IT 477 - Final Exam Review - Multiple Choice

¡Supera tus tareas y exámenes ahora con Quizwiz!

VNFM is responsible for: (can choose one or more than one) A. Instantiating VNFMs B. VNF instance modification C. Management of the integrity of the VNF instance through the life-cycle D. VNF Instance related collection of NFVI performance measurement results and faults/events information E. All of the above F. B,C and D

F. B,C and D

Which of these modules are considered base network service functions, likely to be included in any OpenDaylight implementation? o Topology Manager o Statistics manager o Forwarding rules manager o Routing manager Note: There is switch manager but no routing manager

o Topology Manager o Statistics manager o Forwarding rules manager

The Open Data Center Alliance (ODCA) lists ________ as principal requirements for a modern networking approach. a) Maintainability, vendor dependence, and adaptability b) Vendor dependence, automation, and mobility c) Adaptability, integrated security, and on-demand scaling d) Model management, vendor dependence, and integrated security

A: c

The OpenFlow protocol supports the following messages, except ________ messages. a) Asynchronous b) Symmetric c) Indirect d) Controller to switch

A: c

The requirements for inelastic traffic may include following except : a) Throughput b) Packet loss c) Threshold d) Delay

A: c

When making a forwarding decision requiring external input, an SDN switch consults with the ________. a) Source host b) Destination host c) Controller d) Next hop device e) DNS server

A: c

Which component is not a part of PolicyCop? a) Policy Validator b) Policy Database c) Policy Corrector d) Policy Enforcer

A: c

________ is a cloud networking system that exploits OpenFlow SDN capabilities to provide a greater degree of control over cloud network functions by the cloud customer. a) Infrastructure as a service b) Content-centric networking c) Cloud network as a service d) Information-centric networking

A: c

_________ delivers communication services over a typically large geographic area a.) Application provider b.) Content provider c.) Network provider d.) None of the above

A: c

_________ overseeing lifecycle management of VNF instances a) NFV orchestration b) Virtualization infrastructure manager c) VNF manager d) Orchestrator

A: c

Broad network access, rapid elasticity, measured service, on-demand self-service, and resource pooling are defined by NIST as the essential characteristics of______ a.) IoT b.) Wi-Fi c.) PoE d.) Cloud computing

A: d

OpenStack is an Open Source Software project that aims to provide: a. Infrastructure as a Service b. Open Source Cloud Operating System c. Network as a Service d. All of the above

A: d

REST consists of _______ constraints a) 1 b) 2 c) 4 d) 6

A: d

Specification abstraction generally involves all these interfaces except: a) Distribution interface b) Specification interface c) Command-line interface d) Forwarding interface

A: d

The OpenFlow API is an example of a ________ abstraction. a) Distribution b) Specification c) Network d) Forwarding

A: d

Which of the following is not a congestion control technique? a) Backpressure b) Choke packet c) Implicit congestion signaling d) Network functions virtualization

A: d

________ consists of eleven software modules and two databases; it monitors the network to detect policy violations and reconfigures the network to reinforce the violated policy. a) Frenetic b) Traffic engineering c) CCN d) PolicyCop

A: d

Some of the requirements of NFV includes: a) Performance trade off b) Portability/ interoperability c) Mitigation and coexistence with respect to legacy equipment d) All of the above

A: d - NFV requirements includes: Performance trade off Portability/ interoperability Mitigation and coexistence with respect to legacy equipment Management and orchestration Automation Security and resilience Network stability Simplicity Integration

Which of the following is NOT a development in modern network traffic patterns contributing to increased loads? a) Applications generating additional horizontal traffic between servers b) Widespread public cloud usage c) Network convergence d) Unified communication e) Additional security requirements for data in transit

A: e

___________ refers to how close multiple measurements of the same physical quantity are to each other a) Precision b) Accuracy c) Margin of error d) Resolution

