[ad_1]
1. What’s an instance of an M2M connection within the IoT?
- A person sends an e mail over the Web to a pal.
- Sensors in a warehouse talk with one another and ship knowledge to a server block within the cloud.*
- Redundant servers talk with one another to find out which server must be lively or standby.
- An automatic alarm system in a campus sends fireplace alarm messages to all college students and employees.
2. What’s the time period for the extension of the present Web construction to billions of related units?
3. Which assertion describes the Cisco IoT System?
- It’s a change working system to combine many Layer 2 security measures.
- It’s a sophisticated routing protocol for cloud computing.
- It’s an infrastructure to handle giant scale techniques of very totally different endpoints and platforms.*
- It’s a router working system combining IOS and Linux for fog computing.
4. Which three community fashions are described within the fog computing pillar of the Cisco IoT System? (Select three.)
- fog computing*
- shopper/server*
- P2P
- cloud computing*
- peer-to-peer
- enterprise WAN
5. Which IoT pillar extends cloud connectivity nearer to the community edge?
- community connectivity pillar
- fog computing pillar*
- administration and automation pillar
- utility enablement platform pillar
6. Which cybersecurity resolution is described within the safety pillar of the Cisco IoT System to deal with the safety of energy crops and manufacturing facility course of strains?
- IoT community safety
- cloud computing safety
- operational know-how particular safety*
- IoT bodily safety
7. Which cloud computing alternative would offer the usage of community {hardware} reminiscent of routers and switches for a selected firm?
- infrastructure as a service (IaaS)*
- software program as a service (SaaS)
- browser as a service (BaaS)
- wi-fi as a service (WaaS)
8. What know-how permits customers to entry knowledge wherever and at any time?
- Cloud computing*
- virtualization
- micromarketing
- knowledge analytics
9. The exhibit isn’t required to reply the query. The exhibit exhibits a fog overlaying bushes on the aspect of a mountain.What assertion describes Fog computing?
- It requires Cloud computing companies to help non-IP enabled sensors and controllers.
- It helps bigger networks than Cloud computing does.
- It creates a distributed computing infrastructure that gives companies near the community edge.*
- It makes use of a centralized computing infrastructure that shops and manipulates huge knowledge in a single very safe knowledge heart.
10. Which Cloud computing service can be finest for a brand new group that can’t afford bodily servers and networking gear and should buy community companies on-demand?
11. Which cloud mannequin gives companies for a selected group or entity?
- a public cloud
- a hybrid cloud
- a non-public cloud*
- a neighborhood cloud
12. How does virtualization assist with catastrophe restoration inside a knowledge heart?
- enchancment of enterprise practices
- provide of constant air move
- help of reside migration*
- assure of energy
13. What’s a distinction between the features of Cloud computing and virtualization?
- Cloud computing separates the applying from the {hardware} whereas virtualization separates the OS from the underlying {hardware}.*
- Cloud computing requires hypervisor know-how whereas virtualization is a fault tolerance know-how.
- Cloud computing makes use of knowledge heart know-how whereas virtualization isn’t utilized in knowledge facilities.
- Cloud computing gives companies on web-based entry whereas virtualization gives companies on knowledge entry by way of virtualized Web connections.
14. Which two enterprise and technical challenges does implementing virtualization inside a knowledge heart assist companies to beat? (Select two.)
- bodily footprint*
- server {hardware} wants
- virus and spy ware assaults
- energy and air-con*
- working system license necessities
15. When getting ready an IoT implementation, what sort of community will units be related to with a view to share the identical infrastructure and facilitate communications, analytics, and administration?
- converged*
- video
- phone
- VoIP
16. Which sort of Hypervisor is applied when a person with a laptop computer working the Mac OS installs a Home windows digital OS occasion?
- digital machine
- naked steel
- sort 2*
- sort 1
17. Which assertion describes the idea of cloud computing?
- separation of working system from {hardware}
- separation of administration aircraft from management aircraft
- separation of utility from {hardware}*
- separation of management aircraft from knowledge aircraft
18. Which is a attribute of a Kind 2 hypervisor?
- finest fitted to enterprise environments
- installs immediately on {hardware}
- doesn’t require administration console software program*
- has direct entry to server {hardware} assets
19. Which is a attribute of a Kind 1 hypervisor?
- doesn’t require administration console software program
- put in immediately on a server*
- put in on an current working system
- finest fitted to shoppers and never for an enterprise setting
20. How is the management aircraft modified to function with community virtualization?
- Management aircraft redundancy is added to every community system.
- The management aircraft on every system is interconnected to a devoted high-speed community.
- A hypervisor is put in in every system to permit a number of cases of the management aircraft.
