    The task of printing a meeting agenda on a local departmental network printer would typically only require services located at the access layer of the hierarchical design model. This is because printing a document does not involve accessing or sending data to remote servers or networks. The access layer provides connectivity to end devices such as printers, allowing users to directly connect and print documents within their local network.

    Rate this question:

  • 6. 

    How does a VPN work to support remote user productivity?

    • A.

      It uses SSL to encrypt remote user logins to the corporate intranet.

    • B.

      It uses secure Telnet for remote user connections to internal network devices

    • C.

      It creates a virtual circuit that allows real-time communications between any two Internet endpoints.

    • D.

      It uses encapsulation to create a secure tunnel for transmission of data across non-secure networks

    Correct Answer
    D. It uses encapsulation to create a secure tunnel for transmission of data across non-secure networks
    Explanation
    A VPN (Virtual Private Network) works by encapsulating data in a secure tunnel, allowing it to be transmitted across non-secure networks. This encapsulation ensures that the data is protected and cannot be intercepted or accessed by unauthorized users. By creating this secure tunnel, VPNs enable remote users to access the corporate intranet or internal network devices securely, thus supporting their productivity.

    Rate this question:

  • 7. 

    A remote user needs to access a networking device on the internal network of the company. The transactions between the remote user and the device must be secure. Which protocol enables this to happen securely?

    • A.

      HTTP

    • B.

      SSH

    • C.

      Telnet

    • D.

      FTP

    Correct Answer
    B. SSH
    Explanation
    SSH (Secure Shell) is the correct answer because it is a protocol that provides secure remote access to network devices. It encrypts the data transmitted between the remote user and the device, ensuring that it cannot be intercepted or tampered with by unauthorized individuals. Unlike Telnet, FTP, and HTTP, which do not provide encryption, SSH ensures the confidentiality and integrity of the transactions, making it the most suitable protocol for secure access to networking devices.

    Rate this question:

  • 8. 

    What does VoIP provide to telecommuters?

    • A.

      High-quality, live video presentations

    • B.

      Real-time voice communications over the Internet

    • C.

      Ability to share desktop applications simultaneously

    • D.

      Secure, encrypted data transmissions through the internet

    Correct Answer
    B. Real-time voice communications over the Internet
    Explanation
    VoIP, or Voice over Internet Protocol, allows telecommuters to have real-time voice communications over the Internet. This means that telecommuters can make and receive phone calls using an internet connection instead of traditional phone lines. VoIP provides a cost-effective and convenient solution for telecommuters, as it eliminates the need for separate phone lines and allows for flexibility in communication. It also allows for features such as call forwarding, voicemail, and conference calling. Overall, VoIP enhances communication for telecommuters by providing real-time voice communications over the Internet.

    Rate this question:

  • 9. 

    Which functional component of the Cisco Enterprise Architecture is responsible for hosting internal servers?

    • A.

      Enterprise campus

    • B.

      Enterprise edge

    • C.

      Service provider edge

    • D.

      Building distribution

    Correct Answer
    A. Enterprise campus
    Explanation
    The enterprise campus functional component of the Cisco Enterprise Architecture is responsible for hosting internal servers. This component is designed to provide connectivity and services to the users within the organization's campus environment. It includes the necessary infrastructure, such as switches, routers, and access points, to support the internal network and server resources. By hosting internal servers within the enterprise campus, organizations can ensure efficient and secure access to these resources for their employees.

    Rate this question:

  • 10. 

    What is the purpose of the Cisco Enterprise Architecture?

    • A.

      Remove the three-layer hierarchical model and use a flat network approach divide the network into functional components while still maintaining the concept of Core, Distribution, and Access Layers

    • B.

      Provide services and functionality to the core layer by grouping various components into a single component located in the access layer

    • C.

      Reduce overall network traffic by grouping server farms, the management server, corporate intranet, and e-commerce routers in the same layer

    Correct Answer
    A. Remove the three-layer hierarchical model and use a flat network approach divide the network into functional components while still maintaining the concept of Core, Distribution, and Access Layers
    Explanation
    The purpose of the Cisco Enterprise Architecture is to remove the three-layer hierarchical model and use a flat network approach. This means that instead of having separate core, distribution, and access layers, the network is divided into functional components while still maintaining the concept of these layers. This approach allows for a more flexible and scalable network design, as well as easier management and troubleshooting. By removing the hierarchical model, the network can adapt to changing business needs and technological advancements more effectively.

    Rate this question:

  • 11. 

    Which two solutions would an enterprise IT department use to facilitate secure intranet access for remote workers? (Choose two.)

    • A.

      VPN

    • B.