ANS: A

___________ refers to how close a measurement from a sensor comes to the truth\ a) Precision b) Accuracy c) Margin of error d) Resolution

ANS: B

___________ measures a parameter of a physical, chemical, biological entity and delivers an. Electronic signal proportional to the observed characteristic a) Sensors b) Actuators c) Controllers d) IoT devices

ANS: a

Physical object + controllers, sensors, actuators + internet = a) Cloud b) Microcontroller c) IoT d) Integrated circuit

ANS: c

___________ refers to the use of electronics and software within a product that has a specific function or set of functions as opposed to general-purpose computer a) Actuator b) Controller c) Embedded system d) Sensor

ANS: c

The ______________ infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology a) Hybrid Cloud b) Public Cloud c) Community Cloud d) All of the above

Ans: a

A __________ cloud provides useful software building blocks, plus a number of development tools, such as programming language tools, runtime environments, and other tools that assist in deploying new applications a) SaaS b) PaaS c) IaaS d) CompaaS

Ans: b

The areas of support can be offered by a cloud broker includes all except: a) Service intermediation b) Service aggregation c) Service orchestration d) Service arbitrage

Ans: b

The organizations that share the ____________ cloud have similar requirements and, typically, a need to exchange data with each other a) Hybrid Cloud b) Community Cloud c) Public Cloud d) All of the above

Ans: b

The provision and use of processing resources needed to deploy and run software. _____________ may be thought of as a simplified IaaS, with the focus on providing compute capacity. a) NaaS b) CompaaS c) CaaS d) DSaaS

Ans: b

Following are three generally accepted interpretations of XaaS except: a) Anything as a service b) X as a service c) Everything as a Service d) Network as a service

Ans: d

_________ offers the customer processing, storage, networks, and other fundamental computing resources so that the customer can deploy and run arbitrary software, which can include operating systems and applications a) PaaS b) CaaS c) SaaS d) IaaS

Ans: d

The ITU-T cloud computing reference architecture includes the following layers: a) User Layer b) Resource Layer c) Service Layer d) Access Layer e) All of the above

Ans: e

What is the maximum usable number of VLAN IDs a) 4093 b)4094 c)4095 d)4096

Answer :B

IPSec tunnel mode makes use of the combined authentication/encryption function called __________ a) ISAKMP b) ESP c)MPLS d)SSH

Answer: A

__________ field on the 802.1Q tag is always set to zero for Ethernet switches and is used for compatibility between Ethernet type networks and token ring networks a)Canonical format indicator b)Vlan identifier c)user priority d)Start of frame delimiter

Answer: A

Actuators are generally classified as: a) Hydraulic b) Pneumatic c) Electric d) Mechanical e) All of the above

Answer: All of the above

Which one of the following options is a major category of RFID applications? a) Tracking and identification b) Payment and stored-value systems c) Access control d) Anti-counterfeiting e) All of the above

Answer: All of the above

What is the IEEE standard for vlan tagging a)802.11b b)802.11ac c) 802.1x d) 802.1q

Answer: D

________ is NOT an approach for defining VLAN membership a) Membership by port group b) Membership by physical address c) Membership by protocol information d) Membership by device functionality

Answer: D

Which one of the following options is not a type of RFID tags? a) Passive b) Semi-Passive c) Semi-Active d) Active

Answer: Semi-Active

All of the followings are indicating different categories of readers EXCEPT: a) Fixed b) Mobile c) Desktop d) Server

Answer: Server

Which is NOT one of the levels of network virtualization? i) Physical resources ii) Virtual resources iii) Virtual networks iv) Services v) Network Security

Answer: V) Network Security

Which of the following is nearest to the edge of the Cisco 7-layer IoT model? a. Physical device/controller b. Fog computing c. Data abstraction d. Service

Answer: a

What are the categories of cloud security as a service as defined by Cloud Security Alliance? (select all that apply) a) Identity and access management b) Data loss prevention c) Web Security d) Server Security e) Endpoint Security

