Check answers here:
Modules 13 – 14: Emerging Network Technologies Exam Answers
Quiz-summary
0 of 39 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
Information
CCNA 3 v7 Modules 13 – 14: Emerging Network Technologies Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 39 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- Answered
- Review
-
Question 1 of 39
1. Question
1 pointsA company uses a cloud-based payroll system. Which cloud computing technology is this company using?Correct
Incorrect
-
Question 2 of 39
2. Question
1 pointsFor a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?Correct
Incorrect
-
Question 3 of 39
3. Question
1 pointsWhich component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?Correct
Incorrect
-
Question 4 of 39
4. Question
1 pointsWhich network traffic management technology is a basic element in SDN implementations?Correct
Incorrect
-
Question 5 of 39
5. Question
1 pointsWhich type of hypervisor would most likely be used in a data center?Correct
Incorrect
Hint
The two type of hypervisors are Type 1 and Type 2. Type 1 hypervisors are usually used on enterprise servers. Enterprise servers rather than virtualized PCs are more likely to be in a data center. -
Question 6 of 39
6. Question
1 pointsWhich is a characteristic of a Type 1 hypervisor?Correct
Incorrect
Hint
Type 1 hypervisors are installed directly on a server and are known as “bare metal” solutions giving direct access to hardware resources. They also require a management console and are best suited for enterprise environments. -
Question 7 of 39
7. Question
1 pointsWhich two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)Correct
Incorrect
Hint
The SDN control plane uses the Layer 2 ARP table and the Layer 3 routing table to make decisions about forwarding traffic. -
Question 8 of 39
8. Question
1 pointsWhat pre-populates the FIB on Cisco devices that use CEF to process packets?Correct
Incorrect
Hint
CEF uses the FIB and adjacency table to make fast forwarding decisions without control plane processing. The adjacency table is pre-populated by the ARP table and the FIB is pre-populated by the routing table. -
Question 9 of 39
9. Question
1 pointsWhat is a function of the data plane of a network device?Correct
Incorrect
Hint
Networking devices operate in two planes; the data plane and the control plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the CPU. The data plane forwards traffic flows. -
Question 10 of 39
10. Question
1 pointsWhich statement describes the concept of cloud computing?Correct
Incorrect
Hint
Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware. -
Question 11 of 39
11. Question
1 pointsWhich cloud model provides services for a specific organization or entity?Correct
Incorrect
Hint
Private clouds are used to provide services and applications to a specific organization and may be set up within the private network of the organization or managed by an outside organization. -
Question 12 of 39
12. Question
1 pointsWhat two benefits are gained when an organization adopts cloud computing and virtualization? (Choose two.)Correct
Incorrect
Hint
Organizations can use virtualization to consolidate the number of required servers by running many virtual servers on a single physical server. Cloud computing allows organizations to scale their solutions as required and to pay only for the resources they require. -
Question 13 of 39
13. Question
1 pointsWhich type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?Correct
Incorrect
Hint
Type 2 hypervisors, also know as hosted hypervisors, are installed on top of an existing operating system, such as Mac OS, Windows, or Linux. -
Question 14 of 39
14. Question
1 pointsA small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.)Correct
Incorrect
Hint
Cloud computing offers many advantages to the company. Since the cloud data storage and processing facilities are owned by third-parties, the company does not need to be concerned about how it will handle increasing data storage and processing demands with its own data center equipment. The company can easily increase or decrease processing power and storage capacity based on need. Also, cloud services are billed by usage, so the company does not have the costs of supporting its own expensive data center that is not always used to maximum capacity. -
Question 15 of 39
15. Question
1 pointsHow does virtualization help with disaster recovery within a data center?Correct
Incorrect
Hint
Live migration allows moving of one virtual server to another virtual server that could be in a different location that is some distance from the original data center. -
Question 16 of 39
16. Question
1 pointsWhat technology allows users to access data anywhere and at any time?Correct
Incorrect
Hint
Cloud computing allows organizations to eliminate the need for on-site IT equipment, maintenance, and management. Cloud computing allows organizations to expand their services or capabilities while avoiding the increased costs of energy and space. -
Question 17 of 39
17. Question
1 pointsWhich action takes place in the assurance element of the IBN model?Correct
Incorrect
Hint
The assurance element of the IBN model is concerned with end-to-end verification of network-wide behavior. -
Question 18 of 39
18. Question
1 pointsRefer to the exhibit. Which data format is used to represent the data for network automation applications?Correct
Incorrect
Hint
The common data formats that are used in many applications including network automation and programmability are as follows:- JavaScript Object Notation (JSON) – In JSON, the data known as an object is one or more key/value pairs enclosed in braces { }. Keys must be strings within double quotation marks ” “. Keys and values are separated by a colon.
- eXtensible Markup Language (XML) – In XML, the data is enclosed within a related set of tags <tag>data</tag>.
- YAML Ain’t Markup Language (YAML) – In YAML, the data known as an object is one or more key value pairs. Key value pairs are separated by a colon without the use of quotation marks. YAML uses indentation to define its structure, without the use of brackets or commas.
