banner



Which Statement Best Describes This Public Service Campaign?

How to discover: Printing "Ctrl + F" in the browser and fill in any wording is in the question to find that question/answer. If the question is non here, discover information technology in Questions Bank.

Annotation: If you have the new question on this exam, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Give thanks yous! Nosotros truly value your contribution to the website.

Enterprise Networking, Security, and Automation ( Version 7.00) – Modules 13 – 14: Emerging Network Technologies Exam

1. A visitor uses a cloud-based payroll system. Which cloud computing engineering is this company using?

  • browser as a service (BaaS)
  • infrastructure as a service (IaaS)
  • software equally a service (SaaS)
  • wireless every bit a service (WaaS)

Explanation: Curriculum Reference: Module 7.2
This item is based on information contained in the presentation.
There is no such thing every bit BaaS. Infrastructure as a service (IaaS) is when fundamental network devices such every bit routers and firewalls are leased from a provider. Wireless as a service (WaaS) is when a provider provides wireless connectivity at a stock-still monthly toll.

2. For a information center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?

  • Data traffic from clients will be routed to multiple virtual servers.
  • There are meaning information exchanges between virtual servers.
  • At that place is more data traffic flowing from virtual servers to clients.
  • More network control traffic is generated between virtual servers and clients.

3. Which component in a traditional infrastructure device provides Layer two and Layer 3 functions to create data paths within a network?

  • data aeroplane
  • command plane
  • adjacency table
  • forwarding information base

4. Which network traffic direction engineering science is a basic element in SDN implementations?

  • OpenFlow
  • OpenStack
  • IEEE 802.1aq
  • Interface to the Routing System

Caption: OpenFlow was developed at Stanford University to manage traffic betwixt routers, switches, and wireless admission points and a controller. It is the original and widely implemented southbound API for SDN.​ OpenStack is a virtualization and orchestration platform bachelor to build scalable cloud environments and provide an infrastructure as a service (IaaS) solution. Information technology is often used with Cisco ACI. IEEE 802.1aq is a replacement to the Spanning Tree Protocol (STP) that allows all paths to be agile with multiple equal price paths.​ Interface to the Routing System uses a fast path protocol to populate the network device routing table.​

5. Which type of hypervisor would virtually likely be used in a data eye?

  • Type two
  • Blazon one
  • Nexus
  • Hadoop

Caption: The two type of hypervisors are Blazon 1 and Type 2. Type 1 hypervisors are usually used on enterprise servers. Enterprise servers rather than virtualized PCs are more likely to be in a data center.

6. Which is a feature of a Type 1 hypervisor?​

  • installed directly on a server​
  • best suited for consumers and not for an enterprise environment
  • does not crave management panel software
  • installed on an existing operating system​

Explanation: Type 1 hypervisors are installed directly on a server and are known as "bare metal" solutions giving directly access to hardware resources. They also crave a management console and are all-time suited for enterprise environments.​

7. Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​

  • Layer 1
  • Layer 2
  • Layer iii
  • Layer 4
  • Layer 5

Explanation: The SDN command plane uses the Layer two ARP tabular array and the Layer 3 routing table to make decisions about forwarding traffic.

8. What pre-populates the FIB on Cisco devices that utilise CEF to process packets?

  • the routing table
  • the adjacency table
  • the ARP table
  • the DSP

Explanation: CEF uses the FIB and adjacency tabular array to make fast forwarding decisions without control plane processing. The adjacency table is pre-populated by the ARP table and the FIB is pre-populated by the routing table.​

nine. What is a function of the information plane of a network device?

  • sending data to the CPU for processing
  • edifice the routing table
  • resolving MAC addresses
  • forwarding traffic flows

Caption: Networking devices operate in 2 planes; the data plane and the command plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the CPU. The data aeroplane forrard traffic flows.

10. Which statement describes the concept of deject calculating?

  • separation of application from hardware
  • separation of management plane from control plane
  • separation of operating organisation from hardware
  • separation of control aeroplane from data aeroplane

Explanation: Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware.

11. Which deject model provides services for a specific organization or entity?

  • a public deject
  • a hybrid cloud
  • a private cloud
  • a community deject

Explanation: Private clouds are used to provide services and applications to a specific organization and may be fix within the private network of the arrangement or managed by an exterior arrangement.

12. What ii benefits are gained when an arrangement adopts cloud calculating and virtualization? (Choose two.)

  • provides a "pay-as-y'all-go" model, assuasive organizations to care for computing and storage expenses as a utility
  • enables rapid responses to increasing information volume requirements
  • distributed processing of large information sets in the size of terabytes
  • elimination of vulnerabilities to cyber attacks
  • increases the dependance on onsite IT resources

Explanation: Organizations tin utilise virtualization to consolidate the number of required servers by running many virtual servers on a unmarried physical server. Cloud computing allows organizations to scale their solutions as required and to pay just for the resource they require.

thirteen. Which blazon of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?

