itexamanswers-net-ccna-3-v7-modules-13-14-emerging-network-technologies-exam-answers-html
itexamanswers-net-ccna-3-v7-modules-13-14-emerging-network-technologies-exam-answers-html
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question
to find that question/answer. If the question is not here, find it in Questions Bank.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in the
shortest time. Thank you! We truly value your contribution to the website.
browser as a service (BaaS)
infrastructure as a service (IaaS)
software as a service (SaaS)
wireless as a service (WaaS)
21 2. For a data center, what is the difference in the server virtualization data traffic compared
System Test Exam
with the traditional client-server model?
Modules 1 - 3: Basic Network
Connectivity and Communications
x
Exam Answers
Type 2
Type 1
Nexus
Hadoop
Explanation: The two type of hypervisors are Type 1 and Type 2. Type 1 hypervisors are
usually used on enterprise servers. Enterprise servers rather than virtualized PCs are more
likely to be in a data center.
Explanation: Type 1 hypervisors are installed directly on a server and are known as “bare
metal” solutions giving direct access to hardware resources. They also require a
management console and are best suited for enterprise environments.
7. Which two layers of the OSI model are associated with SDN network control plane
functions that make forwarding decisions? (Choose two.)
21 Related Posts
4.4.6 Check Your Understanding – Types of IPv4
ACLs Answers
x Understanding – Guidelines
4.3.3 Check Your
for ACL Creation Answers
Layer 1
4.2.5 Check Your Understanding – Wildcard
Layer 2
Masks in ACLs Answers
Layer 3 2.7.3 Packet Tracer – OSPF Multiarea
Layer 4 Exploration – Physical Mode (Part 3) Answers
Layer 5
10.3.4 Packet Tracer – Configure and Verify
NTP (Answers)
Explanation: The SDN control plane uses the Layer 2 ARP table and the Layer 3 routing
12.2.8 Check Your Understanding –
table to make decisions about forwarding traffic. Troubleshooting Process Answers
Explanation: Networking devices operate in two planes; the data plane and the control
plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the
CPU. The data plane forwards traffic flows.
Explanation: Cloud computing is used to separate the application or service from hardware.
Virtualization separates the operating system from the hardware.
11. Which cloud model provides services for a specific organization or entity?
a public cloud
a hybrid cloud
a private cloud
a community cloud
Explanation: Private clouds are used to provide services and applications to a specific
organization and may be set up within the private network of the organization or managed by
an outside organization.
21 12. What two benefits are gained when an organization adopts cloud computing and
virtualization? (Choose two.)
13. Which type of Hypervisor is implemented when a user with a laptop running the Mac
OS installs a Windows virtual OS instance?
type 2
virtual machine
type 1
bare metal
Explanation: Type 2 hypervisors, also know as hosted hypervisors, are installed on top of
an existing operating system, such as Mac OS, Windows, or Linux.
14. A small company is considering moving many of its data center functions to the cloud.
What are three advantages of this plan? (Choose three.)
The company only needs to pay for the amount of processing and storage capacity
that it uses.
Cloud services are billed at a fixed fee no matter how much processing and storage are
used by the company.
The company does not need to be concerned about how to handle increasing data
storage and processing demands with in-house data center equipment.
The company can increase processing and storage capacity as needed and then
decrease capacity when it is no longer needed.
Single-tenant data centers can easily grow to accommodate increasing data storage
requirements.
Cloud services enable the company to own and administer its own servers and storage
devices.
Explanation: Cloud computing offers many advantages to the company. Since the cloud
data storage and processing facilities are owned by third-parties, the company does not
need to be concerned about how it will handle increasing data storage and processing
demands with its own data center equipment. The company can easily increase or decrease
processing power and storage capacity based on need. Also, cloud services are billed by
usage, so the company does not have the costs of supporting its own expensive data center
that is not always used to maximum capacity.
15. How does virtualization help with disaster recovery within a data center?
21
16. What technology allows users to access data anywhere and at any time?
Cloud computing
virtualization
micromarketing
data analytics
Explanation: Cloud computing allows organizations to eliminate the need for on-site IT
equipment, maintenance, and management. Cloud computing allows organizations to
expand their services or capabilities while avoiding the increased costs of energy and space.
17. Which action takes place in the assurance element of the IBN model?
Explanation: The assurance element of the IBN model is concerned with end-to-end
verification of network-wide behavior.
18. Refer to the exhibit. Which data format is used to represent the data for network
automation applications?
XML
YAML
HTML
JSON
Explanation: The common data formats that are used in many applications including
network automation and programmability are as follows:
JavaScript Object Notation (JSON) – In JSON, the data known as an object is one or
more key/value pairs enclosed in braces { }. Keys must be strings within double quotation
marks ” “. Keys and values are separated by a colon.
eXtensible Markup Language (XML) – In XML, the data is enclosed within a related
set of tags <tag>data</tag>.
YAML Ain’t Markup Language (YAML) – In YAML, the data known as an object is one
or more key value pairs. Key value pairs are separated by a colon without the use of
quotation marks. YAML uses indentation to define its structure, without the use of brackets
or commas.
19. What is the function of the key contained in most RESTful APIs?
21
x
It is the top-level object of the API query.
It is used to authenticate the requesting source.
It represents the main query components in the API request.
It is used in the encryption of the message by an API request.
Explanation: Many RESTful APIs, including public APIs, require a key. The key is used to
identify the source of the request through authentication.
20. Which two configuration management tools are developed using Ruby? (Choose two.)
Puppet
Ansible
SaltStack
Chef
RESTCONF
Explanation: Chef and Puppet are configuration management tools developed using Ruby.
Ansible and SaltStack are configuration management tools developed using Python. Ruby is
typically considered a more difficult language to learn than Python. RESTCONF is a network
management protocol.
21. Which term is used to describe a set of instructions for execution by the configuration
management tool Puppet?
Playbook
Cookbook
Manifest
Pillar
Explanation: The configuration management tool Puppet uses the name Manifest to
describe the set of instructions to be executed.
22. Which term is used to describe a set of instructions for execution by the configuration
management tool SaltStack?
Cookbook
Manifest
Pillar
Playbook
Explanation: The configuration management tool SaltStack uses the name Pillar to describe
the set of instructions to be executed.
It requires a license.
It can be used with no restrictions.
It is used between a company and its business partners.
It is used only within an organization.
Explanation: Public, or open, APIs have no restrictions and are available to the public.
21 Some API providers do require a user to obtain a free key or token prior to using the API in
order to control the volume of API requests received and processed.
Explanation: Like JSON, YAML Ain’t Markup Language (YAML) is a data format used by
applications to store and transport data. YAML is considered a superset of JSON.
post
patch
update
read
Explanation: RESTful operations correspond to the following HTTP methods (shown to the
left with the RESTful operation on the right):
POST > Create
GET > Read
PUT/PATCH > Update
DELETE > Delete
26. Which technology virtualizes the network control plane and moves it to a centralized
controller?
SDN
fog computing
cloud computing
IaaS
Explanation: Networking devices operate in two planes: the data plane and the control
plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the
CPU. The data plane forwards traffic flows. SDN virtualizes the control plane and moves it to
a centralized network controller.
Explanation: The hypervisor does not protect the hosting OS from malware. Neither does it
allow sharing software across virtual machines. The hard drive of the supporting computer
does not need to be partitioned to run virtual machines. The hypervisor creates and
manages virtual machines on a host computer and allocates physical system resources to
them.
28. What is a difference between the functions of Cloud computing and virtualization?
29. How is the YAML data format structure different from JSON?
It uses indentations.
It uses end tags.
It uses hierarchical levels of nesting.
It uses brackets and commas.
Explanation: The structure in YAML is defined by indentations rather than brackets and
commas.
30. What is the most widely used API for web services?
XML-RPC
SOAP
JSON-RPC
REST
Explanation: REST accounts for more than 80% of all API types used for web services,
making it the most widely used web service API.
Explanation: REST is not a protocol or service, but rather a style of software architecture for
designing web service applications.
32. What is a difference between the XML and HTML data formats?
XML does not use predefined tags whereas HTML does use predefined tags.
XML encloses data within a pair of tags whereas HTML uses a pair of quotation makes to
enclose data.
XML formats data in binary whereas HTML formats data in plain text.
XML does not require indentation for each key/value pair but HTML does require
indentation.
Explanation: XML is a human readable data structure used to store, transfer, and read data
by applications. Like HTML, XML uses a related set of tags to enclose data. However, unlike
HTML, XML uses no predefined tags or document structure.
21
33. To avoid purchasing new hardware, a company wants to take advantage of idle system
resources and consolidate the number of servers while allowing for multiple operating
systems on a single hardware platform. What service or technology would support this
requirement?
x
dedicated servers
Cisco ACI
virtualization
software defined networking
34. Match the term to the RESTful API request
http://www.mapquestapi.com/directions/v2/route?
outFormat=json&key=KEY&from=San+Jose,Ca&to=Monterey,Ca component. (Not all
options are used.)
35. Which cloud computing opportunity would provide the use of network hardware such
as routers and switches for a particular company?
36. What component is considered the brains of the ACI architecture and translates
application policies?
Explanation: Cloud computing is used to separate the application or service from hardware.
Virtualization separates the operating system from the hardware.
an internet search engine allowing developers to integrate the search engine into their own
software applications
company sales staff accessing internal sales data from their mobile devices
someone creating an account on an external app or website by using his or her social media
credentials
a vacation service site interacting with hotel databases to display information from all
the hotels on its web site
Explanation: Partner API programs incorporate collaboration with other business. They
facilitate communication and integration of software between a company and its business
partners.
39. Because of enormous growth in web traffic, a company has planned to purchase
additional servers to help handle the web traffic. What service or technology would
support this requirement?
virtualization
data center
cloud services
dedicated servers
40. ABCTech is investigating the use of automation for some of its products. In order to
control and test these products, the programmers require Windows, Linux, and MAC OS
on their computers. What service or technology would support this requirement?
dedicated servers
software defined networking
virtualization
Cisco ACI
41. What are three components used in the query portion of a typical RESTful API
request? (Choose three.)
API server
format
parameters
key
protocol
resources
42. A company has recently become multinational. Employees are working remotely, in
different time zones, and they need access to company services from any place at any
time. What service or technology would support this requirement?
dedicated servers
cloud services
Cisco ACI
virtualization
43. Following a multicontinent advertising campaign for a new product, a company finds
its client database and volume of orders are overloading its on-site computer systems but
the company does not have any room to expand. What service or technology would
support this requirement?
21 cloud services
dedicated servers
data center
virtualization
44. A network administrator has been tasked with creating a disaster recovery plan. As x
part of this plan, the administrator is looking for a backup site for all of the data on the
company servers. What service or technology would support this requirement?
virtualization
software defined networking
data center
dedicated servers
45. Which is a requirement of a site-to-site VPN?
Explanation: Site-to-site VPNs are static and are used to connect entire networks. Hosts
have no knowledge of the VPN and send TCP/IP traffic to VPN gateways. The VPN gateway
is responsible for encapsulating the traffic and forwarding it through the VPN tunnel to a peer
gateway at the other end which decapsulates the traffic.
Explanation: A site-to-site VPN is created between the network devices of two separate
networks. The VPN is static and stays established. The internal hosts of the two networks
have no knowledge of the VPN.
47. Which protocol is attacked when a cybercriminal provides an invalid gateway in order
to create a man-in-the-middle attack?
