Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Take the Free CCNA 3 Chapter 1 Exam Quiz and Master Enterprise Networking

Dive into our modern enterprise networks quiz - test redundancy design and critical applications support now!

Difficulty: Moderate
2-5mins
Learning OutcomesCheat Sheet
Paper art illustration for enterprise network skills quiz on a dark blue background

Calling all network professionals! Gear up to Ace the Free CCNA 3 Chapter 1 Exam as you dive into our modern enterprise networks quiz designed to challenge your mastery of network redundancy test scenarios, critical applications support quiz items, and to validate your insights in our enterprise network features quiz. Whether you're brushing up with CCNA practice questions or pushing your limits in real-world deployments, you'll sharpen essential skills and uncover knowledge gaps before the big day. Looking for extra prep? Check out our CCNA sample questions and then put your skills into action with this related chapter 1 network+ quiz . Ready, set, let's get started!

What is the primary purpose of redundancy in an enterprise network design?
Increase overall cost
Improve security
Ensure continuous availability
Simplify network management
Redundancy is implemented to provide alternate paths and devices so that failures do not disrupt services, ensuring high availability. It prevents single points of failure by enabling automatic failover. This approach maximizes uptime and business continuity. Cisco High Availability Overview
In the Cisco three-layer hierarchical network model, which layer provides direct connectivity to end devices?
Internet layer
Access layer
Distribution layer
Core layer
The Access layer is responsible for granting end devices like PCs and printers connectivity to the network. It handles port security, QoS marking, and VLAN membership. Access switches operate at this layer to forward traffic into the network hierarchy. Cisco Enterprise Network Design
Which physical topology offers the greatest redundancy by eliminating single points of failure between network nodes?
Mesh
Star
Ring
Bus
A full mesh topology connects every node directly to every other node, eliminating single points of failure. If one link fails, traffic can reroute through alternate paths. While it is expensive, it provides maximum resilience. Mesh Network on Wikipedia
What does VLAN stand for in networking?
Visible LAN
Virtual LAN
Virtual Link Area Network
Verified LAN
VLAN stands for Virtual Local Area Network, which segments a physical network into multiple logical broadcast domains. VLANs improve security and traffic management by isolating groups of users. They operate at Layer 2 of the OSI model. Cisco VLAN Overview
Which device primarily operates at OSI Layer 2?
Firewall
Router
Switch
Hub
Switches forward frames based on MAC addresses, functioning at Layer 2 of the OSI model. They build a MAC table to make forwarding decisions and reduce collisions. Routers, by contrast, operate at Layer 3. Cisco Switch Technology
Which transport protocol provides reliable, connection-oriented communication?
IP
ICMP
TCP
UDP
TCP (Transmission Control Protocol) establishes a connection, uses acknowledgments, and retransmits lost packets for reliability. UDP is connectionless and does not guarantee delivery. TCP is widely used for applications requiring data integrity. RFC 793 - TCP
Which WAN technology is commonly used to interconnect enterprise sites over a VPN on the public Internet?
MPLS
PPP
DHCP
DMVPN
DMVPN (Dynamic Multipoint VPN) leverages multipoint GRE tunnels and NHRP to build dynamic VPN connections over the Internet. It allows spoke-to-spoke communication without routing all traffic through the hub. This approach reduces latency and bandwidth usage. Cisco DMVPN
Which backup type copies all data that has changed since the last full backup?
Mirror backup
Differential backup
Incremental backup
Full backup
A differential backup copies all data changed since the last full backup, growing in size until the next full backup occurs. Incremental backups only copy changes since the last incremental. Differential restores faster than incremental but uses more storage. Differential vs. Incremental Backups
What is the primary purpose of the Spanning Tree Protocol (STP) in enterprise networks?
Encrypt user traffic
Balance routing paths
Prevent Layer 2 loops
Manage VLAN assignments
STP prevents Layer 2 switching loops by blocking redundant paths and ensuring a loop-free topology. It elects a root bridge and selectively disables interfaces. Without STP, broadcast storms can occur in redundant link environments. Cisco STP Whitepaper
Which cloud deployment model provides services over the public Internet to multiple tenants?
Public cloud
Private cloud
Community cloud
Hybrid cloud
Public cloud services are offered over the Internet to multiple customers on shared infrastructure. Providers manage all hardware and software, enabling rapid scaling. Users pay on a subscription or usage basis. AWS Cloud Computing Basics
Which technology separates the control plane from the data plane in a network device?
MPLS
VLAN
SD-WAN
SDN
Software-Defined Networking (SDN) decouples the control plane (decision making) from the data plane (packet forwarding). A central controller programs forwarding devices across the network. This model increases agility and simplifies management. ONF SDN Definition
What is the default HSRP group priority value on Cisco routers?
100
1
255
0
Cisco's default HSRP (Hot Standby Router Protocol) priority is 100. The router with the highest priority becomes the active router. You can adjust priority to influence election. Cisco HSRP Configuration
In network virtualization, what does VRF provide?
VPN over MPLS only
Bandwidth shaping
Layer 2 isolation only
Multiple routing tables per device
VRF (Virtual Routing and Forwarding) allows multiple separate routing tables to coexist on the same network device. Each VRF provides isolated routes, enabling overlapping IP addresses across tenants. This feature supports multi-tenancy without additional hardware. VRF Configuration Guide
Which QoS marking uses a 6-bit field in the IP header for service differentiation?
802.1p
TTL
DSCP
ToS byte
DSCP (Differentiated Services Code Point) uses the first six bits of the IP header's ToS byte to classify and manage network traffic. It enables granular QoS policies across the network. RFC 2474
Which IEEE wireless standard supports speeds up to 1.3 Gbps in the 5 GHz band?
802.11ax
802.11ac
802.11g
802.11n
IEEE 802.11ac Wave 1 supports up to 1.3 Gbps in the 5 GHz band using wider channels and multiple spatial streams. It builds on 802.11n improvements and features beamforming. IEEE 802.11ac Standard
Which protocol is used for secure encrypted CLI access to network devices?
SSH
Telnet
TFTP
FTP