  • blazon 2
  • virtual auto
  • type i
  • blank metal

Explanation: Type two hypervisors, also know as hosted hypervisors, are installed on meridian of an existing operating organisation, such as Mac OS, Windows, or Linux.

14. A small company is considering moving many of its data centre functions to the deject. What are iii advantages of this plan? (Choose three.)

  • The visitor but needs to pay for the amount of processing and storage capacity that it uses.
  • Cloud services are billed at a fixed fee no matter how much processing and storage are used past the company.
  • The company does non demand to be concerned about how to handle increasing information storage and processing demands with in-firm data center equipment.
  • The company tin can increase processing and storage capacity as needed and then subtract capacity when it is no longer needed.
  • Unmarried-tenant data centers can easily abound to accommodate increasing data storage requirements.
  • Cloud services enable the company to own and administer its ain servers and storage devices.

Explanation: Cloud computing offers many advantages to the company. Since the cloud data storage and processing facilities are endemic by third-parties, the company does not demand to exist concerned almost how it will handle increasing data storage and processing demands with its ain data center equipment. The company can easily increase or decrease processing power and storage chapters based on need. Also, cloud services are billed past usage, so the visitor does non accept the costs of supporting its own expensive information centre that is non always used to maximum capacity.

15. How does virtualization help with disaster recovery inside a information center?

  • back up of live migration
  • guarantee of power
  • improvement of business practices
  • supply of consistent air flow

Explanation: Live migration allows moving of one virtual server to some other virtual server that could be in a unlike location that is some distance from the original data centre.

16. What engineering science allows users to access data anywhere and at any time?

  • Cloud computing
  • virtualization
  • micromarketing
  • data analytics

Explanation: Deject computing allows organizations to eliminate the need for on-site It equipment, maintenance, and management. Deject computing allows organizations to expand their services or capabilities while avoiding the increased costs of free energy and space.

17. Which action takes identify in the assurance element of the IBN model?

  • verification and corrective action
  • configuring systems
  • translation of policies
  • integrity checks

Explanation: The assurance element of the IBN model is concerned with end-to-end verification of network-wide behavior.

18. Refer to the exhibit. Which data format is used to stand for the data for network automation applications?

CCNA 3 v7 Modules 13 - 14: Emerging Network Technologies Exam Answers 1

  • XML
  • YAML
  • HTML
  • JSON

Caption: The mutual data formats that are used in many applications including network automation and programmability are equally follows:

  • JavaScript Object Notation (JSON) – In JSON, the information known equally an object is one or more key/value pairs enclosed in braces { }. Keys must exist strings inside double quotation marks " ". Keys and values are separated by a colon.
  • eXtensible Markup Language (XML) – In XML, the data is enclosed within a related set up of tags <tag>data</tag>.
  • YAML Ain't Markup Language (YAML) – In YAML, the information known as an object is one or more than key value pairs. Key value pairs are separated by a colon without the use of quotation marks. YAML uses indentation to define its structure, without the use of brackets or commas.

19. What is the function of the cardinal contained in most RESTful APIs?

  • Information technology is the tiptop-level object of the API query.
  • It is used to cosign the requesting source.
  • Information technology represents the main query components in the API request.
  • It is used in the encryption of the message by an API request.

Explanation: Many RESTful APIs, including public APIs, require a fundamental. The central is used to place the source of the request through authentication.

20. Which ii configuration management tools are adult using Ruby? (Cull two.)

  • Boob
  • Ansible
  • SaltStack
  • Chef
  • RESTCONF

Explanation: Chef and Puppet are configuration direction tools developed using Crimson. Ansible and SaltStack are configuration management tools developed using Python. Ruddy is typically considered a more difficult language to learn than Python. RESTCONF is a network management protocol.

21. Which term is used to draw a gear up of instructions for execution past the configuration management tool Puppet?

  • Playbook
  • Cookbook
  • Manifest
  • Colonnade

Caption: The configuration management tool Puppet uses the name Manifest to describe the set of instructions to exist executed.

22. Which term is used to depict a gear up of instructions for execution by the configuration management tool SaltStack?

  • Cookbook
  • Manifest
  • Pillar
  • Playbook

Caption: The configuration management tool SaltStack uses the proper name Colonnade to draw the set of instructions to be executed.

23. Which scenario describes the use of a public API?

  • It requires a license.
  • It can be used with no restrictions.
  • It is used between a visitor and its business partners.
  • It is used just within an system.

Caption: Public, or open, APIs have no restrictions and are bachelor to the public. Some API providers do require a user to obtain a costless primal or token prior to using the API in society to control the volume of API requests received and candy.