-
Question 19 of 39
19. Question
1 pointsWhat is the function of the key contained in most RESTful APIs?Correct
Incorrect
Hint
Many RESTful APIs, including public APIs, require a key. The key is used to identify the source of the request through authentication. -
Question 20 of 39
20. Question
1 pointsWhich two configuration management tools are developed using Ruby? (Choose two.)Correct
Incorrect
Hint
Chef and Puppet are configuration management tools developed using Ruby. Ansible and SaltStack are configuration management tools developed using Python. Ruby is typically considered a more difficult language to learn than Python. RESTCONF is a network management protocol. -
Question 21 of 39
21. Question
1 pointsWhich term is used to describe a set of instructions for execution by the configuration management tool Puppet?Correct
Incorrect
Hint
The configuration management tool Puppet uses the name Manifest to describe the set of instructions to be executed. -
Question 22 of 39
22. Question
1 pointsWhich term is used to describe a set of instructions for execution by the configuration management tool SaltStack?Correct
Incorrect
Hint
The configuration management tool SaltStack uses the name Pillar to describe the set of instructions to be executed. -
Question 23 of 39
23. Question
1 pointsWhich scenario describes the use of a public API?Correct
Incorrect
Hint
Public, or open, APIs have no restrictions and are available to the public. Some API providers do require a user to obtain a free key or token prior to using the API in order to control the volume of API requests received and processed. -
Question 24 of 39
24. Question
1 pointsWhat is YAML?Correct
Incorrect
Hint
Like JSON, YAML Ain’t Markup Language (YAML) is a data format used by applications to store and transport data. YAML is considered a superset of JSON. -
Question 25 of 39
25. Question
1 pointsWhich RESTFul operation corresponds to the HTTP GET method?Correct
Incorrect
Hint
RESTful operations correspond to the following HTTP methods (shown to the left with the RESTful operation on the right):- POST > Create
- GET > Read
- PUT/PATCH > Update
- DELETE > Delete
-
Question 26 of 39
26. Question
1 pointsWhich technology virtualizes the network control plane and moves it to a centralized controller?Correct
Incorrect
Hint
Networking devices operate in two planes: the data plane and the control plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the CPU. The data plane forwards traffic flows. SDN virtualizes the control plane and moves it to a centralized network controller. -
Question 27 of 39
27. Question
1 pointsWhat are two functions of hypervisors? (Choose two.)Correct
Incorrect
Hint
The hypervisor does not protect the hosting OS from malware. Neither does it allow sharing software across virtual machines. The hard drive of the supporting computer does not need to be partitioned to run virtual machines. The hypervisor creates and manages virtual machines on a host computer and allocates physical system resources to them. -
Question 28 of 39
28. Question
1 pointsWhat is a difference between the functions of Cloud computing and virtualization?Correct
Incorrect
Hint
Cloud computing separates the application from the hardware. Virtualization separates the OS from the underlying hardware. Virtualization is a typical component within cloud computing. Virtualization is also widely used in data centers. Although the implementation of virtualization facilitates an easy server fault tolerance setup, it is not a fault tolerance technology by design. The Internet connection from a data center or service provider needs redundant physical WAN connections to ISPs. -
Question 29 of 39
29. Question
1 pointsHow is the YAML data format structure different from JSON?Correct
Incorrect
Hint
The structure in YAML is defined by indentations rather than brackets and commas. -
Question 30 of 39
30. Question
1 pointsWhat is the most widely used API for web services?Correct
Incorrect
Hint
REST accounts for more than 80% of all API types used for web services, making it the most widely used web service API. -
Question 31 of 39
31. Question
1 pointsWhat is REST?Correct
Incorrect
Hint
REST is not a protocol or service, but rather a style of software architecture for designing web service applications. -
Question 32 of 39
32. Question
1 pointsWhat is a difference between the XML and HTML data formats?Correct
Incorrect
Hint
XML is a human readable data structure used to store, transfer, and read data by applications. Like HTML, XML uses a related set of tags to enclose data. However, unlike HTML, XML uses no predefined tags or document structure. -
Question 33 of 39
33. Question
1 pointsTo avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?Correct
Incorrect
-
Question 34 of 39
34. Question
1 pointsMatch the term to the RESTful API request http://www.mapquestapi.com/directions/v2/route?outFormat=json&key=KEY&from=San+Jose,Ca&to=Monterey,Ca component. (Not all options are used.)Sort elements
- parameters
- API server
- format
- key
- query
- resources
- protocols
-
from3DSan+Jose,Ca&to=DMonterey,Ca
-
http://www.mapquestapi.com
-
outFormat=json
-
key=KEY
-
outFormat=json&key=KEY&from=San+Jose,Ca&to=Monte rey,Ca
-
directions/v2/route
Correct
Incorrect
-
Question 35 of 39
35. Question
1 pointsWhich cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?Correct
Incorrect
Hint
This item is based on information contained in the presentation. Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud. -
Question 36 of 39
36. Question
1 pointsWhat component is considered the brains of the ACI architecture and translates application policies?Correct
Incorrect
Hint
The ACI architecture consists of three core components: the Application Network Profile, the Application Policy Infrastructure Controller, which serves as the brains of the ACI architecture, and the Cisco Nexus 9000 switch. -
Question 37 of 39
37. Question
1 pointsWhich statement describes the concept of cloud computing?Correct
Incorrect
Hint
Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware. -
Question 38 of 39
38. Question
1 pointsIn which situation would a partner API be appropriate?Correct
Incorrect
Hint
Partner API programs incorporate collaboration with other business. They facilitate communication and integration of software between a company and its business partners. -
Question 39 of 39
39. Question
1 pointsBecause of enormous growth in web traffic, a company has planned to purchase additional servers to help handle the web traffic. What service or technology would support this requirement?Correct
Incorrect