CCNA 3, Chapter 1 Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Aira Jocson
A
Aira Jocson
Community Contributor
Quizzes Created: 1 | Total Attempts: 469
Questions: 30 | Attempts: 472

SettingsSettingsSettings
CCNA Quizzes & Trivia

Questions and Answers
  • 1. 

    What are two expected features of modern enterprise networks? (Choose two.)

    • A.

      Support for limited growth

    • B.

      Support for critical applications

    • C.

      Support for distributed administrative control

    • D.

      Support for 90 percent reliability

    • E.

      Support for converged network traffic

    Correct Answer(s)
    B. Support for critical applications
    E. Support for converged network traffic
    Explanation
    Modern enterprise networks are expected to have support for critical applications, as these applications are essential for the smooth functioning of the organization. These applications may include email systems, customer relationship management (CRM) software, and financial systems. Additionally, modern enterprise networks are also expected to support converged network traffic, which means they can handle various types of data traffic such as voice, video, and data on a single network infrastructure. This allows for efficient communication and collaboration within the organization.

    Rate this question:

  • 2. 

    What network design would contain the scope of disruptions on a network should a failure occur?

    • A.

      The installation of only enterprise class equipment throughout the network

    • B.

      The configuration of all access layer devices to share a single gateway

    • C.

      The reduction in the number of redundant devices and connections in the network core

    • D.

      The deployment of distribution later switches in pairs and the division of access layer switch connections between them

    Correct Answer
    D. The deployment of distribution later switches in pairs and the division of access layer switch connections between them
    Explanation
    The deployment of distribution layer switches in pairs and the division of access layer switch connections between them would contain the scope of disruptions on a network should a failure occur. This design ensures redundancy and fault tolerance by having two distribution layer switches that can take over if one fails. By dividing the access layer switch connections between them, the network traffic is distributed and balanced, reducing the impact of a failure on the network.

    Rate this question:

  • 3. 

    Which action should be taken when planning for redundancy on a hierarchical network design?

    • A.

      Immediately replace a non-functioning module, service or device on a network

    • B.

      Continually purchase backup equipment for the network

    • C.

      Implement STP portfast between the switches on the network

    • D.

      Add alternate physical paths for data to traverse the networks

    Correct Answer
    D. Add alternate physical paths for data to traverse the networks
    Explanation
    When planning for redundancy on a hierarchical network design, it is important to add alternate physical paths for data to traverse the networks. This means creating multiple physical connections between devices to ensure that if one path fails, data can still flow through an alternate path. This improves network reliability and minimizes downtime in case of a failure.

    Rate this question:

  • 4. 

    Which design feature will limit the size of a failure domain in an enterprise network?

    • A.

      The use of a collapsed core design

    • B.

      The use of the building switch block approach

    • C.

      The installation of redundant power supplies

    • D.

      The purchase of enterprise equipment that is designed for large traffic volume

    Correct Answer
    B. The use of the building switch block approach
    Explanation
    The use of the building switch block approach will limit the size of a failure domain in an enterprise network. This approach involves dividing the network into smaller blocks or segments, with each block having its own switch. By doing so, any network failure or issue will be confined to that specific block and will not affect the entire network. This helps in isolating and containing failures, minimizing their impact and making troubleshooting and maintenance easier.

    Rate this question:

  • 5. 

    Which devices exist in the failure domain when switch S3 loses power?

    • A.

      PC_3 and AP_2

    • B.

      CCNA2 v6.0 Chapter 1 Exam 002

    • C.

      S4 and PC_2

    • D.

      S1 and S4

    Correct Answer
    A. PC_3 and AP_2
    Explanation
    When switch S3 loses power, the devices that exist in the same failure domain are PC_3 and AP_2. This means that if switch S3 fails, these devices will also be affected and lose connectivity. The other options, S4 and PC_2 or S1 and S4, do not fall within the same failure domain as switch S3.

    Rate this question:

  • 6. 

    What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)

    • A.

      Increased flexibility

    • B.

      Decreased number of critical points of failure

    • C.

      Reduced costs

    • D.

      Increased bandwidth availability

    • E.

      Increased network management options

    Correct Answer(s)
    A. Increased flexibility
    C. Reduced costs
    Explanation
    Extending access layer connectivity to users through a wireless medium provides increased flexibility as it allows users to connect to the network from anywhere within the coverage area without the need for physical cables. This enables mobility and the ability to work from different locations. Additionally, it reduces costs as there is no need for extensive cabling infrastructure and the associated expenses.

