CCNA4 - Chapter 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

2

Fill in the blank. In a scenario where a user with a laptop running the Mac OS installs a Windows virtual OS instance, the user is implementing a Type ____ hypervisor.

converged

Fill in the blank. In an IoT implementation, devices will be connected to a _________ network to share the same infrastructure and to facilitate communications, analytics, and management.

- support of live migration

How does virtualization help with disaster recovery within a data center - guarantee of power - support of live migration - supply of consistent air flow - improvement of business practices

- The control plane function is consolidated into a centralized controller.

How is the control plane modified to operate with network virtualization - Control plane redundancy is added to each network device. - The control plane function is consolidated into a centralized controller. - A hypervisor is installed in each device to allow multiple instances of the control plane. - The control plane on each device is interconnected to a dedicated high-speed network.

- the Application Policy Infrastructure Controller

What component is considered the brains of the ACI architecture and translates application policies - the Nexus 9000 switch - the Application Policy Infrastructure Controller - the Application Network Profile endpoints - the hypervisor

- Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

What is a difference between the functions of Cloud computing and virtualization - Cloud computing utilizes data center technology whereas virtualization is not used in data centers. - Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology. - Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware. - Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections.

- Sensors in a warehouse communicate with each other and send data to a server block in the cloud.

What is an example of an M2M connection in the IoT - A user sends an email over the Internet to a friend. - An automated alarm system in a campus sends fire alarm messages to all students and staff. - Sensors in a warehouse communicate with each other and send data to a server block in the cloud. - Redundant servers communicate with each other to determine which server should be active or standby.

- IoT

What is the term for the extension of the existing Internet structure to billions of connected devices - SCADA - digitization - IoT - M2M

- the routing table

What pre-populates the FIB on Cisco devices that use CEF to process packets - the routing table - the ARP table - the DSP - the adjacency table

- It creates a distributed computing infrastructure that provides services close to the network edge.

What statement describes Fog computing - It supports larger networks than Cloud computing does. - It creates a distributed computing infrastructure that provides services close to the network edge. - It requires Cloud computing services to support non-IP enabled sensors and controllers. - It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center.

- Cloud computing

What technology allows users to access data anywhere and at any time - data analytics - Cloud computing - virtualization - micromarketing

- IaaS

Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand - PaaS - SaaS - ITaaS - IaaS

- fog computing pillar

Which IoT pillar extends cloud connectivity closer to the network edge - management and automation pillar - application enablement platform pillar - network connectivity pillar - fog computing pillar

- infrastructure as a service (IaaS)

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company - browser as a service (BaaS) - infrastructure as a service (IaaS) - software as a service (SaaS) - wireless as a service (WaaS)

- a private cloud

Which cloud model provides services for a specific organization or entity - a hybrid cloud - a community cloud - a public cloud - a private cloud

- operational technology specific security

Which cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines - IoT physical security - IoT network security - cloud computing security - operational technology specific security

- installed directly on a server

Which is a characteristic of a Type 1 hypervisor - does not require management console software - installed directly on a server - installed on an existing operating system - best suited for consumers and not for an enterprise environment

- does not require management console software

Which is a characteristic of a Type 2 hypervisor - best suited for enterprise environments - installs directly on hardware - has direct access to server hardware resources - does not require management console software

- It is an infrastructure to manage large scale systems of very different endpoints and platforms.

Which statement describes the Cisco IoT System - It is an advanced routing protocol for cloud computing. - It is a switch operating system to integrate many Layer 2 security features. - It is a router operating system combining IOS and Linux for fog computing. - It is an infrastructure to manage large scale systems of very different endpoints and platforms.

- separation of application from hardware

Which statement describes the concept of cloud computing - separation of application from hardware - separation of operating system from hardware - separation of control plane from data plane - separation of management plane from control plane

- SDN

Which technology virtualizes the network control plane and moves it to a centralized controller - SDN - IaaS - cloud computing - fog computing

- client/server - fog computing - cloud computing

Which three network models are described in the fog computing pillar of the Cisco IoT System (Choose three.) - P2P - peer-to-peer - client/server - fog computing - enterprise WAN - cloud computing

- physical footprint - power and air conditioning

Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome (Choose two.) - server hardware needs - physical footprint - power and air conditioning - operating system license requirements - virus and spyware attacks

- Layer 2 - Layer 3

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions (Choose two.) - Layer 1 - Layer 2 - Layer 3 - Layer 4 - Layer 5

- Type 1

Which type of hypervisor would most likely be used in a data center - Type 1 - Type 2 - Nexus - Hadoop


Conjuntos de estudio relacionados

Compare and Contrast, Selection Test Off and Running

View Set

CH 12 Nursing Management During Pregnancy End of CH WKST (Developmental)

View Set

MS1 B4W2L1 - Shoulder Region, Axilla & Posterior Triangle

View Set