CCNA 3 Chapter 1 V4.0 Answers

1. Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork, where high availability and redundancy are critical?

access layer

core layer

data-link layer

distribution layer

network layer

physical layer

 

2. Which two characteristics are associated with enterprise level switches? (Choose two.)

low port density

high forwarding rate

high latency level

support link aggregation

predefined number of ports

 

3. Which feature supports higher throughput in switched networks by combining multiple switch ports?

convergence

redundant links

link aggregation

network diameter

 

4. Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?

application

access

distribution

network

core

 

5. What is the likely impact of moving a conventional company architecture to a completely converged network?

Local analog phone service can be completely outsourced to cost-effective providers.

The Ethernet VLAN structure is less complex.

A shared infrastructure is created resulting in a single network to manage.

QoS issues are greatly reduced.

There is less bandwidth competition between voice and video streams.

 

6.

CCNA3Chapter11 thumb CCNA 3 Chapter 1 V4.0 Answers

Refer to the exhibit. Beginning with HR servers and workstations, a network engineer is designing a new security structure for the network. Which set of policies adheres to the hierarchical network model design principles?

Implement Layer 3 switching on S1 to reduce the packet processing load on D1 and D2. Install all security processing on S1 to reduce network traffic load.

Configure port security options on S1. Use Layer 3 access control features on D1 and D2 to limit access to the HR servers to just the HR subnet.

Move all HR assets out of the data center and connect them to S1. Use Layer 3 security functions on S1 to deny all traffic into and out of S1.

Perform all port access and Layer 3 security functions on C1.

 

7. Which three features are commonly supported at the distribution layer of the Cisco hierarchical network model? (Choose three.)

security policies

Power over Ethernet

switch port security

quality of service

Layer 3 functionality

end user access to network

 

8. Configuring communication between devices on different VLANs requires the use of which layer of the OSI model?

Layer 1

Layer 3

Layer 4

Layer 5

 

9. Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision?

Layer 1

Layer 2

Layer 3

Layer 4

 

10. Which two features are supported at all three levels of the Cisco three-layer hierarchical model? (Choose two.)

Power over Ethernet

load balancing across redundant trunk links

redundant components

Quality of Service

link aggregation

 

11. A network technician is asked to examine an existing switched network. Following this examination, the technician makes recommendations for adding new switches where needed and replacing existing equipment that hampers performance. The technician is given a budget and asked to proceed. Which two pieces of information would be helpful in determining necessary port density for new switches? (Choose two.)

forwarding rate

traffic flow analysis

expected future growth

number of required core connections

number of hubs that are needed in the access layer to increase performance

 

12. Which hierarchical design characteristic would be recommended at both the core and distribution layers to protect the network in the case of a route failure?

PoE

redundancy

aggregation

access lists

 

13. At which heirarchical layer are switches normally not required to process all ports at wire speed?

core layer

distribution layer

access layer

entry layer

 

14. For organizations that are implementing a voice over IP solution, what functionality should be enabled at all three layers of the hierarchical network?

Power over Ethernet

quality of service

switch port security

inter-VLAN routing

 

15. A network administrator is selecting a switch that will operate at the network core. Which three features should the switch support for optimum network performance and reliability? (Choose three.)

port security

security policies

10 Gigabit Ethernet

quality of service (QoS)

hot-swappable hardware

Power over Ethernet (PoE)

 

16. Link aggregation should be implemented at which layer of the hierarchical network?

core only

distribution and core

access and distribution

access, distribution, and core

 

17. What statement best describes a modular switch?

a slim-line chassis

allows interconnection of switches on redundant backplane

defined physical characteristics

flexible characteristics

 

18. Which layer of the hierarchical design model provides a means of connecting devices to the network and controlling which devices are allowed to communicate on the network?

application

access

distribution

network

core

 

19. A technician is attempting to explain Cisco StackWise technology to a client that is setting up three stackable switches. Which explanation accurately describes StackWise technology?

StackWise technology allows up to eight ports to be bound together to increase available bandwidth.

StackWise technology allows the switch to deliver power to end devices by using existing Ethernet cabling.

StackWise technology allows the switch capabilities and ports to be expanded by the addition of line cards.

StackWise technology allows up to nine switches to be interconnected via the use of a fully redundant backplane.

 

20.

CCNA3Chapter12 thumb CCNA 3 Chapter 1 V4.0 Answers
Refer to the exhibit. What characteristic of hierarchical network designs is exhibited by having SW3 connected to both SW1 and Sw2?

scalability

security

redundancy

maintainability

ccna 3 final exam, ccna 3 chapter 1, ccna 3 chapter 5 answers, CCNA 1 chapter 3 answers, ccna 3 chapter 1 answers, CCNA 1 Chapter 3, ccna 3 answers, Refer to the exhibit A network administrator has designed and implemented a hierarchical network What is the maximum network diameter between any two hosts on the network?, ccna3 chapter 1, Which layer of the hierarchical network design model is refered to as the high-speed backbone of the internetwork where high availability and redundancy are critical?