- The management aircraft operate is consolidated right into a centralized controller.*
21. Which know-how virtualizes the community management aircraft and strikes it to a centralized controller?
- IaaS
- SDN*
- fog computing
- cloud computing
22. Which two layers of the OSI mannequin are related to SDN community management aircraft features that make forwarding choices? (Select two.)
- Layer 1
- Layer 2*
- Layer 3*
- Layer 4
- Layer 5
23. What pre-populates the FIB on Cisco units that use CEF to course of packets?
- the adjacency desk
- the routing desk*
- the DSP
- the ARP desk
24. Which sort of hypervisor would most probably be utilized in a knowledge heart?
25. What element is taken into account the brains of the ACI structure and interprets utility insurance policies?
- the Software Community Profile endpoints
- the Nexus 9000 change
- the hypervisor
- the Software Coverage Infrastructure Controller*
26. Fill within the clean.
In an IoT implementation, units will probably be related to a
community to share the identical infrastructure and to facilitate communications, analytics, and administration.
Right Reply: converged
27. Fill within the clean.
In a state of affairs the place a person with a laptop computer working the Mac OS installs a Home windows digital OS occasion, the person is implementing a Kind
hypervisor.
Right Reply: 2
Older Model
28. A community design engineer is planning the implementation of a cheap methodology to interconnect a number of networks securely over the Web. Which sort of know-how is required?
- a GRE IP tunnel
- a leased line
- a VPN gateway*
- a devoted ISP
29. What’s one good thing about utilizing VPNs for distant entry?
- decrease protocol overhead
- ease of troubleshooting
- potential for decreased connectivity prices*
- elevated high quality of service
30. How is “tunneling” achieved in a VPN?
- New headers from a number of VPN protocols encapsulate the unique packets.*
- All packets between two hosts are assigned to a single bodily medium to make sure that the packets are stored personal.
- Packets are disguised to seem like different kinds of site visitors in order that they are going to be ignored by potential attackers.
- A devoted circuit is established between the supply and vacation spot units all through the connection.
31. Two firms have simply accomplished a merger. The community engineer has been requested to attach the 2 company networks with out the expense of leased strains. Which resolution can be probably the most value efficient methodology of offering a correct and safe connection between the 2 company networks?
- Cisco AnyConnect Safe Mobility Consumer with SSL
- Cisco Safe Mobility Clientless SSL VPN
- Body Relay
- distant entry VPN utilizing IPsec
- site-to-site VPN*
32. Which two eventualities are examples of distant entry VPNs? (Select two.)
- A toy producer has a everlasting VPN connection to one in every of its components suppliers.
- All customers at a big department workplace can entry firm assets by way of a single VPN connection.
- A cell gross sales agent is connecting to the corporate community by way of the Web connection at a lodge.*
- A small department workplace with three workers has a Cisco ASA that’s used to create a VPN connection to the HQ.
- An worker who’s working from residence makes use of VPN shopper software program on a laptop computer with a view to hook up with the corporate community.*
33. Which assertion describes a function of site-to-site VPNs?
- The VPN connection isn’t statically outlined.
- VPN shopper software program is put in on every host.
- Inside hosts ship regular, unencapsulated packets.*
- Particular person hosts can allow and disable the VPN connection.
34. What’s the function of the generic routing encapsulation tunneling protocol?
- to supply packet degree encryption of IP site visitors between distant websites
- to handle the transportation of IP multicast and multiprotocol site visitors between distant websites*
- to help fundamental unencrypted IP tunneling utilizing multivendor routers between distant websites
- to supply mounted flow-control mechanisms with IP tunneling between distant websites
35. Which distant entry implementation state of affairs will help the usage of generic routing encapsulation tunneling?
- a cell person who connects to a router at a central web site
- a department workplace that connects securely to a central web site
- a cell person who connects to a SOHO web site
- a central web site that connects to a SOHO web site with out encryption*
36. Check with the exhibit. A tunnel was applied between routers R1 and R2. Which two conclusions could be drawn from the R1 command output? (Select two.)
- This tunnel mode isn’t the default tunnel interface mode for Cisco IOS software program.
- This tunnel mode gives encryption.
- The info that’s despatched throughout this tunnel isn’t safe.*
- This tunnel mode doesn’t help IP multicast tunneling.
- A GRE tunnel is getting used.*
37. Check with the exhibit. Which IP deal with can be configured on the tunnel interface of the vacation spot router?
- 172.16.1.1
- 172.16.1.2*
- 209.165.200.225
- 209.165.200.226
38. Which assertion accurately describes IPsec?
- IPsec works at Layer 3, however can defend site visitors from Layer 4 by way of Layer 7.*
- IPsec makes use of algorithms that had been developed particularly for that protocol.
- IPsec implements its personal methodology of authentication.
- IPsec is a Cisco proprietary normal.
39. Which operate of IPsec safety companies permits the receiver to confirm that the information was transmitted with out being modified or altered in any method?
