Module 13-14 Emerging Network Technologies Flashcards
A company uses a cloud-based payroll system. Which cloud computing technology is this company using?
browser as a service (BaaS)
infrastructure as a service (IaaS)
software as a service (SaaS)
wireless as a service (WaaS)
software as a service (SaaS)
For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?
Data traffic from clients will be routed to multiple virtual servers.
There are significant data exchanges between virtual servers.
There is more data traffic flowing from virtual servers to clients.
More network control traffic is generated between virtual servers and clients.
There are significant data exchanges between virtual servers.
Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?
data plane
control plane
adjacency table
forwarding information base
control plane
Which network traffic management technology is a basic element in SDN implementations?
OpenFlow
OpenStack
IEEE 802.1aq
Interface to the Routing System
OpenFlow
Which type of hypervisor would most likely be used in a data center?
Type 2
Type 1
Nexus
Hadoop
Type 1
Explanation: The two type of hypervisors are Type 1 and Type 2. Type 1 hypervisors are usually used on enterprise servers. Enterprise servers rather than virtualized PCs are more likely to be in a data center.
Which is a characteristic of a Type 1 hypervisor?
installed directly on a server
best suited for consumers and not for an enterprise environment
does not require management console software
installed on an existing operating system
installed directly on a server
Explanation: Type 1 hypervisors are installed directly on a server and are known as “bare metal” solutions giving direct access to hardware resources. They also require a management console and are best suited for enterprise environments.
Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)
Layer 1 Layer 2 Layer 3 Layer 4 Layer 5
Layer 2
Layer 3
Explanation: The SDN control plane uses the Layer 2 ARP table and the Layer 3 routing table to make decisions about forwarding traffic.
What pre-populates the FIB on Cisco devices that use CEF to process packets?
the routing table
the adjacency table
the ARP table
the DSP
the routing table
Explanation: CEF uses the FIB and adjacency table to make fast forwarding decisions without control plane processing. The adjacency table is pre-populated by the ARP table and the FIB is pre-populated by the routing table.
What is a function of the data plane of a network device?
sending information to the CPU for processing
building the routing table
resolving MAC addresses
forwarding traffic flows
forwarding traffic flows
Explanation: Networking devices operate in two planes; the data plane and the control plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the CPU. The data plane forwards traffic flows.
Which statement describes the concept of cloud computing?
separation of application from hardware
separation of management plane from control plane
separation of operating system from hardware
separation of control plane from data plane
separation of application from hardware
Explanation: Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware.
Which cloud model provides services for a specific organization or entity?
a public cloud
a hybrid cloud
a private cloud
a community cloud
a private cloud
Explanation: Private clouds are used to provide services and applications to a specific organization and may be set up within the private network of the organization or managed by an outside organization.
What two benefits are gained when an organization adopts cloud computing and virtualization? (Choose two.)
provides a “pay-as-you-go” model, allowing organizations to treat computing and storage expenses as a utility
enables rapid responses to increasing data volume requirements
distributed processing of large data sets in the size of terabytes
elimination of vulnerabilities to cyber attacks
increases the dependance on onsite IT resources
provides a “pay-as-you-go” model, allowing organizations to treat computing and storage expenses as a utility
enables rapid responses to increasing data volume requirements
Explanation: Organizations can use virtualization to consolidate the number of required servers by running many virtual servers on a single physical server. Cloud computing allows organizations to scale their solutions as required and to pay only for the resources they require.
Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?
type 2
virtual machine
type 1
bare metal
type 2
Explanation: Type 2 hypervisors, also know as hosted hypervisors, are installed on top of an existing operating system, such as Mac OS, Windows, or Linux.
A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.)
The company only needs to pay for the amount of processing and storage capacity that it uses.
Cloud services are billed at a fixed fee no matter how much processing and storage are used by the company.
The company does not need to be concerned about how to handle increasing data storage and processing demands with in-house data center equipment.
The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed.
Single-tenant data centers can easily grow to accommodate increasing data storage requirements.
Cloud services enable the company to own and administer its own servers and storage devices.
The company only needs to pay for the amount of processing and storage capacity that it uses.
The company does not need to be concerned about how to handle increasing data storage and processing demands with in-house data center equipment.
The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed.
Explanation: Cloud computing offers many advantages to the company. Since the cloud data storage and processing facilities are owned by third-parties, the company does not need to be concerned about how it will handle increasing data storage and processing demands with its own data center equipment. The company can easily increase or decrease processing power and storage capacity based on need. Also, cloud services are billed by usage, so the company does not have the costs of supporting its own expensive data center that is not always used to maximum capacity.
How does virtualization help with disaster recovery within a data center?
support of live migration
guarantee of power
improvement of business practices
supply of consistent air flow
support of live migration
Explanation: Live migration allows moving of one virtual server to another virtual server that could be in a different location that is some distance from the original data center.
What technology allows users to access data anywhere and at any time?
Cloud computing
virtualization
micromarketing
data analytics
Cloud computing
Explanation: Cloud computing allows organizations to eliminate the need for on-site IT equipment, maintenance, and management. Cloud computing allows organizations to expand their services or capabilities while avoiding the increased costs of energy and space.
Which action takes place in the assurance element of the IBN model?
verification and corrective action
configuring systems
translation of policies
integrity checks
verification and corrective action
Explanation: The assurance element of the IBN model is concerned with end-to-end verification of network-wide behavior.
Refer to the exhibit. Which data format is used to represent the data for network automation applications?
https://itexamanswers.net/wp-content/uploads/2019/12/i349058v2n1_347058.png
XML
YAML
HTML
JSON
JSON
Explanation: The common data formats that are used in many applications including network automation and programmability are as follows:
JavaScript Object Notation (JSON) – In JSON, the data known as an object is one or more key/value pairs enclosed in braces { }. Keys must be strings within double quotation marks ” “. Keys and values are separated by a colon.
eXtensible Markup Language (XML) – In XML, the data is enclosed within a related set of tags data.
YAML Ain’t Markup Language (YAML) – In YAML, the data known as an object is one or more key value pairs. Key value pairs are separated by a colon without the use of quotation marks. YAML uses indentation to define its structure, without the use of brackets or commas.
What is the function of the key contained in most RESTful APIs?
It is the top-level object of the API query.
It is used to authenticate the requesting source.
It represents the main query components in the API request.
It is used in the encryption of the message by an API request.
It is used to authenticate the requesting source.
Explanation: Many RESTful APIs, including public APIs, require a key. The key is used to identify the source of the request through authentication.