IoT final
Which type of wireless network is used to connect devices within a city to create a metropolitan-area network (MAN)?
WiMAX
What is a sensor?
a device that detects or measures an event or physical property
What is one way to pay for prototyping?
crowd funding
What type of device could allow a refrigerator to place a replacement order for an item contained within it?
sensor
Which two applications commonly use ML technology? (Choose two.)
-credit card fraud detection -speech recognition
Which technology uses AI and other technologies to reconfigure a network to comply with service levels?
IBN
Which series of Cisco Networking Academy courses is designed to develop skills for securely collecting data, connecting sensors to the cloud, and analyzing big data?
IoT Fundamentals
What is the primary focus of the CCNA Routing and Switching curriculum that is available through the Cisco Networking Academy?
It provides learners to have a comprehensive overview of networking concepts and skills.
Which output would be displayed if the code that is shown below is entered in a Python interpreter? y = ['yellow', 'red', 'green', 'purple', 'white'] print y
It shows "SyntaxError"
Which tool allows a user to simulate real networks?
Packet Tracer
How can a virtual assistant be a security risk?
Personal information could be leaked.
What is the primary focus of the IoT fundamentals courses available through Cisco Networking Academy curriculum?
The courses teach learners how to connect sensors to the cloud, analyze big data, and securely collect data.
Refer to the exhibit. A specific Blockly block has a slot on the top. What is the purpose of this slot?
The slot allows a block with a bevel tab on the bottom to be connected above the block shown.
Which type of network is used to connect a company located in one area of a city to another location in a city far away?
WAN
What is the output when the following code is entered into a Python program interpreter? [1,2,4,5] + [3,6]
[1,2,4,5,3,6]
What allows digital devices to interconnect and transmit data?
a network
What is Blockly?
a programming tool for beginners
What is cloud computing?
a system of data centers or connected servers that provide anywhere/anytime access to data and applications
Which ML technology can be used to identify and track individual persons?
facial recognition
True or False? The Internet of Things can help organizations improve the efficiency and productivity of manufacturing processes and operations.
true
True or False? The Internet of Things will connect inanimate objects to the network with intelligent sensors.
true
What is a goal of performing a risk assessment?
valuing assets to justify security expenditures
Which attribute of big data involves an exponential data growth rate?
velocity
Which action takes place in the assurance element of the IBN model?
verification and corrective action
A business is analyzing sales information as the sales data is being generated from the point-of-sale (POS) machines. What type of data is captured and processed as the events happen?
transactional data
True of False? Structured data is easier to analyze and store than unstructured data.
true
True or False? An appliance that lowers power consumption during peak demand is considered a smart device.
true
True or False? Even though IoT is considered an enabling technology, not all jobs created are IT-related.
true
True or False? Once connected to the home gateway, smart devices can be controlled from a smartphone, tablet, or PC.
true
rectangle. Refer to the exhibit. What does the exhibited flow chart symbol represent?
process
What is the goal of a white hat hacker?
protecting data
Which field has traditionally been tied to automation?
robotics
Making data accessible to only authorized users addresses which data storage problem associated with big data?
security
What type of data is being collected when an organization is using spreadsheets and forms for data input?
structured data
What is artificial intelligence?
the ability of a device to "learn" based on code and provided data
What information is conveyed by the SSID that is configured on an IoT device?
the wireless network
Why would an IT person use Zabasearch?
to research a person
What output is expected when the function that is shown below is entered in a Python program interpreter? >>>print Cisco 1
"SyntaxError: Missing parentheses in call to 'print'"
Match the security best practice to the description.
- *implementing human resource security measures* research and perform background checks on employees - *employing access controls* assign user roles and privilege levels - *educating users* train users on security procedures - *regularly testing incident responses* perform and test emergency response scenarios
Which three passwords are the least secure? (Choose three.)
- 135792468 - randolph - asdfghjkl
What are two examples of automation? (Choose two.)
- A building automatically adjusts the heating and lights based the routine of the occupants. - A robot cleans up an industrial chemical spill.
What are two recommended steps to protect and secure a wireless network? (Choose two.)