24. What is YAML?

  • It is a scripting linguistic communication.
  • Information technology is a information format and superset of JSON.
  • Information technology is a compiled programming language.
  • It is a web application.

Caption: Like JSON, YAML Ain't Markup Language (YAML) is a data format used by applications to store and transport data. YAML is considered a superset of JSON.

25. Which RESTFul operation corresponds to the HTTP GET method?

  • mail
  • patch
  • update
  • read

Caption: RESTful operations correspond to the following HTTP methods (shown to the left with the RESTful performance on the right):

  • POST > Create
  • GET > Read
  • PUT/PATCH > Update
  • DELETE > Delete

26. Which technology virtualizes the network command aeroplane and moves it to a centralized controller?​

  • SDN
  • fog computing
  • cloud computing
  • IaaS

Caption: Networking devices operate in two planes: the data plane and the control plane. The command aeroplane maintains Layer 2 and Layer three forwarding mechanisms using the CPU. The data plane forrad traffic flows. SDN virtualizes the command aeroplane and moves it to a centralized network controller.​

27. What are two functions of hypervisors? (Choose two.)

  • to sectionalisation the difficult bulldoze to run virtual machines
  • to manage virtual machines
  • to protect the host from malware infection from the virtual machines
  • to share the antivirus software across the virtual machines
  • to allocate physical organization resources to virtual machines

Explanation: The hypervisor does not protect the hosting OS from malware. Neither does it permit sharing software beyond virtual machines. The hard bulldoze of the supporting calculator does not need to be partitioned to run virtual machines. The hypervisor creates and manages virtual machines on a host computer and allocates physical system resources to them.

28. What is a difference betwixt the functions of Cloud calculating and virtualization?

  • Cloud computing requires hypervisor technology whereas virtualization is a error tolerance technology.
  • Cloud computing separates the awarding from the hardware whereas virtualization separates the OS from the underlying hardware.
  • Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections.
  • Deject computing utilizes data eye applied science whereas virtualization is not used in data centers.

Explanation: Cloud computing separates the awarding from the hardware. Virtualization separates the OS from the underlying hardware. Virtualization is a typical component within cloud computing. Virtualization is too widely used in data centers. Although the implementation of virtualization facilitates an piece of cake server fault tolerance setup, information technology is not a fault tolerance technology by design. The Internet connection from a data center or service provider needs redundant physical WAN connections to ISPs.​​

29. How is the YAML data format structure different from JSON?

  • Information technology uses indentations.
  • Information technology uses terminate tags.
  • It uses hierarchical levels of nesting.
  • It uses brackets and commas.

Explanation: The construction in YAML is defined by indentations rather than brackets and commas.

30. What is the most widely used API for spider web services?

  • XML-RPC
  • SOAP
  • JSON-RPC
  • Residual

Explanation: Residue accounts for more than eighty% of all API types used for web services, making it the most widely used web service API.

31. What is Balance?

  • It is a manner to store and interchange data in a structured format.
  • It is an architecture fashion for designing web service applications.
  • It is a human readable data structure that is used by applications for storing, transforming, and reading data.
  • Information technology is a protocol that allows administrators to manage nodes on an IP network.

Caption: REST is not a protocol or service, just rather a style of software architecture for designing web service applications.

32. What is a departure between the XML and HTML data formats?

  • XML does not use predefined tags whereas HTML does utilise predefined tags.
  • XML encloses data within a pair of tags whereas HTML uses a pair of quotation makes to enclose data.
  • XML formats data in binary whereas HTML formats data in manifestly text.
  • XML does non require indentation for each key/value pair only HTML does require indentation.

Caption: XML is a homo readable data structure used to store, transfer, and read information past applications. Like HTML, XML uses a related set of tags to enclose information. However, unlike HTML, XML uses no predefined tags or document construction.

33. To avoid purchasing new hardware, a visitor wants to accept advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?

  • dedicated servers
  • Cisco ACI
  • virtualization
  • software defined networking

34. Lucifer the term to the RESTful API request http://world wide web.mapquestapi.com/directions/v2/route?outFormat=json&fundamental=Key&from=San+Jose,Ca&to=Monterey,Ca component. (Not all options are used.)
CCNA 3 v7 Modules 13 - 14: Emerging Network Technologies Exam Answers 2

35. Which deject calculating opportunity would provide the use of network hardware such as routers and switches for a detail company?

  • software as a service (SaaS)
  • wireless every bit a service (WaaS)
  • infrastructure equally a service (IaaS)
  • browser equally a service (BaaS)

Caption: This particular is based on data independent in the presentation.
Routers, switches, and firewalls are infrastructure devices that can exist provided in the cloud.

36. What component is considered the brains of the ACI architecture and translates application policies​?

  • the Application Network Contour endpoints
  • the Nexus 9000 switch
  • the hypervisor​
  • the Application Policy Infrastructure Controller

Explanation: The ACI compages consists of three core components: the Application Network Profile, the Application Policy Infrastructure Controller, which serves as the brains of the ACI architecture, and the Cisco Nexus 9000 switch.

