IOT final exam
A company requires using a secure encrypted Internet connection when connecting to the corporate network from outside the company. Which technology should be used when employees travel and use a laptop
VPN
What are three attributes of data that would indicate that it may be big data
Variety, volume, velocity
Which describes global variables in programming languages?
Anywhere in a program it can be used
What is an open source physical computing platform that can take input from a variety of switches or sensors to control physical objects?
Arduino
What is the core components of intent-based networking?
Artificial intelligence
Which two type of institutions do malicious web pages often look like
Bank website & financial institution
Which technology is used as a visual programming tool to create a program by connecting colored blocks
Blocky
Distributed processing
Breaks large volumes of data into smaller pieces which are processed by computers in different locations
Which security best practices involves defining company rules, job duties and expectations
Developing a security policy
What limits the type of different objects that can become intelligent sensors on the internet of things
Doorbells, garage doors, smartwwtvhes
What are two characteristics of the Python programming language?
Easy to read code & it runs without conversion to machine learning
What is a key feature of the assurance element of the intent-based networking model?
End to end Verification of network
While
Execute A block of code while condition is true
What are three benefits of cloud computing
It eliminates or reduces the need for onsite maintenance and management
Which type of network consists of wired computers in a college classroom?
LAN
Which technology is a subset of AL that uses statistical technique to enable computers to "learn" from collected data
ML (machine learning)
Mined data can be visualized through the use of charts. What are the criteria that can be used to determine the best chart selection.
Number of variables shown Items requiring comparison.
What are two areas of physical security which
Outside perimeter security & inside perimeter security
What type of network is the connection between a Bluetooth headset and a vehicle?
PAN
FOR
Repeat the execution of a specific block of code for a specific number of times
What are some examples of data types that would be classified as personally identifiable information (PII)
Social security number, email address, bank account number, fingerprint
What devices provides auto discovery services for smart devices that are connected to the network
The home gateway
What is the largest network in existence?
The internet
What is the purpose of data analytics
To gain insights from data
What is the purpose of packet tracer?
To simulate and visualize one or more networks
True or false? Comma-separated values (CSV), JSON and XML are all tools that can be used to manipulate structured data
True
True or false? With artificial intelligence, smart devices can modify processes and settings on the fly in responses to changes on the network
True
How was data that has been collected through sources such as webpages, audio, or tweets categorized?
Unstructured
What are two things that all digital devices need in order to work?
Data & programing
Which two skills help with IoT prototyping?
Programing, design
Change will have to occur in the corporate network in order to prepare for the Internet of things. Which type of testing would a company do to demonstrate the benefits of networking a new "thing" that was not on the network before
Prototyping
Which character is used within a search engine to gather data efficiency by placing the character before and after the name of the particular person
Quotation marks
Cloud services
A collection of data centers or connected servers that provide anywhere anytime access to data and applications
Hadoop
A comprehensive ecosystem of open source software for big data management
What is used to provide IoT sensors access to the network?
A microcontroller
What are two features of automation?
A process that is self driven & process that might eliminate human intervention
Which technology has the intelligence that is demonstrated by machine in a way that mimics human cognitive functions?
AL
IF THEN
Allow the code to make decisions
What are two requirements to connect a smart device to a home wireless network
An IP address and an SSID
fog computing
An architecture that utilizes edge devices for data pre-processing and storage