25 Responses - Add Yours+

  1. John says:

    hey, nice blog…really like it and added to bookmarks. keep up with good work

  2. jinx says:

    16. Link aggregation should be implemented at which layer of the hierarchical network?

    core only

    distribution and core

    access and distribution <-answer on this blog

    access, distribution, and core

    i think the answer should be 'access, distribution, and core'

  3. Dan says:

    Why the IP addresses are different, but the subnet masks and default gateways are the same?

  4. Rado says:

    16. Link aggregation should be implemented at which layer of the hierarchical network?
    *access, distribution, and core (100%)

  5. Samer Diab says:

    I think that the answer is access and distripution, because aggregation is used mainly in uplink, but the core switch is connected to the service provider, so no need to setup link aggregation because core switch uplink bandiwdth is limitedto the bandwidth of the service provider

    • jehneda says:

      The core layer also needs to support link aggregation to ensure adequate bandwidth coming into the core from the distribution layer switches.(1LAN design 1.2.3.3)

  6. Test says:

    Which layer of the OSI model does an access layer LAN switch use to make a forwarding decision?

    Why layer 2?

    • Mary says:

      access layer doesn’t need layer 3 functionality. A switch natively uses the Layer 2 address to forward packets

  7. greg says:

    16. Link aggregation should be implemented at which layer of the hierarchical network?

    core only

    distribution and core

    access and distribution

    access, distribution, and core —is the right one

  8. harveydent says:

    Link aggregation should be implemented at which layer of the hierarchical network?

    Should be:

    access, distribution, and core

  9. fadli says:

    5. Link aggregation should be implemented at which layer of the hierarchical network?
    core only
    distribution and core
    access and distribution
    *access, distribution, and core

  10. whisker says:

    16. Link aggregation should be implemented at which layer of the hierarchical network?

    core only

    distribution and core

    access and distribution

    *** access, distribution, and core

  11. john says:

    number 16 is wrong it’s distribution, access, and core

  12. ta-ja says:

    Link aggregation should be implemented at which layer of the hierarchical network?

    distribution, access, and core

  13. John says:

    Hi every people.I got a new version 5.0 on CCNA 3 Chapter 1. I post this answer to share with some peoples who need it. Good luck!
    CCNA 3 CHAPTER 1 V5.0 ANSWER
    1-What is a basic function of the Cisco Borderless Architecture distribution layer?
    Aggregate layer 3 routing boundries

    2-ABC, Inc. has about fifty hosts in one LAN. The administrator would like to increase the throughput of that LAN. Which device will increase the number of collision domains and thereby increase the throughput of the LAN?
    Switch

    3-What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?
    has a lower latency appropriate for high-performance computing applications

    4-Match the forwarding characteristic to its type
    cut-through:
    -appropriate for high performance computing applications
    -may forward invalid frames
    -forwarding process can begin after receiving the destination address

    store-and-forward:
    -error checking before forwarding
    -only forwards valid frames
    -forwarding process only begins after receiving the entire frame

    5-What information is added to the switch table from incoming frames?
    source MAC address and incoming port number

    6-A ____ network is one that uses the same infrastructure to carry voice, data, and video signals.
    Converged

    7-A network designer must provide a rationale to a customer for a design which will move an enterprise from a flat network topology to a hierarchical network topology. Which two features of the hierarchical design make it the better choice? (Choose two.)
    a- simpler deployment for additional switch equipment
    b- easier to provide redundant links to ensure higher availability

    8-What are two reasons a network administrator would segment a network with a Layer 2 switch? (Choose two.)
    a- to isolate traffic between segments
    b- to enhance user bandwidth

    9-Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?
    SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.

    10-Which type of transmission does a switch use when the destination MAC address is not contained in the MAC address table?
    Broadcast

    11-What is a basic function of the Cisco Borderless Architecture access layer?
    Provides access to the user

    12-What is a collapsed core in a network design?
    A combination of the functionality of the distribution and core layers

    13-What does the term “port density” represent for an Ethernet switch?
    Number of available ports

    14-There are_____ collision domains in the topology.
    12

    15-What is one function of a Layer 2 switch?
    Determines which interface us used to forward a frame based on the destination MAC address

    16-What are two advantages of modular switches over fixed-configuration switches? (Choose two.)
    a- increased scalability
    b- need for fewer power outlets

    17-There are ____ broadcast domains in the topology
    5

    18-Which switch form factor should be used when large port density, fault tolerance, and low price are important factors?
    Stackable switch

    19-Refer to the exhibit. Consider that the main power has just been restored. PC1 asks the DHCP server for IPv4 addressing. The DHCP server sends it an IPv4 address. While PC2 is still booting up, PC3 issues a broadcast IPv4 DHCP request. To which port will SW1 forward this request?
    To Fa0/1, Fa0/2, and Fa0/3 only

    20-An administrator purchases new Cisco switches that have a feature called StackPower. What is the purpose of this feature?
    It enables the sharing of power among multiple stackable switches.

