Quiz CCNA 4, Chapter 7 Exam

25 Questions | Total Attempts: 222

SettingsSettingsSettings
CCNA Quizzes & Trivia

If you are looking for revision material for the CCNA exam it is advisable to revise chapter-by-chapter so that you can go back and read the parts you didn’t get right. The CCNA 4 chapter seven exam below is designed to help you refresh your memory. Try it out and all the best!


Questions and Answers
  • 1. 
    What is an example of an M2M connection in the IoT?
    • A. 

      A user sends an email over the Internet to a friend.

    • B. 

      An automated alarm system in a campus sends fire alarm messages to all students and staff.

    • C. 

      Sensors in a warehouse communicate with each other and send data to a server block in the cloud.

    • D. 

      Redundant servers communicate with each other to determine which server should be active or standby.

  • 2. 
    What is the term for the extension of the existing Internet structure to billions of connected devices?
    • A. 

      SCADA

    • B. 

      digitization

    • C. 

      IoT

    • D. 

      M2M

  • 3. 
    Which statement describes the Cisco IoT System?
    • A. 

      It is an advanced routing protocol for cloud computing.It is an advanced routing protocol for cloud computing.It is an advanced routing protocol for cloud computing.It is an advanced routing protocol for cloud computing.

    • B. 

      It is a switch operating system to integrate many Layer 2 security features.

    • C. 

      It is a router operating system combining IOS and Linux for fog computing.

    • D. 

      It is an infrastructure to manage large scale systems of very different endpoints and platforms.

  • 4. 
    Which three network models are described in the fog computing pillar of the Cisco IoT System? (Choose three.)
    • A. 

      P2P

    • B. 

      peer-to-peer

    • C. 

      client/server

    • D. 

      Fog computing

    • E. 

      enterprise WAN

    • F. 

      cloud computing

  • 5. 
    Which IoT pillar extends cloud connectivity closer to the network edge?
    • A. 

      Management and automation pillar

    • B. 

      application enablement platform pillar

    • C. 

      Network connectivity pillar

    • D. 

      Fog computing pillar

  • 6. 
    Which cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines?
    • A. 

      IoT physical security

    • B. 

      IoT network security

    • C. 

      Cloud computing security

    • D. 

      operational technology specific security

  • 7. 
    Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?
    • A. 

      browser as a service (BaaS)

    • B. 

      Infrastructure as a service (IaaS)

    • C. 

      Software as a service (SaaS)

    • D. 

      Wireless as a service (WaaS)

  • 8. 
    What technology allows users to access data anywhere and at any time?
    • A. 

      Cloud computing

    • B. 

      data analytics

    • C. 

      virtualization

    • D. 

      micromarketing

  • 9. 
    What statement describes Fog computing?
    • A. 

      It supports larger networks than Cloud computing does.

    • B. 

      It creates a distributed computing infrastructure that provides services close to the network edge.

    • C. 

      It requires Cloud computing services to support non-IP enabled sensors and controllers.

    • D. 

      It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center.

  • 10. 
    Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?
    • A. 

      PaaS

    • B. 

      SaaS

    • C. 

      ITaaS

    • D. 

      IaaS

  • 11. 
    Which cloud model provides services for a specific organization or entity?
    • A. 

      a private cloud

    • B. 

      A hybrid cloud

    • C. 

      a community cloud

    • D. 

      a public cloud

  • 12. 
    How does virtualization help with disaster recovery within a data center?
    • A. 

      support of live migration

    • B. 

      Guarantee of power

    • C. 

      supply of consistent air flow

    • D. 

      improvement of business practices

  • 13. 
    What is a difference between the functions of Cloud computing and virtualization?
    • A. 

      Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

    • B. 

      Cloud computing utilizes data center technology whereas virtualization is not used in data centers.

    • C. 

      Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology.

    • D. 

      Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections.

  • 14. 
    Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)
    • A. 

      physical footprint

    • B. 

      Server hardware needs

    • C. 

      power and air conditioning

    • D. 

      Operating system license requirements

    • E. 

      virus and spyware attacks

  • 15. 
    Which statement describes the concept of cloud computing?
    • A. 

      Separation of application from hardware

    • B. 

      separation of operating system from hardware

    • C. 

      separation of control plane from data plane

    • D. 

      separation of management plane from control plane

  • 16. 
    Which is a characteristic of a Type 2 hypervisor?​
    • A. 

      best suited for enterprise environments

    • B. 

      installs directly on hardware

    • C. 

      has direct access to server hardware resources

    • D. 

      does not require management console software

  • 17. 
    Which is a characteristic of a Type 1 hypervisor?​
    • A. 

      installed directly on a server​

    • B. 

      does not require management console software

    • C. 

      installed on an existing operating system

    • D. 

      best suited for consumers and not for an enterprise environment

  • 18. 
    How is the control plane modified to operate with network virtualization?
    • A. 

      Control plane redundancy is added to each network device.

    • B. 

      The control plane function is consolidated into a centralized controller.

    • C. 

      A hypervisor is installed in each device to allow multiple instances of the control plane.

    • D. 

      The control plane on each device is interconnected to a dedicated high-speed network.

  • 19. 
    Which technology virtualizes the network control plane and moves it to a centralized controller?​
    • A. 

      SDN

    • B. 

      IaaS

    • C. 

      Cloud computing

    • D. 

      Fog computing

  • 20. 
    Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​
    • A. 

      Layer 1

    • B. 

      Layer 2

    • C. 

      Layer 3

    • D. 

      Layer 4

    • E. 

      Layer 5

  • 21. 
    What pre-populates the FIB on Cisco devices that use CEF to process packets?
    • A. 

      The routing table

    • B. 

      The ARP table

    • C. 

      The DSP

    • D. 

      The adjacency table

  • 22. 
    Which type of hypervisor would most likely be used in a data center?
    • A. 

      Type 1

    • B. 

      Type 2

    • C. 

      Nexus

    • D. 

      Hadoop

  • 23. 
    What component is considered the brains of the ACI architecture and translates application policies​?
    • A. 

      The Nexus 9000 switch

    • B. 

      the Application Policy Infrastructure Controller

    • C. 

      The Application Network Profile endpoints

    • D. 

      the hypervisor​

  • 24. 
    Fill in the blank.In an IoT implementation, devices will be connected to a  ______network to share the same infrastructure and to facilitate communications, analytics, and management.
  • 25. 
    Fill in the blank.In a scenario where a user with a laptop running the Mac OS installs a Windows virtual OS instance, the user is implementing a Type  ____  hypervisor.
Related Topics
Back to Top Back to top