      NAT

    • C.

      User Authentication

    • D.

      Client Firewall Software

    • E.

      Packet sniffing

    Correct Answer(s)
    A. VPN
    C. User Authentication
    Explanation
    An enterprise IT department would use VPN (Virtual Private Network) to provide secure intranet access for remote workers. VPN creates a secure connection over a public network, such as the internet, allowing remote workers to access the intranet securely. User Authentication is another solution that would be used to facilitate secure intranet access. It ensures that only authorized users can access the intranet by requiring them to provide valid credentials, such as a username and password.

    Rate this question:

  • 12. 

    Which statement describes the difference between an enterprise WAN and an enterprise extranet?

    • A.

      An enterprise WAN is designed to interconnect local LANs, while an enterprise extranet is designed to interconnect remote branch offices

    • B.

      An enterprise WAN is designed to interconnect branch offices, while an enterprise extranet is designed to give access to external business partners

    • C.

      An enterprise WAN is designed to provide remote access for its teleworkers, while an enterprise extranet is designed to provide Internet connectivity for the enterprise.

    • D.

      An enterprise WAN is designed to provide Internet connectivity for the enterprise, while an enterprise extranet is designed to provide remote access to the enterprise network for teleworkers.

    Correct Answer
    B. An enterprise WAN is designed to interconnect branch offices, while an enterprise extranet is designed to give access to external business partners
    Explanation
    An enterprise WAN is a network that connects multiple local area networks (LANs) within an organization's branches or offices. It is used to facilitate communication and data sharing between these locations. On the other hand, an enterprise extranet is a network that extends the internal network of an organization to external parties such as business partners, suppliers, or customers. It allows these external entities to access specific resources or services of the organization's network. Therefore, the statement correctly describes the difference between an enterprise WAN and an enterprise extranet.

    Rate this question:

  • 13. 

    Why would a network administrator want to limit the size of failure domains when designing a network?

    • A.

      Reduces the effect of Ethernet collisions

    • B.

      Reduces the impact of a key device or service failure

    • C.

      Reduces the impact of Internet congestion on critical traffic

    • D.

      Reduces the impact of blocking broadcast packets at the edge of the local network

    Correct Answer
    B. Reduces the impact of a key device or service failure
    Explanation
    Limiting the size of failure domains in a network helps to reduce the impact of a key device or service failure. By dividing the network into smaller failure domains, the failure of a single device or service will only affect a smaller portion of the network, minimizing the disruption and allowing other parts of the network to continue functioning normally. This improves overall network reliability and ensures that critical services are not completely interrupted in the event of a failure.

    Rate this question:

  • 14. 

    What is the main purpose of the Access Layer in a hierarchically designed network?

    • A.

      Performs routing and packet manipulation

    • B.

      Supplies redundancy and failover protection

    • C.

      Provides a high-speed, low-latency backbone

    • D.

      Serves as a network connection point for end-user devices

    Correct Answer
    D. Serves as a network connection point for end-user devices
    Explanation
    The main purpose of the Access Layer in a hierarchically designed network is to serve as a network connection point for end-user devices. This layer provides connectivity between end-user devices such as computers, printers, and other network devices, allowing them to access the network resources. It also handles the authentication and security of these devices, ensuring that only authorized users can access the network. Additionally, the Access Layer may include features such as VLANs and QoS to optimize network performance and prioritize traffic.

    Rate this question:

  • 15. 

    Which three functions are performed at the Distribution Layer of the hierarchical network model? (Choose three.)

    • A.

      Forwards traffic that is destined for other networks

    • B.

      Isolates problems to prevent them from affecting the Core Layer

    • C.

      Allows end users to access the local network

    • D.

      Provides a connection point for separate local networks

    • E.

      Transports large amounts of data between different geographic sites

    • F.

      Forwards traffic to other hosts on the same logical network

    Correct Answer(s)
    A. Forwards traffic that is destined for other networks
    B. Isolates problems to prevent them from affecting the Core Layer
    D. Provides a connection point for separate local networks
    Explanation
    At the Distribution Layer of the hierarchical network model, three functions are performed. Firstly, it forwards traffic that is destined for other networks, allowing communication between different networks. Secondly, it isolates problems to prevent them from affecting the Core Layer, ensuring network stability and reliability. Lastly, it provides a connection point for separate local networks, allowing them to connect and communicate with each other.

    Rate this question:

  • 16. 

    What is a benefit of having an extranet?

    • A.

      It provides web-like access to company information for employees only

    • B.

      It limits access to corporate information to secure VPN or remote access connections only

    • C.

      It allows customers and partners to access company information by connecting to a public web server

    • D.