Answer: a, b, c

Which one of these are technical control functions and classes ( choose all that apply ) a) Access Control b) Audit and Accountability c) Identification and Authentication d) Planning Risk Assessment e) Certification and Accreditation

Answer: a, b, c

Protection of control plane in SDN involves? (select three) a) Prevention/protection against distributed denial-of-service(DDoS) attacks. b) Access control c) Encryption d) Antivirus/antiworm techniques e) Advanced Threat Protection

Answer: a, b, d

Edge IoT networking devices need to meet the following requirements except _______. a. Support many end systems b. Minimal power usage/footprint c. Have proximity to IoT objects/devices d. Operate in demanding/remote environments

Answer: b

Constrained Application Protocol for IoT constrainted devices uses which protocol? a. TCP b. ICMP c. UDP d. ARP

Answer: c

The ITU-T IoT reference model consists of all the following layers except __________. a. Network b. Device a. Session c. Application d. Support

Answer: c

Which one is NOT one of the four levels of World Forum IoT Security framework? a) Smart objects/embedded systems b) Fog/edge network c) Core network d) Gateway e) Data center/cloud

Answer: d

IoTivity Control Manager includes the following components: a) IoTivity Client b) SDK API c) Subscription/Notification manager d) Device Discovery e) All of the above f) a, b and C

Answer: e

Which of the following are levels in the Cisco 7-layer IoT model? (choose all that apply) a. Application b. Abstraction c. Accumulation d. Connectivity e. All of the above f. None of the above

Answer: e

Which one of these are NOT requirements of IoT Security? a) Communication security b) Data management security c) Service provision security d) Integration of security policies and techniques e) Policy and Compliance

Answer: e

What are the benefits of network virtualization? a. Flexibility b. Operational Cost savings c. Capital cost savings d. Rapid service provisioning e. All the above

Answer: e) All the above

What are the three layers of Intel's SDI model? i) Orchestration ii) Composition iii) Hardware Pool iv) All of the above v) None of the above vi) I and ii

Answer: iv) All of the above

What are the three virtual tenant network elements i) Virtual node ii) Virtual interface iii) Virtual link iv) All of the above

Answer: iv) All of the above

Which one of the types of actions CANNOT be applied on packets that match the flow filter conditions? i) Pass ii) Drop iii) Redirect iv) Modify

Answer: iv) Modify

Element management functions include the following functions except: A. Accounting for the usage of VNF functions B. Instantiating VNFMs wherever applicable C. Configuration for the network function provided by the VNF D. Security management for the VNF functions

B. Instantiating VNFMs wherever applicable

The two solutions used to achieve actionable QoE are (Choose 2) a. Storage-oriented actionable QoE solution b. System-oriented actionable QoE solution c. Service-oriented actionable QoE solution

BC

The two types of QoE agents are (Choose 2) a. Elastic QoE agent b. Slave QoE agent c. Inelastic QoE agent d. Master QoE agent

BD

The Three Categories of QoE/QoS mapping models according to their input are all except (choose 1) a. Black-box media-based models b. Glass-box parameter-based models c. White-box media-based models d. Gray-box parameter-based models

C

VIM performs the following function (can choose one or more than one) A. Performs operations for visibility into and management of the NFV infrastructure B. Termination of VNF instances C. VNF instance software update/upgrade D. Root cause analysis of performance issues from the NFV infrastructure perspective

A. Performs operations for visibility into and management of the NFV infrastructure D. Root cause analysis of performance issues from the NFV infrastructure perspective

If a packet matches several flow table entries, it: a) is dropped from the switch b) is sent to the SDN controller c) is processed according to the actions of the matching entry with the highest priority d) is processed according to the actions of all matching entries

A: C

________ accepts incoming data flows from other network devices and end systems and forwards them along the data forwarding paths that have been computed and established according to the rules defined by the SDN applications. a) Control support function b) Northbound API c) Data forwarding function d) Service function chaining