    Rate this question:

  • 7. 

    A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which benefit will implementing the Spanning Tree Protocol provide to this design?

    • A.

      Multiple physical interfaces can be combined into a single EtherChannel interface.

    • B.

      Redundant paths can be available without causing logical Layer 2 loops.

    • C.

      Network access can be expanded to support both wired and wireless devices.

    • D.

      Faster convergence is available for advanced routing protocols.

    Correct Answer
    B. Redundant paths can be available without causing logical Layer 2 loops.
    Explanation
    Implementing the Spanning Tree Protocol (STP) in a switched network design will provide the benefit of having redundant paths available without causing logical Layer 2 loops. STP prevents network loops by blocking redundant paths and only allowing one active path at a time. This ensures that there are backup paths available in case of link failures, while also maintaining a loop-free topology to prevent broadcast storms and other issues that can occur with loops.

    Rate this question:

  • 8. 

    Which two features of enterprise class equipment assists an enterprise network in maintaining 99.999 percent up-time? (Choose two.)

    • A.

      Failover capabilities

    • B.

      Redundant power supplies

    • C.

      Failure domains

    • D.

      Services module

    • E.

      Collapsed core

    Correct Answer(s)
    A. Failover capabilities
    B. Redundant power supplies
    Explanation
    Failover capabilities and redundant power supplies are two features of enterprise class equipment that assist in maintaining 99.999 percent up-time. Failover capabilities ensure that if one component or system fails, another one automatically takes over, minimizing downtime. Redundant power supplies provide backup power sources, ensuring uninterrupted operation even if one power supply fails. These features enhance the reliability and availability of the network, reducing the risk of downtime and maximizing up-time.

    Rate this question:

  • 9. 

    What capability is provided by the use of application-specific integrated circuits in Cisco multilayer switches?

    • A.

      Aggregating physical ports into a single logical interface

    • B.

      Providing user authentication and authorization

    • C.

      Protecting data traffic in the event of a failed circuit

    • D.

      Forwarding of IP packets independent of the CPU

    Correct Answer
    A. Aggregating physical ports into a single logical interface
    Explanation
    Application-specific integrated circuits (ASICs) in Cisco multilayer switches provide the capability of aggregating physical ports into a single logical interface. This means that multiple physical ports can be combined and treated as a single entity, allowing for increased bandwidth and improved network efficiency. By consolidating multiple ports into one logical interface, the switch can handle higher volumes of data traffic and provide better performance for network applications. This capability is particularly useful in scenarios where there is a need for high-speed data transfer and efficient utilization of network resources.

    Rate this question:

  • 10. 

    Which statement describes a characteristic of Cisco Meraki switches?

    • A.

      They promote infrastructure scalability, operational continuity, and transport flexibility.

    • B.

      They are cloud-managed access switches that enable virtual stacking of switches.

    • C.

      They are campus LAN switches that perform the same functions as Cisco 2960 switches.

    • D.

      They are service provider switches that aggregate traffic at the edge of the network.

    Correct Answer
    B. They are cloud-managed access switches that enable virtual stacking of switches.
    Explanation
    Cisco Meraki switches are characterized as cloud-managed access switches that enable virtual stacking of switches. This means that these switches can be managed and configured through a cloud-based dashboard, providing ease of management and scalability. Additionally, virtual stacking allows multiple switches to be managed as a single logical unit, simplifying network management and reducing operational complexity.

    Rate this question:

  • 11. 

    In which situation would a network administrator install a Cisco Nexus Series or Cisco Catalyst 6500 Series switch to promote infrastructure scalability?

    • A.

      To enable virtual stacking of switches to provide cloud-managed access

    • B.

      On a service provider network to promote integrated security, and simplified management

    • C.

      On a data center network to provide expansion and transport flexibility

    • D.

      On a campus LAN network as access layer switches

    Correct Answer
    C. On a data center network to provide expansion and transport flexibility
    Explanation
    The Cisco Nexus Series or Cisco Catalyst 6500 Series switch would be installed on a data center network to provide expansion and transport flexibility. These switches are designed to handle high traffic volumes and provide scalability for growing data centers. They offer features such as high port density, high performance, and support for various protocols, allowing for easy expansion and flexibility in network design. Additionally, these switches offer advanced features like virtualization support, modular design, and high availability, making them ideal for data center environments.

    Rate this question:

  • 12. 

    Which statement describes a characteristic of Cisco Catalyst 2960 switches?

