CCNA 4 Chapter 7 V6.0 Answers

1. Fill in the blank.

In an IoT implementation, devices will be connected to a _converged _ network to share the same infrastructure and to facilitate communications, analytics, and management.

 

2. The exhibit is not required to answer the question. The exhibit shows a fog covering trees on the side of a mountain.What statement describes Fog computing?

What statement describes Fog computing

It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center.

It creates a distributed computing infrastructure that provides services close to the network edge.

It requires Cloud computing services to support non-IP enabled sensors and controllers.

It supports larger networks than Cloud computing does.

 

3. How does virtualization help with disaster recovery within a data center?

Supply of consistent air flow

improvement of business practices

guarantee of power

support of live migration

 

4. What technology allows users to access data anywhere and at any time?

Cloud computing

micromarketing

virtualization

data analytics

 

5. What component is considered the brains of the ACI architecture and translates application policies?

The hypervisor

the Application Network Profile endpoints

the Nexus 9000 switch

the Application Policy Infrastructure Controller

 

6. What pre-populates the FIB on Cisco devices that use CEF to process packets?

The DSP

the adjacency table

the ARP table

the routing table

 

7. Which IoT pillar extends cloud connectivity closer to the network edge?

network connectivity pillar

fog computing pillar

application enablement platform pillar

management and automation pillar

 

8. Fill in the blank.

In a scenario where a user with a laptop running the Mac OS installs a Windows virtual OS instance, the user is implementing a Type 2 hypervisor.

 

9. Which cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines?

cloud computing security

IoT physical security

operational technology specific security

IoT network security

 

10. Which type of hypervisor would most likely be used in a data center?

Type 2

Hadoop

Nexus

Type 1

 

11. Which cloud model provides services for a specific organization or entity?

a private cloud

a community cloud

a public cloud

a hybrid cloud

 

12. Which three network models are described in the fog computing pillar of the Cisco IoT System? (Choose three.)

peer-to-peer

cloud computing

client/server

P2P

fog computing

enterprise WAN

 

13. How is the control plane modified to operate with network virtualization?

A hypervisor is installed in each device to allow multiple instances of the control plane.

The control plane function is consolidated into a centralized controller.

Control plane redundancy is added to each network device.

The control plane on each device is interconnected to a dedicated high-speed network.

 

14. Which statement describes the concept of cloud computing?

separation of management plane from control plane

separation of operating system from hardware

separation of application from hardware

separation of control plane from data plane

 

15. Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)

server hardware needs

operating system license requirements

physical footprint

virus and spyware attacks

power and air conditioning

 

16. Which is a characteristic of a Type 2 hypervisor?

does not require management console software

has direct access to server hardware resources

installs directly on hardware

best suited for enterprise environments

 

17. What is an example of an M2M connection in the IoT?

Sensors in a warehouse communicate with each other and send data to a server block in the cloud.

A user sends an email over the Internet to a friend.

An automated alarm system in a campus sends fire alarm messages to all students and staff.

Redundant servers communicate with each other to determine which server should be active or standby.

 

18. What is the term for the extension of the existing Internet structure to billions of connected devices?

IoT

SCADA

digitization

M2M

 

19. What is a difference between the functions of Cloud computing and virtualization?

Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology.

Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections.

Cloud computing utilizes data center technology whereas virtualization is not used in data centers.

Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

 

20. Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)

Layer 4

Layer 1

Layer 5

Layer 3

Layer 2

 

21. Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?

SaaS

PaaS

ItaaS

IaaS

 

22. Which statement describes the Cisco IoT System?

It is an advanced routing protocol for cloud computing.

It is a router operating system combining IOS and Linux for fog computing.

It is a switch operating system to integrate many Layer 2 security features.

It is an infrastructure to manage large scale systems of very different endpoints and platforms.

 

23. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

wireless as a service (WaaS)

browser as a service (BaaS)

infrastructure as a service (IaaS)

software as a service (SaaS)

 

24. Which is a characteristic of a Type 1 hypervisor?

installed on an existing operating system

does not require management console software

installed directly on a server

best suited for consumers and not for an enterprise environment

 

25. Which technology virtualizes the network control plane and moves it to a centralized controller?

cloud computing

IaaS

SDN

fog computing

Leave a Reply