      It allows suppliers and contractors to access confidential internal information using controlled external connections

    Correct Answer
    D. It allows suppliers and contractors to access confidential internal information using controlled external connections
    Explanation
    An extranet is a private network that allows authorized external parties, such as suppliers and contractors, to access confidential internal information. This access is granted through controlled external connections, ensuring that only approved individuals can view the information. This benefit of an extranet enables efficient collaboration and communication between a company and its external partners, enhancing productivity and streamlining business processes.

    Rate this question:

  • 17. 

    What are two important characteristics or functions of devices at the Enterprise Edge? (Choose two.)

    • A.

      Providing Internet, telephone, and WAN services to the enterprise network

    • B.

      Providing a connection point for end-user devices to the enterprise network

    • C.

      Providing high-speed backbone connectivity with redundant connections

    • D.

      Providing intrusion detection and intrusion prevention to protect the network against malicious activity

    • E.

      Providing packet inspection to determine if incoming packets should be allowed on the enterprise network

    Correct Answer(s)
    D. Providing intrusion detection and intrusion prevention to protect the network against malicious activity
    E. Providing packet inspection to determine if incoming packets should be allowed on the enterprise network
    Explanation
    The two important characteristics or functions of devices at the Enterprise Edge are providing intrusion detection and intrusion prevention to protect the network against malicious activity and providing packet inspection to determine if incoming packets should be allowed on the enterprise network. These functions are crucial for ensuring the security and integrity of the network, as they help to identify and prevent any potential threats or unauthorized access. Additionally, packet inspection allows for the filtering and management of incoming packets, ensuring that only valid and authorized traffic is allowed into the network.

    Rate this question:

  • 18. 

    Why is TCP the preferred Layer 4 protocol for transmitting data files?

    • A.

      TCP is more reliable than UDP because it requires lost packets to be retransmitted

    • B.

      TCP requires less processing by the source and destination hosts than UDP

    • C.

      UDP introduces delays that degrade the quality of the data applications

    • D.

      TCP ensures fast delivery because it does not require sequencing or acknowlegements

    Correct Answer
    A. TCP is more reliable than UDP because it requires lost packets to be retransmitted
    Explanation
    TCP is the preferred Layer 4 protocol for transmitting data files because it is more reliable than UDP. TCP ensures reliable delivery of data by requiring lost packets to be retransmitted. This means that if any packets are lost during transmission, TCP will automatically retransmit them, ensuring that all data is received correctly. In contrast, UDP does not have this retransmission mechanism, making it less reliable for transmitting data files.

    Rate this question:

  • 19. 

    The ABC Corporation implements the network for its new headquarters using the Cisco Enterprise Architecture. The network administrator wants to filter the traffic from and to the outside world. Where should the administrator deploy a firewall device?

    • A.

      Server Farm

    • B.

      Enterprise Edge

    • C.

      Enterprise Campus

    • D.

      Service Provider Edge

    Correct Answer
    B. Enterprise Edge
    Explanation
    The network administrator should deploy a firewall device at the Enterprise Edge. The Enterprise Edge is the boundary between the internal network and the outside world. By placing the firewall at this location, the administrator can effectively filter the traffic coming into and going out of the network, ensuring that only authorized and safe traffic is allowed to pass through. This helps to protect the internal network from potential threats and unauthorized access from the outside.

    Rate this question:

  • 20. 

    Which two statements are reasons why UDP is used for voice and video traffic instead of TCP?(Choose two.)

    • A.

      TCP requires all data packets to be delivered for the data to be usable

    • B.

      The acknowledgment process of TCP introduces delays that break the streams of data

    • C.

      UDP does not have mechanisms for retransmitting lost packets

    • D.

      UDP tolerates delays and compensates for them

    • E.

      TCP is a connectionless protocol that provides end-to-end reliability.

    • F.

      UDP is a connection-oriented protocol that provides end-to-end reliability.

    Correct Answer(s)
    B. The acknowledgment process of TCP introduces delays that break the streams of data
    C. UDP does not have mechanisms for retransmitting lost packets
    Explanation
    TCP requires all data packets to be delivered for the data to be usable, which can cause delays and interruptions in real-time applications like voice and video. The acknowledgment process of TCP introduces additional delays, as it waits for the acknowledgment of each packet before sending the next one. On the other hand, UDP does not have mechanisms for retransmitting lost packets, which means that it does not introduce delays in the transmission. This makes UDP more suitable for voice and video traffic, as it can tolerate delays and compensate for them, ensuring a smoother streaming experience.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 22, 2012
    Quiz Created by
    E2d34christ
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.