Cisco CCNA 4 Chapter 7 version 6 Exam Answers

  1. 1. Question
    What is an example of an M2M connection in the IoT?
    •  Sensors in a warehouse communicate with each other and send data to a server block in the cloud.
  2. 2. Question
    What is the term for the extension of the existing Internet structure to billions of connected devices?
    •  IoT
  3. 3. Question
    Which statement describes the Cisco IoT System?
    •  It is an infrastructure to manage large scale systems of very different endpoints and platforms.
  4. 4. Question
    Which three network models are described in the fog computing pillar of the Cisco IoT System? (Choose three.)
    •  client/server
    •  fog computing
    •  cloud computing
  5. 5. Question
    Which IoT pillar extends cloud connectivity closer to the network edge?
    •  fog computing pillar
  6. 6. Question
    Which cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines?
    •  operational technology specific security
  7. 7. Question
    Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?
    •  infrastructure as a service (IaaS)
  8. 8. Question
    What technology allows users to access data anywhere and at any time?
    •  Cloud computing
  9. 9. Question
    What statement describes Fog computing?
    CCNA4 v6.0 Chapter 7 Exam 001
    CCNA4 v6.0 Chapter 7 Exam 001
    •  It creates a distributed computing infrastructure that provides services close to the network edge.
  10. 10. Question
    Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?
  11. 11. Question
    Which cloud model provides services for a specific organization or entity?
    •  a private cloud
  12. 12. Question
    How does virtualization help with disaster recovery within a data center?
    •  support of live migration
  13. 13. Question
    What is a difference between the functions of Cloud computing and virtualization?
    •  Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.
  14. 14. Question
    Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)
    •  physical footprint
    •  power and air conditioning
  15. 15. Question
    Which statement describes the concept of cloud computing?
    •  separation of application from hardware
  16. 16. Question
    Which is a characteristic of a Type 2 hypervisor?​
    •  does not require management console software
  17. 17. Question
    Which is a characteristic of a Type 1 hypervisor?​
    •  installed directly on a server​
  18. 18. Question
    How is the control plane modified to operate with network virtualization?
    •  The control plane function is consolidated into a centralized controller.
  19. 19. Question
    Which technology virtualizes the network control plane and moves it to a centralized controller?​
  20. 20. Question
    Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​
    •  Layer 2
    •  Layer 3
  21. 21. Question
    What pre-populates the FIB on Cisco devices that use CEF to process packets?
    •  the routing table
  22. 22. Question
    Which type of hypervisor would most likely be used in a data center?
    •  Type 1
  23. 23. Question
    What component is considered the brains of the ACI architecture and translates application policies​?
    •  the Application Policy Infrastructure Controller
  24. 24. Question
    Fill in the blank.
    In an IoT implementation, devices will be connected to a   converged   network to share the same infrastructure and to facilitate communications, analytics, and management.
  25. 25. Question
    Fill in the blank.
    In a scenario where a user with a laptop running the Mac OS installs a Windows virtual OS instance, the user is implementing a Type     2     hypervisor.

0 commentaires:

Enregistrer un commentaire