DHCP
ICMP
DNS
HTTP or HTTPS
Explanation: A cybercriminal could set up a rogue DHCP server that provides one or more
of the following:
Wrong default gateway that is used to create a man-in-the-middle attack and allow the
attacker to intercept data
Wrong DNS server that results in the user being sent to a malicious website
Invalid default gateway IP address that results in a denial of service attack on the
DHCP client
48. In which TCP attack is the cybercriminal attempting to overwhelm a target host with
21
half-open TCP connections?
reset attack
session hijacking attack
SYN flood attack x
port scan attack
Explanation: In a TCP SYN flood attack, the attacker sends to the target host a continuous
flood of TCP SYN session requests with a spoofed source IP address. The target host
responds with a TCP-SYN-ACK to each of the SYN session requests and waits for a TCP
ACK that will never arrive. Eventually the target is overwhelmed with half-open TCP
connections.
VPNs use logical connections to create public networks through the Internet.
VPNs use open source virtualization software to create the tunnel through the Internet.
VPNs use dedicated physical connections to transfer data between remote users.
VPNs use virtual connections to create a private network through a public network.
Explanation: A VPN is a private network that is created over a public network. Instead of
using dedicated physical connections, a VPN uses virtual connections routed through a
public network between two network devices.
report this ad
21 COMMENTS
21 1 -3 Reply
1 -1 Reply
Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create
a man-in-the-middle attack?
DHCP
ICMP
DNS
HTTP or HTTPS
0 -1 Reply
In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open
TCP connections?
reset attack
session hijacking attack
SYN flood attack
port scan attack
Navigation Bar
1 -1 Reply
VPNs use logical connections to create public networks through the Internet.
VPNs use open source virtualization software to create the tunnel through the Internet.
VPNs use dedicated physical connections to transfer data between remote users.
VPNs use virtual connections to create a private network through a public
network.
0 -2 Reply
3 -1 Reply
data analytics
micromarketing
Cloud computing
virtualization
0 0 Reply
Following a multicontinent advertising campaign for a new product, a company finds its client
database and volume of orders are overloading its on-site computer systems but the company
does not have any room to expand. What service or technology would support this
requirement?
– cloud services <—-
– dedicated servers
– data center
– virtualization
0 0 Reply
A network administrator has been tasked with creating a disaster recovery plan. As part of this
plan, the administrator is looking for a backup site for all of the data on the company servers.
What service or technology would support this requirement?
virtualization
software defined networking
data center <—-
dedicated servers
0 0 Reply
Following a multicontinent advertising campaign for a new product, a company finds its client
database and volume of orders are overloading its on-site computer systems but the company
does not have any room to expand. What service or technology would support this
requirement?
virtualization
cloud services
dedicated servers
data center
0 0 Reply
ABCTech is investigating the use of automation for some of its products. In order to control
and test these products, the programmers require Windows, Linux, and MAC OS on their
computers. What service or technology would support this requirement?
dedicated servers
data center
virtualization
0 0 Reply
A company has recently become multinational. Employees are working remotely, in different
time zones, and they need access to company services from any place at any time. What
service or technology would support this requirement?
dedicated servers
21
cloud services
Cisco ACI
virtualization
x
0 0 Reply
Fccna 2 years ago
What are three components used in the query portion of a typical RESTful API request?
(Choose three.)
-API server
-format
-parameters
-key
-protocol
-resources
0 0 Reply
0 0 Reply
ABCTech is investigating the use of automation for some of its products. In order to control
and test these products, the programmers require Windows, Linux, and MAC OS on their
computers. What service or technology would support this requirement?
dedicated servers
software defined networking
-> virtualization
Cisco ACI
2 0 Reply
12 0 Reply
A company has recently become multinational. Employees are working remotely, in different
time zones, and they need access to company services from any place at any time. What
service or technology would support this requirement?
1 0 Reply
1 0 Reply
HI HOPE YOU ARE GOOD !!!! I’am kindly asking the final exam for the new ccna , enterprise
networking,security, and automation
1 0 Reply
21