    • A.

      They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.

    • B.

      They are best used as distribution layer switches.

    • C.

      They are modular switches.

    • D.

      New Cisco Catalyst 2960-C switches support PoE pass-through.

    Correct Answer
    D. New Cisco Catalyst 2960-C switches support PoE pass-through.
    Explanation
    The given correct answer states that the new Cisco Catalyst 2960-C switches support PoE pass-through. This means that these switches have the capability to transmit power over Ethernet to connected devices, allowing them to receive power without the need for a separate power source. This feature is beneficial in scenarios where power outlets may be limited or difficult to access, as it simplifies the deployment of network devices.

    Rate this question:

  • 13. 

    What are three access layer switch features that are considered when designing a network? (Choose three.)

    • A.

      Failover capability

    • B.

      Broadcast traffic containment

    • C.

      Forwarding rate

    • D.

      Port density

    • E.

      Power over Ethernet

    • F.

      Speed of convergence

    Correct Answer(s)
    C. Forwarding rate
    D. Port density
    E. Power over Ethernet
    Explanation
    When designing a network, three important features to consider for access layer switches are forwarding rate, port density, and Power over Ethernet. Forwarding rate refers to the speed at which the switch can process and forward data packets, ensuring efficient network performance. Port density refers to the number of available ports on the switch, allowing for connectivity to multiple devices. Power over Ethernet (PoE) enables the switch to provide power to connected devices, such as IP phones or wireless access points, eliminating the need for separate power sources. These features are crucial for an effective and scalable network design.

    Rate this question:

  • 14. 

    What are two functions of a router? (Choose two.)

    • A.

      It connects multiple IP networks

    • B.

      It determines the best path to send packets

    • C.

      It controls the flow of data via the use of Layer 2 addresses

    • D.

      It manages the VLAN database

    • E.

      It increases the size of the broadcast domain

    Correct Answer(s)
    A. It connects multiple IP networks
    B. It determines the best path to send packets
    Explanation
    A router is a networking device that connects multiple IP networks by forwarding data packets between them. It examines the destination IP address of each packet and determines the best path or route to send the packet to its destination. This process is known as routing. Therefore, the two functions of a router mentioned in the answer are accurate.

    Rate this question:

  • 15. 

    A network engineer is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN and WAN connections. However, the engineer realizes that the router does not have enough interfaces to support growth and network expansion. Which type of device should be used as a​​ replacement?

    • A.

      A Layer 3 switch

    • B.

      A PoE device

    • C.

      Another fixed configuration router

    • D.

      A modular router

    Correct Answer
    D. A modular router
    Explanation
    A modular router should be used as a replacement because it allows for expansion and growth by providing the ability to add or remove interface modules as needed. This will ensure that the network can accommodate future LAN and WAN connections without the limitation of a fixed number of interfaces.

    Rate this question:

  • 16. 

    When a Cisco IOS device is being selected or upgraded, which option indicates the capabilities of the Cisco IOS device?

    • A.

      Feature set

    • B.

      Release number

    • C.

      Version number

    • D.

      Platform

    Correct Answer
    A. Feature set
    Explanation
    The feature set of a Cisco IOS device indicates the capabilities it possesses. It refers to the specific features and functionalities that are available on the device. The feature set determines the level of support for various protocols, services, and applications. Upgrading or selecting a Cisco IOS device based on its feature set ensures that it meets the specific requirements and needs of the network. The release number, version number, and platform are also important factors to consider, but they do not directly indicate the capabilities of the device like the feature set does.

    Rate this question:

  • 17. 

    Immediately after a router completes its boot sequence, the network administrator wants to check the routers configuration. From privileged EXEC mode, which of the following commands can the administrator use for this purpose? (Choose two.)

    • A.

      Show flash

    • B.

      Show startup-config

    • C.

      Show NVRAM

    • D.

      Show running-config

    • E.

      Show version

    Correct Answer(s)
    B. Show startup-config
    D. Show running-config
    Explanation
    The network administrator can use the "show startup-config" command to check the router's configuration immediately after the boot sequence. This command displays the configuration that is stored in the NVRAM, which is where the startup configuration is saved. Additionally, the administrator can use the "show running-config" command to view the currently running configuration of the router. This command displays the configuration that is currently active in the router's memory.

    Rate this question:

  • 18. 

    Which command was issued on a Cisco switch that resulted in the exhibited output?

    • A.

      CCNA2 v6.0 Chapter 1 Exam 001

    • B.

