CCNA 4, Chapter 3 Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Leanne
L
Leanne
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,534
Questions: 26 | Attempts: 505

SettingsSettingsSettings
CCNA Quizzes & Trivia

Some people have a hard time understanding chapter 3 in the CCNA program and if you are one no need to worry. The quiz below covers every aspect of chapter 3 and is designed to help you get a better understanding of the chapter while testing what you know so far. Try it out and see where you stand.


Questions and Answers
  • 1. 

    Which broadband wireless technology is based on the 802.11 standard?

    • A.

      Municipal Wi-Fi

    • B.

      WiMAX

    • C.

      CDMA

    • D.

      UMTS

    Correct Answer
    A. Municipal Wi-Fi
    Explanation
    Municipal Wi-Fi is the correct answer because it is a broadband wireless technology that is based on the 802.11 standard. This technology allows cities or municipalities to provide wireless internet access to their residents and visitors in public areas. It uses Wi-Fi technology, which is based on the 802.11 standard, to create a wireless network that covers a specific geographical area. This allows people to connect to the internet using their Wi-Fi enabled devices without the need for wired connections.

    Rate this question:

  • 2. 

    What is the approximate distance limitation for providing a satisfactory ADSL service from the central office to a customer?

    • A.

      3.39 miles or 5.46 kilometers

    • B.

      2.11 miles or 3.39 kilometers

    • C.

      6.21 miles or 10 kilometers

    • D.

      11.18 miles or 18 kilometers

    Correct Answer
    A. 3.39 miles or 5.46 kilometers
    Explanation
    ADSL (Asymmetric Digital Subscriber Line) is a type of broadband internet connection that uses existing telephone lines to provide high-speed internet access. The approximate distance limitation for providing a satisfactory ADSL service from the central office to a customer is 3.39 miles or 5.46 kilometers. Beyond this distance, the signal strength degrades, resulting in slower internet speeds and a less satisfactory user experience.

    Rate this question:

  • 3. 

    What is a component of an ADSL connection that is located at the customer site?

    • A.

      CO

    • B.

      CPE

    • C.

      SOHO

    • D.

      DSLAM

    Correct Answer
    B. CPE
    Explanation
    CPE stands for Customer Premises Equipment and is a component of an ADSL connection that is located at the customer site. It refers to the equipment that is owned and installed by the customer, such as a modem or router, which allows them to connect to the ADSL network and access the internet. The CPE is responsible for converting the digital signals from the customer's devices into analog signals that can be transmitted over the ADSL line, and vice versa.

    Rate this question:

  • 4. 

    What is the function of the DSLAM in a broadband DSL network?

    • A.

      multiplexes individual customer DSL connections into a single upstream link

    • B.

      Communicates directly with customer cable modems to provide Internet services to customers

    • C.

      Communicates directly with customer cable modems to provide Internet services to customers

    • D.

      separates POTS traffic from ADSL traffic

    Correct Answer
    A. multiplexes individual customer DSL connections into a single upstream link
    Explanation
    The function of the DSLAM (Digital Subscriber Line Access Multiplexer) in a broadband DSL network is to multiplex individual customer DSL connections into a single upstream link. This means that the DSLAM combines multiple DSL connections from different customers and combines them into one larger connection that can be sent upstream to the service provider. This allows for efficient use of bandwidth and enables multiple customers to share the same upstream link for internet access.

    Rate this question:

  • 5. 

    Which broadband technology would be best for a small office that requires fast upstream connections?

    • A.

      DSL

    • B.

      Fiber-to-the-home

    • C.

      Cable

    • D.

      WiMax

    Correct Answer
    B. Fiber-to-the-home
    Explanation
    Fiber-to-the-home technology would be the best option for a small office that requires fast upstream connections. Fiber-optic cables provide high-speed and reliable internet connections, making it ideal for businesses that need fast upload speeds. This technology can handle large amounts of data with minimal signal loss, ensuring efficient and smooth data transfer. Additionally, fiber-to-the-home offers symmetrical upload and download speeds, making it suitable for tasks that require fast upstream connections, such as video conferencing, cloud-based services, and file sharing.

    Rate this question:

  • 6. 

    What are two WAN connection enhancements that are achieved by implementing PPPoE? (Choose two.)

    • A.

