click below
click below
Normal Size Small Size show me how
Module 13-14
| Question | Answer |
|---|---|
| A company uses a cloud-based payroll system. Which cloud computing technology is this company using? | software as a service (SaaS) |
| 2. For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model? | There are significant data exchanges between virtual servers. |
| 3. Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network? | control plane |
| 4. Which network traffic management technology is a basic element in SDN implementations? | OpenFlow |
| 5. Which type of hypervisor would most likely be used in a data center? | Type 1 |
| 6. Which is a characteristic of a Type 1 hypervisor? | installed directly on a server |
| 7. Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.) | Layer 2 Layer 3 |
| 8. What pre-populates the FIB on Cisco devices that use CEF to process packets? | the routing table |
| 9. What is a function of the data plane of a network device? | forwarding traffic flows |
| 10. Which statement describes the concept of cloud computing? | separation of application from hardware |
| 11. Which cloud model provides services for a specific organization or entity? | private cloud |
| 12. What two benefits are gained when an organization adopts cloud computing and virtualization? (Choose two.) | provides a “pay-as-you-go” model, allowing organizations to treat computing and storage expenses as a utility enables rapid responses to increasing data volume requirements |
| 13. Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance? | type 2 |
| 14. A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.) | The company only needs to pay for the amount The company does not need to be concerned about how to handle increasing data storage and processing demands The company can increase processing and storage capacity as needed then decrease capacity |
| 15. How does virtualization help with disaster recovery within a data center? | support of live migration |
| 16. What technology allows users to access data anywhere and at any time? | Cloud computing |
| 17. Which action takes place in the assurance element of the IBN model? | verification and corrective action |
| 18. Refer to the exhibit. Which data format is used to represent the data for network automation applications? | JSON |
| 19. What is the function of the key contained in most RESTful APIs? | It is used to authenticate the requesting source. |
| 20. Which two configuration management tools are developed using Ruby? (Choose two.) | Puppet and Chef |
| 21. Which term is used to describe a set of instructions for execution by the configuration management tool Puppet? | Manifest |
| 22. Which term is used to describe a set of instructions for execution by the configuration management tool SaltStack? | Pillar |
| 23. Which scenario describes the use of a public API? | It can be used with no restrictions. |
| 24. What is YAML? | It is a data format and superset of JSON. |
| 25. Which RESTFul operation corresponds to the HTTP GET method? | read |
| 26. Which technology virtualizes the network control plane and moves it to a centralized controller? | SDN |
| 27. What are two functions of hypervisors? (Choose two.) | to manage virtual machines to allocate physical system resources to virtual machines |
| 28. What is a difference between the functions of Cloud computing and virtualization? | Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware. |
| 29. How is the YAML data format structure different from JSON? | It uses indentations. |
| 30. What is the most widely used API for web services? | REST |
| 31. What is REST? | It is an architecture style for designing web service applications. |
| 32. What is a difference between the XML and HTML data formats? | XML does not use predefined tags whereas HTML does use predefined tags. |
| To avoid purchasing hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for operating systems on a hardware platform. What service or technology would support this requirement? | virtualization |
| 35. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company? | infrastructure as a service (IaaS) |
| 36. What component is considered the brains of the ACI architecture and translates application policies? | the Application Policy Infrastructure Controller |
| 37. Which statement describes the concept of cloud computing? | separation of application from hardware |
| 38. In which situation would a partner API be appropriate? | a vacation service site interacting with hotel databases to display information from all the hotels on its web site |
| 39. Because of enormous growth in web traffic, a company has planned to purchase additional servers to help handle the web traffic. What service or technology would support this requirement? | dedicated servers |
| 40. ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement? | virtualization |
| 41. What are three components used in the query portion of a typical RESTful API request? (Choose three.) | format, parameters, key |
| 42. A company has recently become multinational. Employees are working remotely, in different time zones, and they need access to company services from any place at any time. What service or technology would support this requirement? | cloud services |
| After an advertising campaign for a new product, a company finds its client database and volume of orders overloading its on-site computer systems but the company does not have room to expand. What service or technology would support this requirement? | cloud services |
| 44. A network administrator is tasked with creating a disaster recovery plan. As part of this plan, the administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement? | data center |
| 45. Which is a requirement of a site-to-site VPN? | It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic. |
| 46. Which statement describes an important characteristic of a site-to-site VPN? | It must be statically set up. |
| 47. Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack? | DHCP |
| 48. In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections? | SYN flood attack |
| 49. Which statement describes a VPN? | VPNs use virtual connections to create a private network through a public network. |
| (1) resources (2)parameters (3) query (4)API servers (5)format (6) key | (1) directions (2) from=San+Jose (3) outFormat=json&key (4) key=key |