CCNA4 - Chapter 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

2

Fill in the blank. In a scenario where a user with a laptop running the Mac OS installs a Windows virtual OS instance, the user is implementing a Type ____ hypervisor.

converged

Fill in the blank. In an IoT implementation, devices will be connected to a _________ network to share the same infrastructure and to facilitate communications, analytics, and management.

- support of live migration

How does virtualization help with disaster recovery within a data center - guarantee of power - support of live migration - supply of consistent air flow - improvement of business practices

- The control plane function is consolidated into a centralized controller.

How is the control plane modified to operate with network virtualization - Control plane redundancy is added to each network device. - The control plane function is consolidated into a centralized controller. - A hypervisor is installed in each device to allow multiple instances of the control plane. - The control plane on each device is interconnected to a dedicated high-speed network.

- the Application Policy Infrastructure Controller

What component is considered the brains of the ACI architecture and translates application policies - the Nexus 9000 switch - the Application Policy Infrastructure Controller - the Application Network Profile endpoints - the hypervisor

- Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

What is a difference between the functions of Cloud computing and virtualization - Cloud computing utilizes data center technology whereas virtualization is not used in data centers. - Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology. - Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware. - Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections.

- Sensors in a warehouse communicate with each other and send data to a server block in the cloud.

What is an example of an M2M connection in the IoT - A user sends an email over the Internet to a friend. - An automated alarm system in a campus sends fire alarm messages to all students and staff. - Sensors in a warehouse communicate with each other and send data to a server block in the cloud. - Redundant servers communicate with each other to determine which server should be active or standby.

- IoT

What is the term for the extension of the existing Internet structure to billions of connected devices - SCADA - digitization - IoT - M2M

- the routing table

What pre-populates the FIB on Cisco devices that use CEF to process packets - the routing table - the ARP table - the DSP - the adjacency table

- It creates a distributed computing infrastructure that provides services close to the network edge.

What statement describes Fog computing - It supports larger networks than Cloud computing does. - It creates a distributed computing infrastructure that provides services close to the network edge. - It requires Cloud computing services to support non-IP enabled sensors and controllers. - It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center.

- Cloud computing

What technology allows users to access data anywhere and at any time - data analytics - Cloud computing - virtualization - micromarketing

- IaaS

Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand - PaaS - SaaS - ITaaS - IaaS

- fog computing pillar

Which IoT pillar extends cloud connectivity closer to the network edge - management and automation pillar - application enablement platform pillar - network connectivity pillar - fog computing pillar

- infrastructure as a service (IaaS)

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company - browser as a service (BaaS) - infrastructure as a service (IaaS) - software as a service (SaaS) - wireless as a service (WaaS)

- a private cloud

Which cloud model provides services for a specific organization or entity - a hybrid cloud - a community cloud - a public cloud - a private cloud

- operational technology specific security

Which cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines - IoT physical security - IoT network security - cloud computing security - operational technology specific security

- installed directly on a server

Which is a characteristic of a Type 1 hypervisor - does not require management console software - installed directly on a server - installed on an existing operating system - best suited for consumers and not for an enterprise environment

- does not require management console software

Which is a characteristic of a Type 2 hypervisor - best suited for enterprise environments - installs directly on hardware - has direct access to server hardware resources - does not require management console software

- It is an infrastructure to manage large scale systems of very different endpoints and platforms.

Which statement describes the Cisco IoT System - It is an advanced routing protocol for cloud computing. - It is a switch operating system to integrate many Layer 2 security features. - It is a router operating system combining IOS and Linux for fog computing. - It is an infrastructure to manage large scale systems of very different endpoints and platforms.

- separation of application from hardware

Which statement describes the concept of cloud computing - separation of application from hardware - separation of operating system from hardware - separation of control plane from data plane - separation of management plane from control plane

- SDN

Which technology virtualizes the network control plane and moves it to a centralized controller - SDN - IaaS - cloud computing - fog computing

- client/server - fog computing - cloud computing

Which three network models are described in the fog computing pillar of the Cisco IoT System (Choose three.) - P2P - peer-to-peer - client/server - fog computing - enterprise WAN - cloud computing

- physical footprint - power and air conditioning

Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome (Choose two.) - server hardware needs - physical footprint - power and air conditioning - operating system license requirements - virus and spyware attacks

- Layer 2 - Layer 3

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions (Choose two.) - Layer 1 - Layer 2 - Layer 3 - Layer 4 - Layer 5

- Type 1

Which type of hypervisor would most likely be used in a data center - Type 1 - Type 2 - Nexus - Hadoop


Conjuntos de estudio relacionados

Compare and Contrast, Selection Test Off and Running

View Set

ch. 15, 19, 20, 22, 23, 24, 26, 27, 28

View Set

CH 12 Nursing Management During Pregnancy End of CH WKST (Developmental)

View Set