      Encapsulating Ethernet frames within PPP frames is an efficient use of bandwidth.

    • B.

      DSL CHAP features are included in PPPoE.

    • C.

      PPP enables the ISP to assign an IP address to the customer WAN interface.

    • D.

      An Ethernet link supports a number of data link protocols.

    • E.

      CHAP enables customer authentication and accounting.

    Correct Answer(s)
    C. PPP enables the ISP to assign an IP address to the customer WAN interface.
    E. CHAP enables customer authentication and accounting.
    Explanation
    The correct answer is PPP enables the ISP to assign an IP address to the customer WAN interface and CHAP enables customer authentication and accounting. PPPoE allows for the assignment of IP addresses by the ISP to the customer's WAN interface, which is necessary for the customer to connect to the internet. CHAP, or Challenge Handshake Authentication Protocol, is a security feature that enables customer authentication and accounting, ensuring that only authorized users can access the network.

    Rate this question:

  • 7. 

    When PPPoE is configured on a customer router, which two commands must have the same value for the configuration to work? (Choose two.)

    • A.

      Dialer pool 2

    • B.

      Interface dialer 2

    • C.

      Ppp chap password 2

    • D.

      Interface gigabitethernet 0/2

    • E.

      Pppoe-client dial-pool-number 2

    • F.

      Ppp chap hostname 2

    Correct Answer(s)
    A. Dialer pool 2
    E. Pppoe-client dial-pool-number 2
    Explanation
    The two commands that must have the same value for the configuration to work are "dialer pool 2" and "pppoe-client dial-pool-number 2". These commands specify the same pool number (2) for the dialer interface and the PPPoE client, ensuring that they are using the same pool for establishing the PPPoE connection.

    Rate this question:

  • 8. 

    Why is the MTU for a PPPoE DSL configuration reduced from 1500 bytes to 1492?

    • A.

      To enable CHAP authentication

    • B.

      To reduce congestion on the DSL link

    • C.

      to accommodate the PPPoE headers

    • D.

      to establish a secure tunnel with less overhead

    Correct Answer
    C. to accommodate the PPPoE headers
    Explanation
    The MTU for a PPPoE DSL configuration is reduced from 1500 bytes to 1492 to accommodate the PPPoE headers. PPPoE (Point-to-Point Protocol over Ethernet) adds additional headers to the packets, which reduces the available space for the payload. By reducing the MTU to 1492, it ensures that the entire packet, including the headers, can be transmitted without fragmentation. This allows for efficient communication over the DSL link while still maintaining the necessary PPPoE headers for the protocol.

    Rate this question:

  • 9. 

    What are two characteristics of a PPPoE configuration on a Cisco customer router? (Choose two.)

    • A.

      The PPP configuration is on the dialer interface.

    • B.

      An MTU size of 1492 bytes is configured on the Ethernet interface.

    • C.

      The Ethernet interface does not have an IP address.

    • D.

      The customer router CHAP username and password are independent of what is configured on the ISP router.

    • E.

      The dialer pool command is applied to the Ethernet interface to link it to the dialer interface.

    Correct Answer(s)
    A. The PPP configuration is on the dialer interface.
    C. The Ethernet interface does not have an IP address.
    Explanation
    In a PPPoE configuration on a Cisco customer router, the PPP configuration is on the dialer interface. This means that the dialer interface is responsible for establishing and maintaining the PPP connection with the ISP. Additionally, the Ethernet interface does not have an IP address in a PPPoE configuration. This is because the IP address is assigned to the dialer interface, which acts as the gateway for the Ethernet interface.

    Rate this question:

  • 10. 

    Where is PPPoE configured on a Cisco router?

    • A.

      On an Ethernet interface

    • B.

      On the dialer interface

    • C.

      on a serial interface

    • D.

      on any physical interface

    Correct Answer
    B. On the dialer interface
    Explanation
    PPPoE (Point-to-Point Protocol over Ethernet) is a protocol used to establish a network connection over Ethernet. It is commonly used in DSL connections. In Cisco routers, PPPoE is configured on the dialer interface. The dialer interface is responsible for establishing and terminating the PPPoE connection. Therefore, the correct answer is "on the dialer interface".

    Rate this question:

  • 11. 

    How can the use of VPNs in the workplace contribute to lower operating costs?