SSH (Secure Shell) provides encrypted communication for CLI access, preventing interception of credentials and data. Telnet sends cleartext, making it insecure. SSH is the standard best practice. RFC 4251
What does RPO stand for in disaster recovery planning?
Recovery Point Objective
Restore Point Objective
Recovery Path Objective
Return to Operation
RPO (Recovery Point Objective) defines the maximum acceptable amount of data loss measured in time. It guides backup frequency to meet business requirements. Lower RPO means more frequent backups. Techopedia RPO Definition
Which IPv6 feature enables devices to automatically configure their own addresses?
NAT66
SLAAC
ARP
DHCPv6
SLAAC (Stateless Address Autoconfiguration) allows IPv6 hosts to generate their own addresses using router advertisements. No DHCP server is needed for address assignment. It simplifies deployment in large networks. RFC 4862
In SDN architecture, which component centrally programs forwarding devices?
Control plane
Application plane
Controller
Data plane
The SDN controller serves as the central intelligence, programming the forwarding rules of data-plane devices via southbound APIs. It separates control logic from hardware. This approach enables network-wide visibility and orchestration. Open Networking Foundation
What does DMVPN stand for?
Direct Multipoint VPN
Dynamic Multicast VPN
Distributed MPLS VPN
Dynamic Multipoint Virtual Private Network
DMVPN stands for Dynamic Multipoint Virtual Private Network, which leverages multipoint GRE and NHRP to create scalable VPNs. Spokes build dynamic tunnels to each other as needed, reducing hub dependency. Cisco DMVPN Solution
What is a primary advantage of OSPF over EIGRP in large multi-vendor environments?
OSPF supports VLSM
OSPF is Cisco proprietary
OSPF uses a composite metric
OSPF is an open standard
OSPF is an open standard routing protocol supported by multiple vendors, making it ideal for heterogeneous environments. EIGRP was proprietary to Cisco before open sourcing limited versions. Standards compliance aids interoperability. OSPF on Wikipedia
Which Cisco solution provides centralized policy enforcement for wireless and wired access?
Cisco UCS Manager
Cisco Prime
Cisco DNA Center
Cisco ISE
Cisco Identity Services Engine (ISE) centralizes authentication, authorization, and accounting policies for both wired and wireless devices. ISE integrates with network access devices to enforce security posture and guest access. Cisco ISE
What capability does Cisco FabricPath add to traditional Ethernet networks?
Multipath at Layer 2
Layer 3 VPN
Encryption in transit
Application-aware routing
Cisco FabricPath applies TRILL-based techniques to Ethernet, enabling Layer 2 multipathing and eliminating Spanning Tree Protocol blocking. It increases bandwidth utilization and provides faster convergence. Cisco FabricPath Whitepaper
In VRF-Lite, which component is used to distinguish between different route tables?
VRF Tag
VPN ID
Route Distinguisher
Route Target
In VRF-Lite, a Route Distinguisher (RD) prefixes routes to create unique entries across multiple routing tables on the same router. It enables overlapping IP addresses without conflict. RDs are typically non - routable values. VRF RD Configuration
Which type of memory on a Cisco router stores the running IOS image used for booting?
RAM
Flash
NVRAM
ROM
Flash memory stores the Cisco IOS image that is loaded into RAM at boot time. NVRAM holds configuration files, and ROM contains bootstrap code. Flash allows upgrades by replacing the IOS image. Cisco Flash Memory Guide
Why does HSRP use a virtual MAC address for the standby group?
To encrypt ARP requests
To hide the real MAC address
To provide a consistent Ethernet address during failover
To support multicast traffic
HSRP uses a virtual MAC address so that hosts always ARP to the same address, ensuring seamless gateway failover. When the active router changes, the virtual MAC moves with it. This preserves ARP entries on hosts. HSRP Virtual MAC Explanation
Which SNMP version introduces strong authentication and encryption?
SNMPv2u
SNMPv1
SNMPv3
SNMPv2c
SNMPv3 provides enhanced security features, including user-based authentication and encryption of messages. It addresses vulnerabilities present in earlier versions. SNMPv3 is recommended for enterprise deployments. RFC 3411
What is the function of Cisco Performance Routing (PfR)?
Encrypted overlay networking
Layer 2 loop prevention
Application-aware dynamic path selection
Physical interface monitoring
Cisco PfR monitors application performance and dynamically reroutes traffic over the best path. It optimizes WAN utilization by selecting paths based on real-time SLA metrics. PfR improves application responsiveness. Cisco PfR Overview
In Cisco ACI architecture, what role does the APIC play?
Spine switch fabric transport
Leaf switch forwarding
Policy controller and management
Edge routing to external networks
The Application Policy Infrastructure Controller (APIC) is the central management and policy controller in Cisco ACI. It programs the fabric, enforces policies, and provides automation. APIC communicates with leaf and spine switches via the OpFlex protocol. Cisco ACI Overview
In a Cisco ACI fabric, which component enforces policies at the network edge where endpoints connect?
Spine switch
Border leaf
Leaf switch
APIC
Leaf switches in ACI enforce endpoint group policies at the edge of the fabric where devices connect. They apply contracts and QoS rules as programmed by the APIC. Spines only forward encapsulated traffic. ACI Fundamentals
Which BGP attribute is typically used to prefer an exit path within the same autonomous system?
AS Path
Local Preference
Community
MED
BGP Local Preference is used within an AS to set path preference. Higher local-preference values are preferred for outbound traffic. It only affects routes within the same autonomous system. RFC 4271
In segment routing over MPLS, how is the path information encoded in packets without using LDP or RSVP-TE?
IPv6 extension headers
BGP-LS labels
IP-in-IP encapsulation
MPLS label stack with segment identifiers
Segment routing encodes the desired path as an ordered list of MPLS labels (segment IDs) in the packet's label stack. No separate signaling protocol like LDP or RSVP-TE is required. This simplifies the control plane. RFC 8402
0
{"name":"What is the primary purpose of redundancy in an enterprise network design?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the primary purpose of redundancy in an enterprise network design?, In the Cisco three-layer hierarchical network model, which layer provides direct connectivity to end devices?, Which physical topology offers the greatest redundancy by eliminating single points of failure between network nodes?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Study Outcomes

