Check answers here:
Modules 13 – 14: Emerging Network Technologies Exam Answers
Quiz-summary
0 of 49 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
Information
CCNA 3 v7 Modules 13 – 14: Emerging Network Technologies Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 49 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- Answered
- Review
-
Question 1 of 49
1. Question
1 pointsA company uses a cloud-based payroll system. Which cloud computing technology is this company using?Correct
Incorrect
-
Question 2 of 49
2. Question
1 pointsFor a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?Correct
Incorrect
-
Question 3 of 49
3. Question
1 pointsWhich component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?Correct
Incorrect
-
Question 4 of 49
4. Question
1 pointsWhich network traffic management technology is a basic element in SDN implementations?Correct
Incorrect
-
Question 5 of 49
5. Question
1 pointsWhich type of hypervisor would most likely be used in a data center?Correct
Incorrect
Hint
The two type of hypervisors are Type 1 and Type 2. Type 1 hypervisors are usually used on enterprise servers. Enterprise servers rather than virtualized PCs are more likely to be in a data center. -
Question 6 of 49
6. Question
1 pointsWhich is a characteristic of a Type 1 hypervisor?Correct
Incorrect
Hint
Type 1 hypervisors are installed directly on a server and are known as “bare metal” solutions giving direct access to hardware resources. They also require a management console and are best suited for enterprise environments. -
Question 7 of 49
7. Question
1 pointsWhich two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)Correct
Incorrect
Hint
The SDN control plane uses the Layer 2 ARP table and the Layer 3 routing table to make decisions about forwarding traffic. -
Question 8 of 49
8. Question
1 pointsWhat pre-populates the FIB on Cisco devices that use CEF to process packets?Correct
Incorrect
Hint
CEF uses the FIB and adjacency table to make fast forwarding decisions without control plane processing. The adjacency table is pre-populated by the ARP table and the FIB is pre-populated by the routing table. -
Question 9 of 49
9. Question
1 pointsWhat is a function of the data plane of a network device?Correct
Incorrect
Hint
Networking devices operate in two planes; the data plane and the control plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the CPU. The data plane forwards traffic flows. -
Question 10 of 49
10. Question
1 pointsWhich statement describes the concept of cloud computing?Correct
Incorrect
Hint
Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware. -
Question 11 of 49
11. Question
1 pointsWhich cloud model provides services for a specific organization or entity?Correct
Incorrect
Hint
Private clouds are used to provide services and applications to a specific organization and may be set up within the private network of the organization or managed by an outside organization. -
Question 12 of 49
12. Question
1 pointsWhat two benefits are gained when an organization adopts cloud computing and virtualization? (Choose two.)Correct
Incorrect
Hint
Organizations can use virtualization to consolidate the number of required servers by running many virtual servers on a single physical server. Cloud computing allows organizations to scale their solutions as required and to pay only for the resources they require. -
Question 13 of 49
13. Question
1 pointsWhich type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?Correct
Incorrect
Hint
Type 2 hypervisors, also know as hosted hypervisors, are installed on top of an existing operating system, such as Mac OS, Windows, or Linux. -
Question 14 of 49
14. Question
1 pointsA small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.)Correct
Incorrect
Hint
Cloud computing offers many advantages to the company. Since the cloud data storage and processing facilities are owned by third-parties, the company does not need to be concerned about how it will handle increasing data storage and processing demands with its own data center equipment. The company can easily increase or decrease processing power and storage capacity based on need. Also, cloud services are billed by usage, so the company does not have the costs of supporting its own expensive data center that is not always used to maximum capacity. -
Question 15 of 49
15. Question
1 pointsHow does virtualization help with disaster recovery within a data center?Correct
Incorrect
Hint
Live migration allows moving of one virtual server to another virtual server that could be in a different location that is some distance from the original data center. -
Question 16 of 49
16. Question
1 pointsWhat technology allows users to access data anywhere and at any time?Correct
Incorrect
Hint
Cloud computing allows organizations to eliminate the need for on-site IT equipment, maintenance, and management. Cloud computing allows organizations to expand their services or capabilities while avoiding the increased costs of energy and space. -
Question 17 of 49
17. Question
1 pointsWhich action takes place in the assurance element of the IBN model?Correct
Incorrect
Hint
The assurance element of the IBN model is concerned with end-to-end verification of network-wide behavior. -
Question 18 of 49
18. Question
1 pointsRefer to the exhibit. Which data format is used to represent the data for network automation applications?Correct
Incorrect
Hint
The common data formats that are used in many applications including network automation and programmability are as follows:- JavaScript Object Notation (JSON) – In JSON, the data known as an object is one or more key/value pairs enclosed in braces { }. Keys must be strings within double quotation marks ” “. Keys and values are separated by a colon.