    • A.

      High-speed broadband technology can be replaced with leased lines.

    • B.

      VPNs can be used across broadband connections rather than dedicated WAN links.

    • C.

      VPNs prevents connectivity to SOHO users.

    • D.

      VPNs require a subscription from a specific Internet service provider that specializes in secure connections.

    Correct Answer
    B. VPNs can be used across broadband connections rather than dedicated WAN links.
    Explanation
    By using VPNs across broadband connections instead of dedicated WAN links, companies can save on the cost of leasing expensive dedicated lines. VPNs allow employees to securely access the company network over the internet, eliminating the need for costly dedicated connections. This helps lower operating costs for the company.

    Rate this question:

  • 12. 

    How is “tunneling” accomplished in a VPN?

    • A.

      New headers from one or more VPN protocols encapsulate the original packets.

    • B.

      All packets between two hosts are assigned to a single physical medium to ensure that the packets are kept private.

    • C.

      Packets are disguised to look like other types of traffic so that they will be ignored by potential attackers.

    • D.

      A dedicated circuit is established between the source and destination devices for the duration of the connection.

    Correct Answer
    A. New headers from one or more VPN protocols encapsulate the original packets.
    Explanation
    Tunneling in a VPN is accomplished by adding new headers from one or more VPN protocols to encapsulate the original packets. This process allows the packets to be securely transmitted over a public network, such as the internet, while maintaining their privacy and integrity. The new headers provide the necessary information for routing the packets through the VPN tunnel, ensuring that they reach their intended destination.

    Rate this question:

  • 13. 

    Which two statements describe a remote access VPN? (Choose two.)

    • A.

      It connects entire networks to each other.

    • B.

      It requires hosts to send TCP/IP traffic through a VPN gateway.

    • C.

      It is used to connect individual hosts securely to a company network over the Internet.

    • D.

      It may require VPN client software on hosts.

    • E.

      It requires static configuration of the VPN tunnel.

    Correct Answer(s)
    C. It is used to connect individual hosts securely to a company network over the Internet.
    D. It may require VPN client software on hosts.
    Explanation
    A remote access VPN is used to connect individual hosts securely to a company network over the Internet. This allows remote users to access resources on the company network as if they were physically present in the office. It may require VPN client software on hosts, which establishes a secure connection to the VPN gateway. This software encrypts the traffic and ensures the confidentiality and integrity of the data transmitted between the host and the company network.

    Rate this question:

  • 14. 

    Which is a requirement of a site-to-site VPN?

    • A.

      It requires a client/server architecture.

    • B.

      It requires the placement of a VPN server at the edge of the company network.

    • C.

      It requires hosts to use VPN client software to encapsulate traffic.

    • D.

      It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.

    Correct Answer
    D. It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
    Explanation
    A site-to-site VPN requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic. This is because a site-to-site VPN is used to connect two or more networks together over the internet securely. The VPN gateway acts as the entry and exit point for the VPN traffic, ensuring that data is encrypted before it leaves one network and decrypted when it arrives at the other network. This allows for secure communication between the networks, protecting the data from unauthorized access.

    Rate this question:

  • 15. 

    What functionality does mGRE provide to the DMVPN technology?

    • A.

      It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.

    • B.

      It creates a distributed mapping database of public IP addresses for all VPN tunnel spokes.

    • C.

      It provides secure transport of private information over public networks, such as the Internet.

    • D.

      It is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.

    Correct Answer
    A. It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.
    Explanation
    mGRE (Multipoint GRE) provides the functionality of creating dynamically allocated tunnels in a DMVPN (Dynamic Multipoint VPN) network. In this network, there is a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes. This allows for efficient and flexible communication between the hub and spokes, as the tunnels can be created and torn down as needed. This dynamic allocation of tunnels helps in optimizing network resources and simplifies the management of the VPN network.

    Rate this question:

  • 16. 

    Which two scenarios are examples of remote access VPNs? (Choose two.)

    • A.

      A toy manufacturer has a permanent VPN connection to one of its parts suppliers.

    • B.

      All users at a large branch office can access company resources through a single VPN connection.

    • C.

      A mobile sales agent is connecting to the company network via the Internet connection at a hotel.

    • D.

