CCNA 3 Exploration v4.0 Chapter 1 Quiz Answers

1. Which three options correctly associate a layer of the hierarchical design model with its function? (Choose three.)

  • Core — interface for end devices
  • Distribution — traffic control and security policies
  • Access — interface for end devices
  • Distribution — high-speed backbone
  • Core — high-speed backbone
  • Access — implementation of security policies

Explanation: Access Layer:
The access layer represents the network edge, where traffic enters or exits the campus network. Traditionally, the primary function of an access layer switch is to provide network access to the user. Access layer switches connect to distribution layer switches, which implement network foundation technologies such as routing, quality of service, and security.

Distribution Layer:
The distribution layer interfaces between the access layer and the core layer to provide many important functions, including:
– Aggregating large-scale wiring closet networks
– Aggregating Layer 2 broadcast domains and Layer 3 routing boundaries
– Providing intelligent switching, routing, and network access policy functions to access the rest of the network
– Providing high availability through redundant distribution layer switches to the end-user and equal cost paths to the core
– Providing differentiated services to various classes of service applications at the edge of the network

Core Layer:
The core layer is the network backbone. It connects several layers of the campus network. The core layer serves as the aggregator for all of the other campus blocks and ties the campus together with the rest of the network. The primary purpose of the core layer is to provide fault isolation and high-speed backbone connectivity.

2. With respect to network design, what is convergence?

  • implementation of standard equipment sets for LAN design
  • implementation of a core-distribution-access design model for all sites in an enterprise
  • a point in the network where all traffic “converges” before transmission to the destination, normally the core switch
  • combining conventional data with voice and video on a common network

3. Drag the potential benefits of a converged network on the left to the right column.

CCNA 3 Exploration v4.0 Chapter 1 Quiz Answers 1


CCNA 3 Exploration v4.0 Chapter 1 Quiz Answers 2

4. Drag the analysis actions on the left to the correct analysis type in the right column.

CCNA 3 Exploration v4.0 Chapter 1 Quiz Answers 3


CCNA 3 Exploration v4.0 Chapter 1 Quiz Answers 4

5. What factor may complicate user communities analysis?

  • application changes may radically affect predicted data growth
  • server to server traffic may skew user port usage data
  • application usage is not always bound by department, or physical location
  • different organization applications may share data stores

6. Drag the term on the left to the associated definition on the right.

CCNA 3 Exploration v4.0 Chapter 1 Quiz Answers 5

7. What would be the port capacity of a single port on a 48-port Gigabit Ethernet switch?

  • 48 Gbps
  • 10 Mbps
  • 1000 Mbps
  • 100 Mbps

8. A switch that uses MAC addresses to forward frames operates at which layer of the OSI model?

  • Layer 1
  • Layer 2
  • Layer 3
  • Layer 4

Explanation: MAC addresses are associated with Ethernet frames and are also known as a Layer 2 address.

9. What is a feature offered by all stackable switches?

  • predetermined number of ports
  • fully redundant backplane
  • support for Gigabit connectivity
  • low bandwidth for inter-switch communications
  • PoE capability

10. What function is performed by a Cisco access level switch?

  • inter-VLAN support
  • routing
  • providing PoE
  • link aggregation

11. Drag the features listed on the left to the Cisco layer to which they are associated.

CCNA 3 Exploration v4.0 Chapter 1 Quiz Answers 6


CCNA 3 Exploration v4.0 Chapter 1 Quiz Answers 7

12. Which two characteristics describe the core layer of the hierarchical network design model? (Choose two.)

  • redundant paths
  • high-level policy enforcement
  • PoE
  • controls access of end devices to network
  • rapid forwarding of traffic
Notify of

Inline Feedbacks
View all comments