- eXtensible Markup Language (XML) – In XML, the data is enclosed within a related set of tags <tag>data</tag>.
- YAML Ain’t Markup Language (YAML) – In YAML, the data known as an object is one or more key value pairs. Key value pairs are separated by a colon without the use of quotation marks. YAML uses indentation to define its structure, without the use of brackets or commas.
-
Question 19 of 49
19. Question
1 pointsWhat is the function of the key contained in most RESTful APIs?Correct
Incorrect
Hint
Many RESTful APIs, including public APIs, require a key. The key is used to identify the source of the request through authentication. -
Question 20 of 49
20. Question
1 pointsWhich two configuration management tools are developed using Ruby? (Choose two.)Correct
Incorrect
Hint
Chef and Puppet are configuration management tools developed using Ruby. Ansible and SaltStack are configuration management tools developed using Python. Ruby is typically considered a more difficult language to learn than Python. RESTCONF is a network management protocol. -
Question 21 of 49
21. Question
1 pointsWhich term is used to describe a set of instructions for execution by the configuration management tool Puppet?Correct
Incorrect
Hint
The configuration management tool Puppet uses the name Manifest to describe the set of instructions to be executed. -
Question 22 of 49
22. Question
1 pointsWhich term is used to describe a set of instructions for execution by the configuration management tool SaltStack?Correct
Incorrect
Hint
The configuration management tool SaltStack uses the name Pillar to describe the set of instructions to be executed. -
Question 23 of 49
23. Question
1 pointsWhich scenario describes the use of a public API?Correct
Incorrect
Hint
Public, or open, APIs have no restrictions and are available to the public. Some API providers do require a user to obtain a free key or token prior to using the API in order to control the volume of API requests received and processed. -
Question 24 of 49
24. Question
1 pointsWhat is YAML?Correct
Incorrect
Hint
Like JSON, YAML Ain’t Markup Language (YAML) is a data format used by applications to store and transport data. YAML is considered a superset of JSON. -
Question 25 of 49
25. Question
1 pointsWhich RESTFul operation corresponds to the HTTP GET method?Correct
Incorrect
Hint
RESTful operations correspond to the following HTTP methods (shown to the left with the RESTful operation on the right):- POST > Create
- GET > Read
- PUT/PATCH > Update
- DELETE > Delete
-
Question 26 of 49
26. Question
1 pointsWhich technology virtualizes the network control plane and moves it to a centralized controller?Correct
Incorrect
Hint
Networking devices operate in two planes: the data plane and the control plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the CPU. The data plane forwards traffic flows. SDN virtualizes the control plane and moves it to a centralized network controller. -
Question 27 of 49
27. Question
1 pointsWhat are two functions of hypervisors? (Choose two.)Correct
Incorrect
Hint
The hypervisor does not protect the hosting OS from malware. Neither does it allow sharing software across virtual machines. The hard drive of the supporting computer does not need to be partitioned to run virtual machines. The hypervisor creates and manages virtual machines on a host computer and allocates physical system resources to them. -
Question 28 of 49
28. Question
1 pointsWhat is a difference between the functions of Cloud computing and virtualization?Correct
Incorrect
Hint
Cloud computing separates the application from the hardware. Virtualization separates the OS from the underlying hardware. Virtualization is a typical component within cloud computing. Virtualization is also widely used in data centers. Although the implementation of virtualization facilitates an easy server fault tolerance setup, it is not a fault tolerance technology by design. The Internet connection from a data center or service provider needs redundant physical WAN connections to ISPs. -
Question 29 of 49
29. Question
1 pointsHow is the YAML data format structure different from JSON?Correct
Incorrect
Hint
The structure in YAML is defined by indentations rather than brackets and commas. -
Question 30 of 49
30. Question
1 pointsWhat is the most widely used API for web services?Correct