- Use WPA2-AES encryption. - Update firmware.
What three technologies control network functions to accomplish a desired intent in an intent based network? (Choose three.)
- automation - artificial intelligence - machine learning
Which two online activities pose high security risks? (Choose two.)
- sharing information on social media - following email links that have already been scanned by the email server
Which three elements should be combined when creating a strong password? (Choose three.)
- special characters - combinations of letters and numbers - phrases
What are three examples of personally identifiable information? (Choose three.)
- vehicle identification number - birth date - bank account number
What are two characteristics of artificial intelligence? (Choose two.)
-It uses intelligent agents that interact with the environment and make decisions to reach a specific goal -It uses systems that mimic human cognitive functions such as learning and problem solving.
How many countries have Cisco Networking Academies helping individuals prepare for industry-recognized certifications and mastering IT skills?
180
What is displayed after the following code is entered into a Python interpreter? addition = 22 +10 print(addition)
32
A student has a digitized version of an idea for a product. What machine can the student use to turn the idea into a solid object?
3D printer
How many students have been trained through Cisco Networking academies to date?
5 million
Which IT community is a collection of resources designed for people who wish to develop skills and pursue a Cisco certification?
Cisco Learning Network
What is a Cisco developer program community that allows the user to learn, connect, inspire, and code and consists of coordinated developer tools, and sandboxes?
DevNet
How is a new variable created in Blockly?
Drag the variable block onto the work space area.
An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?
Encrypt traffic through a VPN
What is the primary focus of the IT Essentials course available through the Cisco Academy curriculum?
It teaches learners the fundamentals of computer hardware and software.
What are two resources that could help someone learn to program? (Choose two.)
Khan Academy Code Academy
What is a wireless router security best practice that limits access to only specific internal hosts?
MAC address filtering
Which platform is a low cost, credit-card-sized computer?
Raspberry Pi
What is used to identify a wireless network?
SSID
What is a requirement for a device to be referred to as a smart device?
The device can make a decision or take a course of action based on outside information.
What is comprised of millions of smart devices and sensors connected to the internet?
The internet of things
How are USB flash drives a security risk?
They have a controller that can be infected.
Which challenge of big data storage is characterized by the need to make data accessible from anywhere at anytime?
access
Which element of the IBN model orchestrates policies and configures systems?
activation
Which type of data can be used by a business to support managerial analysis tasks and organizational decision making?
analyzed data
What is a key feature of the translation element of the intent-based networking model?
application of business intent to network configuration
What is the core component of Intent-Based Networking?
artificial intelligence
What term is used to describe the intelligence demonstrated by machines?
artificial intelligence
What are three features of Hadoop? (Choose three.)
automatic replication of data across clusters easily scalable cluster sizes uses HDFS as a fault tolerant file system
What is the process of discovering patterns and relationships in large data sets in order to convert raw data into meaningful information?
data mining
diamond symbol . What does the exhibited flow chart symbol commonly represent?
decision
Which IoT-related job would deal with the development and implementation of the underlying technologies within the digital world?
enablers
True or False? Data is defined as big data if it is more than 1 petabyte.
false
True or False? Distributed data processing involves large databases being centrally processed by powerful mainframe computers and stored in giant disk arrays.
false
True or False? Web scraping tools are used to extract and manipulate structured data.
false
What is used to illustrate how a given process will run?
flow chart
Which type of computing is located at the edge of a business or corporate network and that allows data from sensors to be preprocessed?
fog
An organization is concerned with the amount of sensor data that is being generated locally, analyzed in the cloud, and returned for processing at the local site. Which solution will keep the data closer to the source for preprocessing?
fog computing
What characterizes data management problems associated with big data storage?
generating and collecting data from multiple sources
What is needed in a smart home to connect sensors and smart devices to a network?
home gateway
Which technology enables features such as speech recognition, product recommendations, and credit card fraud detection?
machine learning
Which action can help reduce online risk?
only conduct transactions on websites after verifying the URL is correct
Which command is used to test network connectivity and provide a response to each packet received by the remote host?
ping
Which Python programming function is used to display output?