      A small branch office with three employees has a Cisco ASA that is used to create a VPN connection to the HQ.

    • E.

      An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

    Correct Answer(s)
    C. A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
    E. An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.
    Explanation
    The two scenarios that are examples of remote access VPNs are:
    1) A mobile sales agent connecting to the company network via the Internet connection at a hotel. This is considered a remote access VPN because the sales agent is accessing the company network remotely from outside the office using the hotel's Internet connection.
    2) An employee working from home using VPN client software on a laptop to connect to the company network. This is also a remote access VPN as the employee is accessing the company network remotely from their home using VPN client software.

    Rate this question:

  • 17. 

    Refer to the exhibit. What solution can provide a VPN between site A and site B to support encapsulation of any Layer 3 protocol between the internal networks at each site?

    • A.

      A GRE tunnel

    • B.

      An IPsec tunnel

    • C.

      A remote access tunnel

    • D.

      Cisco SSL VPN

    Correct Answer
    A. A GRE tunnel
    Explanation
    A GRE tunnel (Generic Routing Encapsulation) can provide a VPN between site A and site B to support encapsulation of any Layer 3 protocol between the internal networks at each site. GRE tunnels allow the encapsulation of various protocols within IP packets, providing a secure and private connection between the two sites. This allows for the transmission of any Layer 3 protocol, making it a suitable solution for creating a VPN between site A and site B.

    Rate this question:

  • 18. 

    Refer to the exhibit. Which IP address is configured on the physical interface of the CORP router?

    • A.

      10.1.1.1

    • B.

      10.1.1.2

    • C.

      209.165.202.133

    • D.

      209.165.202.134

    Correct Answer
    C. 209.165.202.133
    Explanation
    The IP address configured on the physical interface of the CORP router is 209.165.202.133.

    Rate this question:

  • 19. 

    Which three statements are characteristics of generic routing encapsulation (GRE)? (Choose three.)

    • A.

      GRE encapsulation supports any OSI Layer 3 protocol.

    • B.

      GRE is stateless.

    • C.

      GRE does not have strong security mechanisms.

    • D.

      The GRE header alone adds at least 24 bytes of overhead.

    • E.

      GRE provides flow control by default.

    • F.

      GRE is the most secure tunneling protocol.

    Correct Answer(s)
    A. GRE encapsulation supports any OSI Layer 3 protocol.
    B. GRE is stateless.
    C. GRE does not have strong security mechanisms.
    Explanation
    1. GRE encapsulation supports any OSI Layer 3 protocol: This means that GRE can encapsulate and carry any Layer 3 protocol, making it flexible and versatile.
    2. GRE is stateless: GRE does not keep track of the state or connection information, which means it does not maintain any session information.
    3. GRE does not have strong security mechanisms: GRE does not provide robust security features by itself and may require additional security measures to ensure secure transmission.

    Rate this question:

  • 20. 

    Refer to the exhibit. Which IP address would be configured on the tunnel interface of the destination router?

    • A.

      172.16.1.1

    • B.

      172.16.1.2

    • C.

      209.165.200.225

    • D.

      209.165.200.226

    Correct Answer
    B. 172.16.1.2
    Explanation
    Based on the given information, the IP address that would be configured on the tunnel interface of the destination router is 172.16.1.2.

    Rate this question:

  • 21. 

    Refer to the exhibit. A tunnel was implemented between routers R1 and R2. Which two conclusions can be drawn from the R1 command output? (Choose two.)

    • A.

      This tunnel mode is not the default tunnel interface mode for Cisco IOS software.

    • B.

      This tunnel mode provides encryption.

    • C.

      The data that is sent across this tunnel is not secure.

    • D.

      This tunnel mode does not support IP multicast tunneling.

    • E.

      A GRE tunnel is being used.

    Correct Answer(s)
    C. The data that is sent across this tunnel is not secure.
    E. A GRE tunnel is being used.
    Explanation
    The first conclusion that can be drawn from the R1 command output is that the data sent across this tunnel is not secure. This can be inferred from the fact that the tunnel mode being used is not specified as providing encryption.

    The second conclusion that can be drawn is that a GRE (Generic Routing Encapsulation) tunnel is being used. This can be inferred from the fact that the tunnel mode being used is explicitly mentioned as "Tunnel mode gre ip".