Incorrect
Hint
REST accounts for more than 80% of all API types used for web services, making it the most widely used web service API. -
Question 31 of 49
31. Question
1 pointsWhat is REST?Correct
Incorrect
Hint
REST is not a protocol or service, but rather a style of software architecture for designing web service applications. -
Question 32 of 49
32. Question
1 pointsWhat is a difference between the XML and HTML data formats?Correct
Incorrect
Hint
XML is a human readable data structure used to store, transfer, and read data by applications. Like HTML, XML uses a related set of tags to enclose data. However, unlike HTML, XML uses no predefined tags or document structure. -
Question 33 of 49
33. Question
1 pointsTo avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?Correct
Incorrect
-
Question 34 of 49
34. Question
1 pointsMatch the term to the RESTful API request http://www.mapquestapi.com/directions/v2/route?outFormat=json&key=KEY&from=San+Jose,Ca&to=Monterey,Ca component. (Not all options are used.)Sort elements
- parameters
- API server
- format
- key
- query
- resources
- protocols
-
from3DSan+Jose,Ca&to=DMonterey,Ca
-
http://www.mapquestapi.com
-
outFormat=json
-
key=KEY
-
outFormat=json&key=KEY&from=San+Jose,Ca&to=Monte rey,Ca
-
directions/v2/route
Correct
Incorrect
-
Question 35 of 49
35. Question
1 pointsWhich cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?Correct
Incorrect
Hint
This item is based on information contained in the presentation. Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud. -
Question 36 of 49
36. Question
1 pointsWhat component is considered the brains of the ACI architecture and translates application policies?Correct
Incorrect
Hint
The ACI architecture consists of three core components: the Application Network Profile, the Application Policy Infrastructure Controller, which serves as the brains of the ACI architecture, and the Cisco Nexus 9000 switch. -
Question 37 of 49
37. Question
1 pointsWhich statement describes the concept of cloud computing?Correct
Incorrect
Hint
Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware. -
Question 38 of 49
38. Question
1 pointsIn which situation would a partner API be appropriate?Correct
Incorrect
Hint
Partner API programs incorporate collaboration with other business. They facilitate communication and integration of software between a company and its business partners. -
Question 39 of 49
39. Question
1 pointsBecause of enormous growth in web traffic, a company has planned to purchase additional servers to help handle the web traffic. What service or technology would support this requirement?Correct
Incorrect
-
Question 40 of 49
40. Question
1 pointsABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement?Correct
Incorrect
-
Question 41 of 49
41. Question
1 pointsWhat are three components used in the query portion of a typical RESTful API request? (Choose three.)Correct
Incorrect
-
Question 42 of 49
42. Question
1 pointsA company has recently become multinational. Employees are working remotely, in different time zones, and they need access to company services from any place at any time. What service or technology would support this requirement?Correct
Incorrect
-
Question 43 of 49
43. Question
1 pointsFollowing a multicontinent advertising campaign for a new product, a company finds its client database and volume of orders are overloading its on-site computer systems but the company does not have any room to expand. What service or technology would support this requirement?Correct
Incorrect
-
Question 44 of 49
44. Question
1 pointsA network administrator has been tasked with creating a disaster recovery plan. As part of this plan, the administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement?Correct
Incorrect
-
Question 45 of 49
45. Question
1 pointsWhich is a requirement of a site-to-site VPN?Correct
Incorrect
-
Question 46 of 49
46. Question
1 pointsWhich statement describes an important characteristic of a site-to-site VPN?Correct
Incorrect
-
Question 47 of 49
47. Question
1 pointsWhich protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?Correct
Incorrect
-
Question 48 of 49
48. Question
1 pointsIn which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?Correct
Incorrect
-
Question 49 of 49
49. Question
1 pointsWhich statement describes a VPN?Correct
Incorrect