37. Which argument describes the concept of cloud calculating?

  • separation of management aeroplane from control plane
  • separation of control plane from data plane
  • separation of awarding from hardware
  • separation of operating system from hardware

Explanation: Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware.

38. In which situation would a partner API be advisable?

  • an cyberspace search engine allowing developers to integrate the search engine into their ain software applications
  • visitor sales staff accessing internal sales data from their mobile devices
  • someone creating an account on an external app or website past using his or her social media credentials
  • a vacation service site interacting with hotel databases to display information from all the hotels on its web site

Explanation: Partner API programs incorporate collaboration with other business organisation. They facilitate advice and integration of software between a company and its business partners.

39. Because of enormous growth in web traffic, a company has planned to purchase additional servers to assist handle the spider web traffic. What service or technology would support this requirement?

  • virtualization
  • data heart
  • deject services
  • dedicated servers

40. ABCTech is investigating the utilize of automation for some of its products. In club to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or engineering would support this requirement?

  • dedicated servers
  • software defined networking
  • virtualization
  • Cisco ACI

41. What are iii components used in the query portion of a typical RESTful API request? (Choose three.)

  • API server
  • format
  • parameters
  • key
  • protocol
  • resource

42. A visitor has recently become multinational. Employees are working remotely, in different time zones, and they need access to visitor services from any place at any fourth dimension. What service or technology would back up this requirement?

  • dedicated servers
  • cloud services
  • Cisco ACI
  • virtualization

43. Following a multicontinent advertizing campaign for a new product, a company finds its customer database and volume of orders are overloading its on-site figurer systems but the company does not take any room to expand. What service or technology would support this requirement?

  • cloud services
  • dedicated servers
  • data center
  • virtualization

44. A network administrator has been tasked with creating a disaster recovery plan. As part of this program, the ambassador is looking for a backup site for all of the data on the company servers. What service or engineering science would back up this requirement?

  • virtualization
  • software defined networking
  • data center
  • dedicated servers

45. Which is a requirement of a site-to-site VPN?

  • It requires hosts to use VPN client software to encapsulate traffic.
  • It requires a VPN gateway at each cease of the tunnel to encrypt and decrypt traffic.
  • It requires the placement of a VPN server at the edge of the company network.
  • Information technology requires a client/server compages.

Explanation: Site-to-site VPNs are static and are used to connect entire networks. Hosts take no cognition of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer gateway at the other end which decapsulates the traffic.

46. Which statement describes an of import feature of a site-to-site VPN?

  • It must be statically set up.
  • Afterward the initial connexion is established, it tin dynamically change connection information.
  • It requires using a VPN client on the host PC.
  • It is commonly implemented over dialup and cable modem networks.
  • It is ideally suited for use by mobile workers.

Explanation: A site-to-site VPN is created between the network devices of two dissever networks. The VPN is static and stays established. The internal hosts of the ii networks have no knowledge of the VPN.

47. Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a human being-in-the-heart attack?

  • DHCP
  • ICMP
  • DNS
  • HTTP or HTTPS

Explanation: A cybercriminal could set up a rogue DHCP server that provides i or more of the following:

  • Wrong default gateway that is used to create a man-in-the-middle attack and allow the attacker to intercept information
  • Incorrect DNS server that results in the user being sent to a malicious website
  • Invalid default gateway IP address that results in a denial of service assail on the DHCP client

48. In which TCP attack is the cybercriminal attempting to overwhelm a target host with one-half-open TCP connections?

  • reset attack
  • session hijacking set on
  • SYN flood set on
  • port browse attack

Explanation: In a TCP SYN overflowing set on, the attacker sends to the target host a continuous alluvion of TCP SYN session requests with a spoofed source IP address. The target host responds with a TCP-SYN-ACK to each of the SYN session requests and waits for a TCP ACK that volition never arrive. Eventually the target is overwhelmed with half-open TCP connections.

49. Which statement describes a VPN?

  • VPNs employ logical connections to create public networks through the Internet.
  • VPNs employ open source virtualization software to create the tunnel through the Net.
  • VPNs use defended concrete connections to transfer data between remote users.
  • VPNs employ virtual connections to create a private network through a public network.

Explanation: A VPN is a private network that is created over a public network. Instead of using dedicated physical connections, a VPN uses virtual connections routed through a public network betwixt two network devices.

Which Statement Best Describes This Public Service Campaign?,

Source: https://itexamanswers.net/ccna-3-v7-modules-13-14-emerging-network-technologies-exam-answers.html

Posted by: parentsectirepas.blogspot.com

0 Response to "Which Statement Best Describes This Public Service Campaign?"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel