0% found this document useful (0 votes)
344 views9 pages

CISCO Introduction to IoT Chapter 1 Quiz Answers

Uploaded by

Rasel Mia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
344 views9 pages

CISCO Introduction to IoT Chapter 1 Quiz Answers

Uploaded by

Rasel Mia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

CISCO Introduction to IoT Chapter 1 Quiz Answers

What is needed in a smart home to connect sensors and smart devices to a


network?
home gateway

What allows digital devices to interconnect and transmit data?


a network

What information is conveyed by the SSID that is configured on an IoT


device?
the wireless network

What is a sensor?
a device that detects or measures an event or physical property

Which type of wireless network is used to connect devices within a city to


create a metropolitan-area network (MAN)?
WiMAX

What is the core component of Intent-Based Networking?


artificial intelligence

What is comprised of millions of smart devices and sensors connected to the


internet?
the Internet of Things

True or False? Once connected to the home gateway, smart devices can be
controlled from a smartphone, tablet, or PC.
true

What type of device could allow a refrigerator to place a replacement order


for an item contained within it?
sensor

True or False? The Internet of Things can help organizations improve the
efficiency and productivity of manufacturing processes and operations.
true

Which type of computing is located at the edge of a business or corporate


network and that allows data from sensors to be preprocessed?
fog

Which tool allows a user to simulate real networks?


Packet Tracer
Which type of network is used to connect a company located in one area of a
city to another location in a city far away?
WAN

Which command is used to test network connectivity and provide a response


to each packet received by the remote host?
ping

True or False? The Internet of Things will connect inanimate objects to the
network with intelligent sensors.
true

CISCO Introduction to IoT Chapter 2 Quiz Answers

What output is expected when the function that is shown below is entered in
a Python program interpreter? >>>print Cisco 1
"SyntaxError: Missing parentheses in call to 'print'"

A student has a digitized version of an idea for a product. What machine can
the student use to turn the idea into a solid object?
3D printer

Refer to the exhibit. What does the exhibited flow chart symbol represent?
process

Refer to the exhibit. What does the exhibited flow chart symbol commonly
represent?
decision

What are two resources that could help someone learn to program? (Choose
two.)
Code Academy
Khan Academy

What is displayed after the following code is entered into a Python


interpreter? addition = 22 +10 print(addition)
32

Refer to the exhibit. A specific Blockly block has a slot on the top. What is the
purpose of this slot?
The slot allows a block with a bevel tab on the bottom to be
connected above the block shown.
What is one way to pay for prototyping?
crowd funding

Which Python programming function is used to display output?


print

What is Blockly?
a programming tool for beginners

How is a new variable created in Blockly?


Drag the variable block onto the work space area.

What is used to illustrate how a given process will run?


flow chart

Which output would be displayed if the code that is shown below is entered
in a Python interpreter?
It shows "SyntaxError"

Which platform is a low cost, credit-card-sized computer?


Raspberry Pi

What is the output when the following code is entered into a Python program
interpreter? [1,2,4,5] + [3,6]
[1,2,4,5,3,6]

CISCO Introduction to IoT Chapter 3 Quiz Answers

Which attribute of big data involves an exponential data growth rate?


velocity

True of False? Structured data is easier to analyze and store than


unstructured data.
true

What characterizes data management problems associated with big data


storage?
generating and collecting data from multiple sources

What are three features of Hadoop? (Choose three.)


automatic replication of data across clusters
uses HDFS as a fault tolerant file system
easily scalable cluster sizes
What is the process of discovering patterns and relationships in large data
sets in order to convert raw data into meaningful information?
data mining

A business is analyzing sales information as the sales data is being


generated from the point-of-sale (POS) machines. What type of data is
captured and processed as the events happen?
transactional data

True or False? Distributed data processing involves large databases being


centrally processed by powerful mainframe computers and stored in giant
disk arrays.
false

Which challenge of big data storage is characterized by the need to make


data accessible from anywhere at anytime?
access

What type of data is being collected when an organization is using


spreadsheets and forms for data input?
structured data

Making data accessible to only authorized users addresses which data


storage problem associated with big data?
security

An organization is concerned with the amount of sensor data that is being


generated locally, analyzed in the cloud, and returned for processing at the
local site. Which solution will keep the data closer to the source for
preprocessing?
fog computing

Which type of data can be used by a business to support managerial analysis


tasks and organizational decision making?
analyzed data

True or False? Web scraping tools are used to extract and manipulate
structured data.
false

True or False? Data is defined as big data if it is more than 1 petabyte.


false

What is cloud computing?


a system of data centers or connected servers that provide
anywhere/anytime access to data and applications
CISCO Introduction to IoT Chapter 4 Quiz Answers

What term is used to describe the intelligence demonstrated by machines?


artificial intelligence

What is a key feature of the translation element of the intent-based


networking model?
application of business intent to network configuration

What three technologies control network functions to accomplish a desired


intent in an intent based network? (Choose three.)
automation
artificial intelligence
machine learning

What is a requirement for a device to be referred to as a smart device?


The device can make a decision or take a course of action based on
outside information.

Which ML technology can be used to identify and track individual persons?


facial recognition

Which technology uses AI and other technologies to reconfigure a network to


comply with service levels? Correct Answer
IBN

Which element of the IBN model orchestrates policies and configures


systems?
activation

True or False? An appliance that lowers power consumption during peak


demand is considered a smart device.
true

Which field has traditionally been tied to automation?


robotics

What is artificial intelligence?


the ability of a device to "learn" based on code and provided data

Which technology enables features such as speech recognition, product


recommendations, and credit card fraud detection?
machine learning
What are two characteristics of artificial intelligence? (Choose two.)
It uses systems that mimic human cognitive functions such as
learning and problem solving.
It uses intelligent agents that interact with the environment and
make decisions to reach a specific goal.

What are two examples of automation? (Choose two.)


A building automatically adjusts the heating and lights based the
routine of the occupants.
A robot cleans up an industrial chemical spill.

Which two applications commonly use ML technology? (Choose two.)


credit card fraud detection
speech recognition

Which action takes place in the assurance element of the IBN model?
verification and corrective action

CISCO Introduction to IoT Chapter 5 Quiz Answers

What are two recommended steps to protect and secure a wireless network?
(Choose two.)
Update firmware.
Use WPA2-AES encryption.

Which three passwords are the least secure? (Choose three.)


135792468
randolph
asdfghjkl

Match the security best practice to the description.


implementing human resource security measures : research and perform
background checks on employees
employing access controls: assign user roles and privilege levels
educating users: train users on security
regularly testing incident responses: perform and test emergency
response scenarios

What is a wireless router security best practice that limits access to only
specific internal hosts?
MAC address filtering
What are three examples of personally identifiable information? (Choose
three.)
bank account number
birth date
vehicle identification number

How can a virtual assistant be a security risk?


Personal information could be leaked.

Which two online activities pose high security risks? (Choose two.)
following email links that have already been scanned by the email
server
sharing information on social media

Which three elements should be combined when creating a strong


password? (Choose three.)
special characters
combinations of letters and numbers
phrases

What is the goal of a white hat hacker?


protecting data

What is a goal of performing a risk assessment?


valuing assets to justify security expenditures

Which action can help reduce online risk?


only conduct transactions on websites after verifying the URL is
correct

How are USB flash drives a security risk?


They have a controller that can be infected.

Why would an IT person use Zabasearch?


to research a person

What is used to identify a wireless network?


SSID

An employee is using a coffee shop Wi-Fi hotspot to access corporate email.


What action can the employee take to reduce the security risk of using a
hotspot?
Encrypt traffic through a VPN.
CISCO Introduction to IoT Chapter 6 Quiz Answers

What is the primary focus of the CCNA Routing and Switching curriculum that
is available through the Cisco Networking Academy?
It provides learners to have a comprehensive overview of
networking concepts and skills.

What is the primary focus of the IoT fundamentals courses available through
Cisco Networking Academy curriculum?
The courses teach learners how to connect sensors to the cloud,
analyze big data, and securely collect data.

True or False? Even though IoT is considered an enabling technology, not all
jobs created are IT-related.
true

How many students have been trained through Cisco Networking academies
to date?
5 million

What is the primary focus of the IT Essentials course available through the
Cisco Academy curriculum?
It teaches learners the fundamentals of computer hardware and
software.

How many countries have Cisco Networking Academies helping individuals


prepare for industry-recognized certifications and mastering IT skills?
180

Which IoT-related job would deal with the development and implementation
of the underlying technologies within the digital world?
enablers

What is a Cisco developer program community that allows the user to learn,
connect, inspire, and code and consists of coordinated developer tools, and
sandboxes?
Cisco Learning Network

Which series of Cisco Networking Academy courses is designed to develop


skills for securely collecting data, connecting sensors to the cloud, and
analyzing big data?
IoT Fundamentals

Which IT community is a collection of resources designed for people who


wish to develop skills and pursue a Cisco certification?
Cisco Learning Network
Enablers develop and implement the underlying technology.
Engagers design, create, integrate, and deliver IoT services to customers.
Enhancers devise their own value-added services, on top of the services provided by engagers
that are unique to the Internet of Things.

You might also like