- anti-replay safety
- authentication
- knowledge integrity*
- confidentiality
40. Which assertion describes a attribute of IPsec VPNs?
- IPsec is a framework of Cisco proprietary protocols.
- IPsec can safe site visitors at Layers 1 by way of 3.
- IPsec encryption causes issues with routing.
- IPsec works with all Layer 2 protocols.*
41. What’s an IPsec protocol that gives knowledge confidentiality and authentication for IP packets?
42. What two encryption algorithms are utilized in IPsec VPNs? (Select two.)
43. Which algorithm is an asymmetrical key cryptosystem?
44. Which two algorithms use Hash-based Message Authentication Code for message authentication? (Select two.)
45. Which three statements describe the constructing blocks that make up the IPsec protocol framework? (Select three.)
- IPsec makes use of encryption algorithms and keys to supply safe switch of information.*
- IPsec makes use of Diffie-Hellman algorithms to encrypt knowledge that’s transferred by way of the VPN.
- IPsec makes use of 3DES algorithms to supply the best degree of safety for knowledge that’s transferred by way of a VPN.
- IPsec makes use of secret key cryptography to encrypt messages which might be despatched by way of a VPN.*
- IPsec makes use of Diffie-Hellman as a hash algorithm to make sure integrity of information that’s transmitted by way of a VPN.
- IPsec makes use of ESP to supply confidential switch of information by encrypting IP packets.*
46. A community design engineer is planning the implementation of an IPsec VPN. Which hashing algorithm would offer the strongest degree of message integrity?
47. What’s the function of using Diffie-Hellman (DH) algorithms as a part of the IPsec normal?
- DH algorithms permit limitless events to determine a shared public key that’s utilized by encryption and hash algorithms.
- DH algorithms permit two events to determine a shared secret key that’s utilized by encryption and hash algorithms.*
- DH algorithms permit limitless events to determine a shared secret key that’s utilized by encryption and hash algorithms.
- DH algorithms permit two events to determine a shared public key that’s utilized by encryption and hash algorithms.
48. What’s the function of a message hash in a VPN connection?
- It ensures that the information can’t be learn in plain textual content.
- It ensures that the information has not modified whereas in transit.*
- It ensures that the information is coming from the right supply.
- It ensures that the information can’t be duplicated and replayed to the vacation spot.
49. Which Cisco VPN resolution gives restricted entry to inside community assets by using a Cisco ASA and gives browser-based entry solely?
- clientless SSL VPN*
- client-based SSL VPN
- SSL
- IPsec
50. What key query would assist decide whether or not a company ought to use an SSL VPN or an IPsec VPN for the distant entry resolution of the group?
- Is a Cisco router used on the vacation spot of the distant entry tunnel?
- What purposes or community assets do the customers want for entry?
- Are each encryption and authentication required?
- Do customers want to have the ability to join with out requiring particular VPN software program?*
51. Open the PT Exercise. Carry out the duties within the exercise directions after which reply the query. What downside is stopping the hosts from speaking throughout the VPN tunnel?
- The EIGRP configuration is inaccurate.
- The tunnel locations addresses are incorrect.
- The tunnel IP addresses are incorrect.*
- The tunnel supply interfaces are incorrect
52. Which essential operate that’s offered by IPsec ensures that knowledge has not been modified in transit between the supply and vacation spot?
- integrity*
- anti-replay safety
- confidentiality
- authentication
53. Which service of IPsec verifies that safe connections are shaped with the meant sources of information?
- encryption
- authentication*
- confidentiality
- knowledge integrity
54. Fill within the clean.
“__GRE__” is a site-to-site tunnel protocol developed by Cisco to permit multiprotocol and IP multicast site visitors between two or extra websites.
55. What is a bonus of utilizing the Cisco Safe Mobility Clientless SSL VPN?
- Safety is offered by prohibiting community entry by way of a browser.
- Any system can hook up with the community with out authentication.
- Purchasers don’t require particular software program.*
- Purchasers use SSH to entry community assets.
56. How can the usage of VPNs within the office contribute to decrease working prices?
- VPNs prevents connectivity to SOHO customers.
- VPNs can be utilized throughout broadband connections relatively than devoted WAN hyperlinks.*
- VPNs require a subscription from a selected Web service supplier that makes a speciality of safe connections.
- Excessive-speed broadband know-how could be changed with leased strains.
57. Which two traits describe IPsec VPNs? (Select two.)
- Key lengths vary from 40 bits to 256 bits.
- IPsec authentication is one-way or two-way.
- Particular PC shopper configuration is required to connect with the VPN.*
- IPsec is particularly designed for web-enabled purposes.
- IPsec authenticates by utilizing shared secrets and techniques or digital certificates.*
Obtain PDF File under:
[sociallocker id=”54558″]
[/sociallocker]
[ad_2]