CCNA4 - Chapter 7
2
Fill in the blank. In a scenario where a user with a laptop running the Mac OS installs a Windows virtual OS instance, the user is implementing a Type ____ hypervisor.
converged
Fill in the blank. In an IoT implementation, devices will be connected to a _________ network to share the same infrastructure and to facilitate communications, analytics, and management.
- support of live migration
How does virtualization help with disaster recovery within a data center - guarantee of power - support of live migration - supply of consistent air flow - improvement of business practices
- The control plane function is consolidated into a centralized controller.
How is the control plane modified to operate with network virtualization - Control plane redundancy is added to each network device. - The control plane function is consolidated into a centralized controller. - A hypervisor is installed in each device to allow multiple instances of the control plane. - The control plane on each device is interconnected to a dedicated high-speed network.
- the Application Policy Infrastructure Controller
What component is considered the brains of the ACI architecture and translates application policies - the Nexus 9000 switch - the Application Policy Infrastructure Controller - the Application Network Profile endpoints - the hypervisor
- Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.
What is a difference between the functions of Cloud computing and virtualization - Cloud computing utilizes data center technology whereas virtualization is not used in data centers. - Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology. - Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware. - Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections.
- Sensors in a warehouse communicate with each other and send data to a server block in the cloud.
What is an example of an M2M connection in the IoT - A user sends an email over the Internet to a friend. - An automated alarm system in a campus sends fire alarm messages to all students and staff. - Sensors in a warehouse communicate with each other and send data to a server block in the cloud. - Redundant servers communicate with each other to determine which server should be active or standby.
- IoT
What is the term for the extension of the existing Internet structure to billions of connected devices - SCADA - digitization - IoT - M2M
- the routing table
What pre-populates the FIB on Cisco devices that use CEF to process packets - the routing table - the ARP table - the DSP - the adjacency table
- It creates a distributed computing infrastructure that provides services close to the network edge.
What statement describes Fog computing - It supports larger networks than Cloud computing does. - It creates a distributed computing infrastructure that provides services close to the network edge. - It requires Cloud computing services to support non-IP enabled sensors and controllers. - It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center.
- Cloud computing
What technology allows users to access data anywhere and at any time - data analytics - Cloud computing - virtualization - micromarketing
- IaaS
Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand - PaaS - SaaS - ITaaS - IaaS
- fog computing pillar
Which IoT pillar extends cloud connectivity closer to the network edge - management and automation pillar - application enablement platform pillar - network connectivity pillar - fog computing pillar
- infrastructure as a service (IaaS)
Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company - browser as a service (BaaS) - infrastructure as a service (IaaS) - software as a service (SaaS) - wireless as a service (WaaS)
- a private cloud
Which cloud model provides services for a specific organization or entity - a hybrid cloud - a community cloud - a public cloud - a private cloud
- operational technology specific security
Which cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines - IoT physical security - IoT network security - cloud computing security - operational technology specific security
- installed directly on a server
Which is a characteristic of a Type 1 hypervisor - does not require management console software - installed directly on a server - installed on an existing operating system - best suited for consumers and not for an enterprise environment
- does not require management console software
Which is a characteristic of a Type 2 hypervisor - best suited for enterprise environments - installs directly on hardware - has direct access to server hardware resources - does not require management console software
- It is an infrastructure to manage large scale systems of very different endpoints and platforms.
Which statement describes the Cisco IoT System - It is an advanced routing protocol for cloud computing. - It is a switch operating system to integrate many Layer 2 security features. - It is a router operating system combining IOS and Linux for fog computing. - It is an infrastructure to manage large scale systems of very different endpoints and platforms.
- separation of application from hardware
Which statement describes the concept of cloud computing - separation of application from hardware - separation of operating system from hardware - separation of control plane from data plane - separation of management plane from control plane
- SDN
Which technology virtualizes the network control plane and moves it to a centralized controller - SDN - IaaS - cloud computing - fog computing
- client/server - fog computing - cloud computing
Which three network models are described in the fog computing pillar of the Cisco IoT System (Choose three.) - P2P - peer-to-peer - client/server - fog computing - enterprise WAN - cloud computing
- physical footprint - power and air conditioning
Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome (Choose two.) - server hardware needs - physical footprint - power and air conditioning - operating system license requirements - virus and spyware attacks
- Layer 2 - Layer 3
Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions (Choose two.) - Layer 1 - Layer 2 - Layer 3 - Layer 4 - Layer 5
- Type 1
Which type of hypervisor would most likely be used in a data center - Type 1 - Type 2 - Nexus - Hadoop