      Show port-security address

    • C.

      Show mac-address-table

    • D.

      Show vlan brief

    • E.

      Show vlan summary

    Correct Answer
    B. Show port-security address
    Explanation
    The command "show port-security address" was issued on a Cisco switch, which resulted in the exhibited output. This command is used to display the secure MAC addresses and their corresponding interface on the switch. It provides information about the port security configuration on the switch, including the MAC addresses that have been dynamically learned or manually configured on secure ports.

    Rate this question:

  • 19. 

    What is a characteristic of in-band device management?

    • A.

      It uses a terminal emulation client.

    • B.

      It is used for initial configuration or when a network connection is unavailable.

    • C.

      It is used to monitor and make configuration changes to a network device over a network connection.

    • D.

      It uses a direct connection to a console or AUX port.

    Correct Answer
    C. It is used to monitor and make configuration changes to a network device over a network connection.
    Explanation
    In-band device management is a method used to monitor and make configuration changes to a network device over a network connection. This means that the device can be accessed and managed remotely, without the need for a direct physical connection. It allows administrators to monitor the device's performance, troubleshoot issues, and make necessary configuration changes, all through a network connection. This method is convenient and efficient as it eliminates the need for physical access to the device and enables remote management.

    Rate this question:

  • 20. 

    Which two requirements must always be met to use in-band management to configure a network device? (Choose two.)

    • A.

      A direct connection to the console port

    • B.

      A direct connection to the auxiliary port

    • C.

      At least one network interface that is connected and operational

    • D.

      A terminal emulation client

    • E.

      Telnet, SSH, or HTTP access to the device

    Correct Answer(s)
    C. At least one network interface that is connected and operational
    E. Telnet, SSH, or HTTP access to the device
    Explanation
    To use in-band management to configure a network device, two requirements must always be met. First, there should be at least one network interface that is connected and operational. This means that the device must be connected to a network and have a functioning network interface to receive management commands. Second, the device should have Telnet, SSH, or HTTP access enabled. These protocols allow remote access to the device for configuration purposes. Therefore, both these requirements are necessary to use in-band management effectively.

    Rate this question:

  • 21. 

    Which type of information is displayed by the show ip protocols command that is issued from a router command prompt?

    • A.

      The configured routing protocols and the networks that the router is advertising

    • B.

      Interfaces with line (protocol) status and I/O statistics

    • C.

      Interface information, including whether an ACL is enabled on the interface

    • D.

      The routed protocol that is enabled and the protocol status of interfaces

    Correct Answer
    A. The configured routing protocols and the networks that the router is advertising
    Explanation
    The show ip protocols command displays the configured routing protocols and the networks that the router is advertising. This command provides information about the routing protocols that are being used by the router and the networks that are being advertised to other routers. It is useful for troubleshooting and verifying the routing configuration on the router.

    Rate this question:

  • 22. 

    A network technician needs to connect a PC to a Cisco network device for initial configuration. What is required to perform this device configuration?

    • A.

      At least one operational network interface on the Cisco device

    • B.

      Telnet access

    • C.

      HTTP access

    • D.

      Terminal emulation client

    Correct Answer
    B. Telnet access
    Explanation
    To perform the initial configuration of a Cisco network device, the network technician requires Telnet access. Telnet is a protocol that allows remote access to a device's command-line interface (CLI). By using Telnet, the technician can establish a connection between the PC and the Cisco device, enabling them to configure the device's settings and parameters. This access is crucial for setting up the device and ensuring its proper functioning within the network.

    Rate this question:

  • 23. 

    What is the function of ASICs in a multilayer switch?

        • A.

          They provide power to devices such as IP phones and wireless access points through Ethernet ports.

        • B.

          They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.

        • C.

          They prevent Layer 2 loops by disabling redundant links between switches.

        • D.

          They aggregate multiple physical switch ports into a single logical port.

        Correct Answer
        B. They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.
        Explanation
        ASICs (Application-Specific Integrated Circuits) in a multilayer switch are responsible for streamlining the forwarding of IP packets. They achieve this by bypassing the CPU, allowing for faster and more efficient packet forwarding. By offloading this task to the ASICs, the CPU is freed up to perform other essential functions, improving overall network performance. This feature is particularly important in multilayer switches that handle a large volume of network traffic and require fast packet processing capabilities.

        Rate this question:

      • 24. 

        What is the function of PoE pass-through?

          • A.

            Allows switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch

          • B.