  1. Analyze network redundancy topologies -

    Identify and compare common high-availability designs used in enterprise environments to ensure minimal downtime.

  2. Understand critical application support needs -

    Explain how enterprise networks prioritize and optimize traffic for key services like VoIP, video, and data applications.

  3. Apply enterprise network features -

    Configure and troubleshoot VLAN segmentation, EtherChannel, and Spanning Tree Protocol to maintain network stability.

  4. Evaluate high-availability strategies -

    Assess the effectiveness of protocols like HSRP and VRRP in delivering seamless failover in enterprise designs.

  5. Compare modern network designs -

    Distinguish between point-to-point, hub-and-spoke, and mesh topologies to select the best fit for different scenarios.

  6. Prepare for the CCNA 3 Chapter 1 Exam -

    Use targeted practice questions to gauge your readiness and identify areas for further study before the exam.

Cheat Sheet

  1. First Hop Redundancy Protocols (HSRP/VRRP/GLBP) -

    Understand how HSRP, VRRP, and GLBP ensure default”gateway availability by electing active and standby routers, with HSRP's 3 s hello and 10 s hold timers (Cisco Systems). Use the mnemonic "Hot Standby" for HSRP and remember VRRP's 1 s default hello for faster failover (IETF RFC 5798).

  2. Spanning Tree Enhancements (RSTP/PVST+) -

    Review Rapid STP's sub-6 s convergence and how PVST+ runs a separate instance per VLAN to prevent loops (IEEE 802.1w/802.1D). A handy trick is "Every Bridge Blocks Before Forwarding" to recall STP port roles during topology changes.

  3. Link Aggregation with EtherChannel -

    Study how EtherChannel bundles multiple physical links into one logical channel for redundancy and load-balancing, using XOR or LACP hashing algorithms (IEEE 802.3ad). Test configurations with "channel-group [ID] mode active" to enable LACP on Cisco switches.

  4. Quality of Service for Critical Apps -

    Master DiffServ DSCP markings (e.g., EF = 101110 for voice) to prioritize latency-sensitive traffic (ITU-T Recommendation G.1010).Recall the "4 R's of QoS" (Rate, Remark, Reprioritize, Restrain) to design policies that guarantee bandwidth for VoIP and video.

  5. Network Virtualization & Overlay Technologies -

    Explore VRF Lite for multi-tenant isolation and VXLAN overlays with 24-bit segment IDs to scale VLANs beyond 4 K (IETF RFC 7348). Remember "Virtualize to Economize" when mapping overlays to physical underlays in data centers.

Powered by: Quiz Maker