    Therefore, the correct answer is that the data sent across this tunnel is not secure and a GRE tunnel is being used.

    Rate this question:

  • 22. 

    What is used by BGP to determine the best path to a destination?

    • A.

      Cost

    • B.

      Hop count

    • C.

      Attributes

    • D.

      Administrative distance

    Correct Answer
    C. Attributes
    Explanation
    BGP (Border Gateway Protocol) uses attributes to determine the best path to a destination. These attributes include factors such as network policies, routing metrics, and path characteristics. By evaluating these attributes, BGP can make informed decisions about the most efficient and reliable path to reach a particular destination. The cost, hop count, and administrative distance are also important factors in routing protocols, but BGP specifically relies on attributes for path selection.

    Rate this question:

  • 23. 

    What command specifies a BGP neighbor that has an IP address of 5.5.5.5/24 and that is in AS 500?

    • A.

      (config-router)# neighbor 5.5.5.5 remote-as 500

    • B.

      (config-router)# router bgp 500

    • C.

      (config-router)# neighbor 500 remote-as 5.5.5.5

    • D.

      (config-router)# network 5.0.0.0 0.0.0.255

    Correct Answer
    A. (config-router)# neighbor 5.5.5.5 remote-as 500
    Explanation
    The correct answer is "(config-router)# neighbor 5.5.5.5 remote-as 500". This command is used to specify a BGP neighbor with the IP address of 5.5.5.5/24 and in AS 500. It configures the BGP neighbor relationship by specifying the remote AS number as 500 for the neighbor with the IP address of 5.5.5.5.

    Rate this question:

  • 24. 

    True or False?Multiple BGP processes can run on a router.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Multiple BGP processes cannot run on a single router. BGP (Border Gateway Protocol) is a routing protocol that is used to exchange routing information between different autonomous systems (AS). Each BGP process on a router is responsible for handling the routing information of a specific AS. Therefore, a router can only run a single BGP process to handle the routing information for one AS.

    Rate this question:

  • 25. 

    Refer to the exhibit. Which two configurations will allow router R1 to establish a neighbor relationship with router R2? (Choose two.)

    • A.

      R1(config)# router bgp 65001R1(config-router)# network 192.168.20.0

    • B.

      R1(config)# router bgp 65001R1(config-router)# network 192.168.10.0R1(config-router)# neighbor 209.165.200.226 remote-as 65002

    • C.

      R1(config)# router bgp 65002R1(config-router)# network 192.168.20.0R1(config-router)# neighbor 209.165.200.225 remote-as 65001

    • D.

      R2(config)# router bgp 65002R2(config-router)# network 192.168.10.0

    • E.

      R2(config)# router bgp 65002R2(config-router)# network 192.168.10.0R2(config-router)# neighbor 209.165.200.226 remote-as 65002

    • F.

      R2(config)# router bgp 65002R2(config-router)# network 192.168.20.0R2(config-router)# neighbor 209.165.200.225 remote-as 65001

    Correct Answer(s)
    B. R1(config)# router bgp 65001R1(config-router)# network 192.168.10.0R1(config-router)# neighbor 209.165.200.226 remote-as 65002
    F. R2(config)# router bgp 65002R2(config-router)# network 192.168.20.0R2(config-router)# neighbor 209.165.200.225 remote-as 65001
    Explanation
    The first configuration allows router R1 to establish a neighbor relationship with router R2 because it configures BGP on R1 with the AS number 65001, advertises the network 192.168.10.0, and specifies the neighbor 209.165.200.226 with the remote AS number 65002. This matches the BGP configuration on R2, where it advertises the network 192.168.20.0 and specifies the neighbor 209.165.200.225 with the remote AS number 65001. These configurations ensure that both routers are using the same AS numbers and have the correct network advertisements and neighbor configurations to establish a neighbor relationship.

    Rate this question:

  • 26. 

    Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.What is the code displayed on the web page?

    • A.

      Welldone!

    • B.

      BGP is running!

    • C.

      BGP is configured!

    • D.

      Configuration is correct!

    Correct Answer
    B. BGP is running!
    Explanation
    The code displayed on the web page is "BGP is running!" because the message "BGP is running!" is included in the given text.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 23, 2017
    Quiz Created by
    Leanne
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.