CCNA 4 v6.0 R&S Connecting Networks CN Chapter 7 Exam Online
CCNA 4 v6.0 CN Chapter 7 Exam Training | |
---|---|
Time | 30 minutes |
Questions | 25 |
Leaderboard: CCNA 4 v6.0 Chapter 7 Exam
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
Time limit: 0
Quiz-summary
0 of 25 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
Information
CCNA 4 v6.0 Chapter 7 Exam
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 25 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
Your result has been entered into leaderboard
Loading
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Answered
- Review
-
Question 1 of 25
1. Question
1 pointsWhat is an example of an M2M connection in the IoT?
Correct
Incorrect
-
Question 2 of 25
2. Question
1 pointsWhat is the term for the extension of the existing Internet structure to billions of connected devices?
Correct
Incorrect
-
Question 3 of 25
3. Question
1 pointsWhich statement describes the Cisco IoT System?
Correct
Incorrect
-
Question 4 of 25
4. Question
3 pointsWhich three network models are described in the fog computing pillar of the Cisco IoT System? (Choose three.)
Correct
Incorrect
-
Question 5 of 25
5. Question
1 pointsWhich IoT pillar extends cloud connectivity closer to the network edge?
Correct
Incorrect
-
Question 6 of 25
6. Question
1 pointsWhich cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines?
Correct
Incorrect
-
Question 7 of 25
7. Question
1 pointsWhich cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?
Correct
Incorrect
-
Question 8 of 25
8. Question
1 pointsWhat technology allows users to access data anywhere and at any time?
Correct
Incorrect
-
Question 9 of 25
9. Question
1 pointsWhat statement describes Fog computing?
Correct
Incorrect
-
Question 10 of 25
10. Question
1 pointsWhich Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?
Correct
Incorrect
-
Question 11 of 25
11. Question
1 pointsWhich cloud model provides services for a specific organization or entity?
Correct
Incorrect
-
Question 12 of 25
12. Question
1 pointsHow does virtualization help with disaster recovery within a data center?
Correct
Incorrect
-
Question 13 of 25
13. Question
1 pointsWhat is a difference between the functions of Cloud computing and virtualization?
Correct
Incorrect
-
Question 14 of 25
14. Question
2 pointsWhich two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.)
Correct
Incorrect
-
Question 15 of 25
15. Question
1 pointsWhich statement describes the concept of cloud computing?
Correct
Incorrect
-
Question 16 of 25
16. Question
1 pointsWhich is a characteristic of a Type 2 hypervisor?
Correct
Incorrect
-
Question 17 of 25
17. Question
1 pointsWhich is a characteristic of a Type 1 hypervisor?
Correct
Incorrect
-
Question 18 of 25
18. Question
1 pointsHow is the control plane modified to operate with network virtualization?
Correct
Incorrect
-
Question 19 of 25
19. Question
1 pointsWhich technology virtualizes the network control plane and moves it to a centralized controller?
Correct
Incorrect
-
Question 20 of 25
20. Question
2 pointsWhich two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)
Correct
Incorrect
-
Question 21 of 25
21. Question
1 pointsWhat pre-populates the FIB on Cisco devices that use CEF to process packets?
Correct
Incorrect
-
Question 22 of 25
22. Question
1 pointsWhich type of hypervisor would most likely be used in a data center?
Correct
Incorrect
-
Question 23 of 25
23. Question
1 pointsWhat component is considered the brains of the ACI architecture and translates application policies?
Correct
Incorrect
-
Question 24 of 25
24. Question
1 pointsFill in the blank.
- In an IoT implementation, devices will be connected to a (converged) network to share the same infrastructure and to facilitate communications, analytics, and management.
Correct
Incorrect
-
Question 25 of 25
25. Question
1 pointsFill in the blank.
- In a scenario where a user with a laptop running the Mac OS installs a Windows virtual OS instance, the user is implementing a Type (2) hypervisor.
Correct
Incorrect