    21-What tool is important to consider for use when making hardware improvement decisions about switches?
    Traffic Flow analysis

    22-When the installation of a network infrastructure is being planned, which technology will allow power to be provided via Ethernet cabling to a downstream switch and its connected?
    Wireless Aps and VoIP phones or PoE

    23-Match the function to the corresponding switch type
    Layer 2 Switch:
    Typically used in the access layer of a switched network
    Forwards traffic based on information in the Ethernet header
    Multilayer switch:
    Can build a routing table
    Supports a few routing protocols

  14. john says:

    This is a new CCNA 3 Chapter 1 Exam 2013.

    1-Launch PT Hide and Save PT
    Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
    What is the SSID of the connected network and which message is displayed in the browser window?

    SSID: Home-Network
    Message: Well done!​

    SSID: Home-Network
    Message: Good job!

    SSID: Home-Net
    Message:Congratulations! You did it!​

    SSID: Home-Net
    Message:Congratulations! You were able to connect it! *

    2-A administrator wishes to extend the range of the existing IEEE 802.11n network without changing the AP. What can the administrator do to accomplish this?

    Change to WPA2 authentication.

    Deploy a Wi-Fi Range Extender.*

    Split the wireless traffic between the 802.11n 2.4 GHz band and the 5 GHz band.

    Upgrade the firmware on the AP.

    3-Which security mode is the least secure choice when a home wireless router is configured?

    WPA

    WEP*

    WPA2-Personal

    WPA2

    4-Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.)

    RADIUS authentication server

    repeater

    access point*

    WLAN controller

    Ethernet switch*

    5-Which organization certifies vendors for adherence to the 802.11 standards to improve interoperability of 802.11 products?

    IEEE

    FCC

    ITU-R

    Wi-Fi Alliance*

    6-Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did?

    MITM

    SPS

    MIMO*

    WPS

    7-Which type of wireless topology is created when two or more Basic Service Sets are interconnected by Ethernet?

    ESS*

    BSS

    IBISS

    ad hoc WLAN

    WiFi Direct

    8-If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.)

    1*

    3

    5

    6*

    8

    11*

    9-What type of wireless antenna is best suited for providing coverage in large open spaces, such as hallways or large conference rooms?

    Yagi

    omnidirectional*

    directional

    dish

    10-Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.)

    802.11b*

    802.11n*

    802.11ac

    802.11a

    802.11g*

    11-What is the purpose of the Distributed Coordination Function in an IEEE 802.11 WLAN environment?

    It is used to send data over a half-duplex connection.

    It is used in a full-duplex environment to detect collisions.

    It allows a client to detect whether or not a channel is clear prior to transmission.*

    It allows the client to change transmission channels.

    12-An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?

    rogue access point*

    spoofing

    cracking

    denial of service

    13-During which stage of establishing connectivity between a WLAN client and an AP does the client learn the MAC address of the AP?

    encryption

    authentication

    discovery

    association*

    probing

    14-Fill in the blank. Do not use abbreviations.
    Ad hoc wireless topologies sometimes can use a feature called ” tethering ” to enable a smartphone to create a personal hotspot.

    15-What is an advantage of SSID cloaking?​

    It is the best way to secure a wireless network.

    Clients will have to manually identify the SSID to connect to the network.​*

    SSIDs are very difficult to discover because APs do not broadcast them.​

    It provides free Internet access in public locations where knowing the SSID is of no concern.

    16-A student uses a laptop to upload an assignment to a file server. Which wireless frame type did the laptop send to locate and associate with the campus access point?

    data frame

    beacon frame

    management frame*

    control frame

    17-Which type of management frame may regularly be broadcast by an AP?

    authentication

    beacon*

    probe response

    probe request

    18-A company has recently implemented an 802.11n wireless network. Some users are complaining that the wireless network is too slow. Which solution is the best method to enhance the performance of the wireless network?

    Disable DHCP on the access point and assign static addresses to the wireless clients.

    Replace the wireless NICs on the computers that are experiencing slow connections.

    Split the traffic between the 2.4 GHz and 5 GHz frequency bands.*

    Upgrade the firmware on the wireless access point.

    19-For which discovery mode will an AP generate the most traffic on a WLAN?

    open mode

    passive mode*

    active mode

    mixed mode

    20-Which statement defines the control frame operation between two stations?

    After receiving a data frame, the receiving station will send an ACK frame to the sending station if no errors are found.​*

    A station responds to an RTS frame with an ACK frame, thus providing permission for the requesting station to send a data frame.​

    If the sending station does not receive an ACK frame within a predetermined period of time, the sending station will drop the connection.​

    A station sends an RTS frame as the first step in a three-way handshake that is required before sending data frames.

    21-What is a difference between Cisco APs that operate in a home environment and Cisco APs that operate in a corporate environment?

    Some corporate AP models can operate in either autonomous mode or controller-based mode.*

    Controller-based APs are used in the corporate environment, and they are server-dependent devices that require an initial configuration to operate.

    Autonomous APs are used only in the home environment, and they incorporate the functions of a router, switch, and AP into one device.​

    Cisco corporate APs do not support PoE.

    22-Place the options in the following order:
    – not scored –
    MITM
    spoofed disconnct DoS
    CTS flood DoS

    23-Place the options in the following order:
    – not scored –
    Step 2
    Step 5
    Step 1
    Step 3
    – not scored –
    Step 4

Leave a Reply