A: C

The key difference between 1G and 2G networks include (choose any 2): a.) Analog traffic channels b.) Encryption c.) Error detection and correction d.) Channel allocated to only one user at any given time

A: b & c

In the 3-layer SDN model, the order of layers is closest to which of the following (bottom to top)? a) Data, Network, Application b) Physical, Control, Application c) Data, Control, Application d) Physical, Network, Session e) Data, Control, Session

A: c

NFV management and orchestration includes the following functional blocks except: a) NFV orchestration b) VNF manager c) EMS d) Virtualization infrastructure manager e) None of the above

A: C Explain - The NFV framework consists of three domains of operation: Virtualized network functions: The collection of VNFs, implemented in software, that run over the NFVI. NFV infrastructure (NFVI): The NFVI performs a virtualization function on the three main categories of devices in the network service environment: computer devices, storage devices, and network devices. NFV management and orchestration: Encompasses the orchestration and lifecycle management of physical/software resources that support the infrastructure virtualization, and the lifecycle management of VNFs. NFV management and orchestration focuses on all virtualization-specific management tasks necessary in the NFV framework.

Which of the following technologies is NOT increasing network loads by a substantial amount? a) Big data b) Mobile c) IoT d) Cloud e) All of the above f) None of the above.

A: F

A(n) ________ is an attack in which multiple systems are used to flood servers or network devices or links with traffic in an attempt to overwhelm its available resources, making it unavailable to respond to legitimate users. a) DDoS b) DoS c) ODC d) SAL

A: a

An ________ is where packets enter and exit the OpenFlow pipeline. a) OpenFlow port b) OpenFlow switch c) OpenFlow channel d) OpenFlow reserve

A: a

Following are the common possibilities of the real time traffic except : a) Discrete data source b) On/Off Source c) Variable packet size d) Continuous data source.

A: a

For a packet entering Flow Table 0 of an OpenFlow swith, it has the packet data itself and associated metadata. It also has what other information a) the ID of the ingress port and a null action set b) the ID of the egress port and a null action set c) the ID of the ingress port and an action set of "output" d) the ID of the egress port and an action set of "output"

A: a

If a packet fails to matches any flow table entries (including table-miss entry), it: a) A is dropped from the switch b) B is sent to the SDN controller c) C logs the packet data in audit logs d) D forwards the packet without further processing

A: a

In SDN, the ________ plane is removed from individual networking devices and hosted separately. a) Control b) Data c) Physical d) Application e) Network

A: a

Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video and data communications networks into a common infrastructure, ___________focuses on the integration of real-time communication services to optimize business processes. a.) Unified communications b.) Distribution networks c.) Peering d.) RTC dashboard

A: a

An implementation of a network function that can be deployed on an NFVI is: a) VNF b) PNF c) VNF-FG d) VNF set

A: a PNF (Physical Network Function): An implementation of a NF via tightly coupled software and hardware system. VNF-FG (VNF Forwarding Graph): Graphs of logical links connecting VNF nodes for the purpose of describing traffic flows between these network functions. VNF set: Collection of VNFs with unspecified connectivity between them.

1.) IoT is a massive system consisting of _______layers a.) Seven b.) Five c.) Two d.) Four

A: b

A Group table action bucket of select does what with packets a) clones the packet to each bucket b) output to a specific bucket based on some criteria c) output to the first available live bucket d) redirect to another group table

A: b

A flow is a(n): a) a sequence of packets traversing the network that come from the same IP address b) a sequence of packets traversing the network that share header values c) a sequence of packets traversing the network that go to the same IP address d) a sequence of packets traversing the network that move through the same switch

A: b

A location where a network function is or could be deployed as a VNF: a) N-PoP b) NFVI-PoP c) PNF d) NFVI