            Allows a switch to disable redundant Layer 2 paths in the topology to prevent Layer 2 loops

          • C.

            Allows multiple physical switch ports to be aggregated together and act as a single logical link to increase bandwidth on trunk links

          • D.

            Allows a multilayer switch to forward IP packets at a rate close to that of Layer 2 switching by bypassing the CPU

          Correct Answer
          A. Allows switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch
          Explanation
          PoE pass-through enables switches, phones, and wireless access points to receive power over existing Ethernet cables from an upstream switch. This eliminates the need for separate power cables and simplifies the installation process. By utilizing the existing infrastructure, devices can be powered and connected to the network simultaneously, providing convenience and flexibility.

          Rate this question:

        • 25. 

          What term is used to express the thickness or height of a switch?

          • A.

            Rack unit

          • B.

            Port density

          • C.

            Domain size

          • D.

            Module size

          Correct Answer
          A. Rack unit
          Explanation
          The term "rack unit" is used to express the thickness or height of a switch. A rack unit is a standard measurement for the height of equipment in a server rack. It represents the vertical space occupied by the switch in the rack.

          Rate this question:

        • 26. 

          What are two ways to access a Cisco switch for out-of-band management? (Choose two.)

            • A.

              A connection that uses HTTP

            • B.

              A connection that uses Telnet

            • C.

              A connection that uses the console port

            • D.

              A connection that uses the AUX port

            • E.

              A connection that uses SSH

            Correct Answer(s)
            C. A connection that uses the console port
            D. A connection that uses the AUX port
            Explanation
            Two ways to access a Cisco switch for out-of-band management are through a connection that uses the console port and a connection that uses the AUX port. The console port allows direct access to the switch's command-line interface (CLI) through a serial connection, while the AUX port provides an additional out-of-band management interface for remote connectivity. These two methods are commonly used for initial configuration, troubleshooting, and managing the switch when network connectivity is not available or compromised.

            Rate this question:

          • 27. 

            How can an enterprise network be designed to optimize bandwidth?

            • A.

              By installing devices with failover capabilities

            • B.

              By deploying a collapsed core model

            • C.

              By organizing the network to control traffic patterns

            • D.

              By limiting the size of failure domains

            Correct Answer
            C. By organizing the network to control traffic patterns
            Explanation
            To optimize bandwidth in an enterprise network, the network can be designed by organizing it to control traffic patterns. This involves implementing techniques such as traffic shaping, quality of service (QoS), and prioritizing critical data to ensure that bandwidth is efficiently utilized and allocated. By controlling the flow of network traffic, unnecessary congestion and bottlenecks can be minimized, resulting in improved network performance and optimized bandwidth utilization.

            Rate this question:

          • 28. 

            As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?

            • A.

              Providing redundant links that dynamically block or forward traffic

            • B.

              Grouping multiple physical ports to increase bandwidth between two switches

            • C.

              Providing redundant devices to allow traffic to flow in the event of device failure

            • D.

              Grouping two devices to share a virtual IP address

            Correct Answer
            B. Grouping multiple physical ports to increase bandwidth between two switches
            Explanation
            EtherChannel is a configuration that involves grouping multiple physical ports together to increase the bandwidth between two switches. By combining these ports, the network administrator can effectively create a higher-capacity link between the switches, allowing for increased data transfer rates and improved network performance. This configuration helps to optimize network traffic and improve overall network efficiency.

            Rate this question:

          • 29. 

            In the Cisco Enterprise Architecture, which two functional parts of the network are combined to form a collapsed core design? (Choose two.)

              • A.

                Core layer

              • B.

                Access layer

              • C.

                Enterprise layer

              • D.

                Provider edge

              • E.

                Distribution later

              Correct Answer(s)
              A. Core layer
              E. Distribution later
              Explanation
              In the Cisco Enterprise Architecture, the collapsed core design combines the core layer and the distribution layer. The core layer is responsible for high-speed switching and routing within the network, while the distribution layer provides connectivity between the access layer and the core layer. By combining these two functional parts, the collapsed core design simplifies the network architecture, reduces complexity, and improves scalability and performance.

              Rate this question:

            Quiz Review Timeline +

            Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

            • Current Version
            • Mar 20, 2023
              Quiz Edited by
              ProProfs Editorial Team
            • Jul 16, 2017
              Quiz Created by
              Aira Jocson
            Back to Top Back to top
            Advertisement
            ×

            Wait!
            Here's an interesting quiz for you.

            We have other quizzes matching your interest.