Introduction to IOT final exam -Blake Lenzing
A company requires using a secure encrypted internet connection when connecting to the corporate network from outside the company, Which technolgy ahoukd be used when emplyees travel and use a laptop
VPN
What are three attributes of data that would indicate that it may be big data
Volume/velocity/variety
What is the purpose of packet tracer
a tool to visualize and simulate a network
What is an open source physical computing platform that can take input from a variety of switches or sensors to control physical objects
Ardunio
What is the core component of intent based networking
Artificial intelligence
Which technology has the intelligence that is demonstrated by machines in a way that mimics human cognitive functions
Artificial intelligence
What are some examples pf data types that would be classified as personally identifiable information
Bank and financial
What are two things that all digital devices need in order to work
Computer program/supplied data
Which two skills help with IOT prototyping
Design/program
What are two characteristics of the python programming language
Easy to read/runs without conversions to machine language
what is a key feature of the assurance element of the intent based networking model?
End to end verification
What devices provides auto discovery services for smart devices that are connected to the network
Home gateway
What is the largest network in existence
Internet
Which type of network consist of wired computers in a college classroom
Local area network(LAN)
Which technology is subset of Al that uses statistical techniques to enable computers to "learn" from collected data
Machine learning
Mined data can be visualized trough the use of charts. What are the criteria that can be used to manipulate structured data
Number of variable to be showed required comparison
WHat are two requirments to connect a smart device to a home wireless network
SSID/IP Addressing
Which two types of instirtions do malicoius web pages oftyen look like
SSN, email, birthday, bank account, facebook, license
Which describes global variables in programming languages
They can be used with in any function of a program
True or False? Comma-separated values (CSV), JSON, and XML are all tools that can be used to manipulate structured data
True
How is data that has been collected through sources such as web pages, audio, or tweets categorized
Unstructured
WHich tech is used as a visual programming tool to create a program ny connecting colored blocks
blockly
What security best practices involves defining company rules,jobs duties, and expextions?
creating a security policy
what are three benefits of cloud computing
enables access data to anywhere and anytime Limits/reduces I.T equipment Streaming I.T operation to subbing and services
What is the purpose of data analytics
gaining new incest from the data
what is used to provide iot sensors with access to the network
micro controller
What are the two areas of physical security within a data center?
outside and inside
Which type of network is the connection between a bluetooth headset and a vehicle
personal area network (PAN)
Change will have to occur in the corporate network in order to prepare for things.
prototyping
Which character is used within a search engine to gather data efficiently by placing the character before and after the name of a particular person
quotation marks
What are two features of automation
self driven Elements for human intervention
True or False? With artificial intelligence, smart devices can modify processes and settings on the fly in response to changes on the network
true
What limits the types of different objects that can become intelligent sensors on the internet of things?
your imagination