A: b

Explicit congestion signaling approaches can be divided into following categories except: a) Binary based b) Code based c) Credit based d) Rate based

A: b

The ________ API deals with communication between the Control and Data plane a) Northbound b) Southbound c) Eastbound / Westbound d) All of the above e) None of the above

A: b

The____________connects geographically dispersed distribution networks as well as providing access to other networks that are not part of the enterprise network. a.) Distributed network b.) Core network c.) Access network d.) None of the above

A: b

Which of the following is not a requirement of modern networking, according to ODCA? a) Adaptability b) Reduced cabling c) Mobility d) Maintainability e) On-demand scaling

A: b

Which of the following is possible? a) A packet being processed by a group table is directed to a flow table b) A packet being processed by a flow table is directed to a higher number flow table c) A packet being processed by a flow table is directed to a lower number flow table d) A packet that matches several entries in a given flow table is processed by each matching entry

A: b

________ is a method for dynamically analyzing, regulating, and predicting the behavior of data flowing in networks with the aim of performance optimization to meet service level agreements. a) PolicyCop b) Traffic engineering c) Routing d) Event handling

A: b

__________ involves deploying and managing the lifecycle of VNF instances. a) NFV infrastructure b) Management and Orchestration (MANO) c) Service chaining d) None of the above

A: b - NFV infrastructure: The NFVI performs a virtualization function on the three main categories of devices in the network service environment: computer devices, storage devices and network devices. - MANO: involves deploying and managing the lifecycle of VNF instances. Examples includes VNF instance, creation, VNF service chaining, monitoring, relocation, shutdown, and billing. - Service Chaining: For a given traffic flow within a given application, the service provider steers the flow through multiple VNFs to achieve the desired network functionality. This is referred to as service chaining.

PolicyCop consists of _______ software modules, and two databases: a) 15 b) 11 c) 2 d) 1

A: c

All of the following are layers of the QoE Agent except (choose 1) a. Application b. Resource c. User d. Admin

D

Which of the following are not classification of monitoring solutions (Choose 1) a. Infrastructure b. Service c. Network d. Data

D

Following are the principal elements of the compute domain except: A. NIC B. CPU/memory C. Control and admin management D. Compute/storage resource sharing/management

D. Compute/storage resource sharing/management

Infrastructure interconnect interfaces includes: A. Management and orchestration interface with the infrastructure network domain B. Management and orchestration interface with the compute domain C. Management and orchestration interface with the hypervisor domain D. d)Network interconnect between the compute equipment and the infrastructure network equipment. E. All of the above F. A,B &C only

E. All of the above

________is the commercial name for a wired local-area network technology. a) Ethernet b) Wi-Fi c) PoE d) IoT

a

How many constraints must be followed by an API to be considered as RESTful? o 3 o 4 o 5 o 6

o 6

What are the response body attributes of "Get aggregate flow stats of switch" o Data path ID o Packet count o Byte Count o Number of flows o All of the above

o All of the above

Which one is a REST constraint? o Client-server o Code on demand o Uniform interface o All of the above

o All of the above

Which one of these functional procedures are involved in BGP? o Neighbor acquisition o Neighbor reachability o Network reachability o All of the above

o All of the above

What component is not part of the SDN controller layer? o Application support o Orchestration o Abstraction o Data transport & processing

o Data transport & processing

All of these are types of SDN controller implementations, EXCEPT: o Beacon o OpenFloodlight o POX o ONIX

o OpenFloodlight

Which one of the following SDN control plane functions provide isolation and security enforcement between applications and services? o Shortest path forwarding o Notification manager o Security mechanisms o Topology manager

o Security mechanisms


Conjuntos de estudio relacionados

Chapter 4 Ethics and Social Responsibility in Marketing

View Set

Chapter 21- Patient Safety and Quality

View Set

Chapter 4- Ethics and Information Security: MIS Business Concerns

View Set

Proteiners opbygning og funktion II

View Set