CCNA3 V7 ENSA Modules 13 14 Exam Answers
CCNA3 V7 ENSA Modules 13 14 Exam Answers

CCNA3 v7 ENSA | Modules 13 – 14 Exam Answers

CCNA3 v7 Modules 13 - 14 Exam Answers
5

Summary

Check answers here: CCNA3 v7 ENSA Modules 13 – 14: Emerging Network Technologies Exam Answers. CCNA 200-301 Passed 100% !!

This exam will cover material from Modules 13 – 14 Emerging Network Technologies of the CCNA 3 Enterprise Networking, Security, and Automation v7.0 (ENSA) curriculum. This exam will be scored using the Weighted Model where each MCSA (Multiple-Choice Single-Answer) is worth two points and each MCMA (Multiple-Choice Multiple-Answer) is worth one point for each correct option. Other tasks types such as fill-in-the-blank, drag and drop (matching) and Packet Tracer items may be included in this exam. For Packet Tracer tasks, you must have the latest version of Packet Tracer installed on your machine.

This exam will cover material from Modules 13 – 14 of the CCNA3 Enterprise Networking, Security, and Automation v7.0 (ENSA) curriculum.

This exam will be scored using the Weighted Model where each MCSA (Multiple-Choice Single-Answer) is worth two points and each MCMA (Multiple-Choice Multiple-Answer) is worth one point for each correct option. If more options are selected than required, the student will receive a score of zero.

CCNA3 v7 Emerging Network Technologies Exam Answers

Because of enormous growth in web traffic, a company has planned to purchase additional servers to help handle the web traffic. What service or technology would support this requirement?

Correct! Wrong!

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

The SDN control plane uses the Layer 2 ARP table and the Layer 3 routing table to make decisions about forwarding traffic.

Which network traffic management technology is a basic element in SDN implementations?

Correct! Wrong!

Which type of hypervisor would most likely be used in a data center?

Correct! Wrong!

The two type of hypervisors are Type 1 and Type 2. Type 1 hypervisors are usually used on enterprise servers. Enterprise servers rather than virtualized PCs are more likely to be in a data center.

What are two functions of hypervisors? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

The hypervisor does not protect the hosting OS from malware. Neither does it allow sharing software across virtual machines. The hard drive of the supporting computer does not need to be partitioned to run virtual machines. The hypervisor creates and manages virtual machines on a host computer and allocates physical system resources to them.

To avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?

Correct! Wrong!

Which cloud model provides services for a specific organization or entity?

Correct! Wrong!

Private clouds are used to provide services and applications to a specific organization and may be set up within the private network of the organization or managed by an outside organization.

Which term is used to describe a set of instructions for execution by the configuration management tool SaltStack?

Correct! Wrong!

The configuration management tool SaltStack uses the name Pillar to describe the set of instructions to be executed.

For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?

Correct! Wrong!

Which action takes place in the assurance element of the IBN model?

Correct! Wrong!

The assurance element of the IBN model is concerned with end-to-end verification of network-wide behavior.

In which situation would a partner API be appropriate?

Correct! Wrong!

Partner API programs incorporate collaboration with other business. They facilitate communication and integration of software between a company and its business partners.

A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.)

Please select 3 correct answers

Correct! Wrong!

Cloud computing offers many advantages to the company. Since the cloud data storage and processing facilities are owned by third-parties, the company does not need to be concerned about how it will handle increasing data storage and processing demands with its own data center equipment. The company can easily increase or decrease processing power and storage capacity based on need. Also, cloud services are billed by usage, so the company does not have the costs of supporting its own expensive data center that is not always used to maximum capacity.

Which scenario describes the use of a public API?

Correct! Wrong!

Public, or open, APIs have no restrictions and are available to the public. Some API providers do require a user to obtain a free key or token prior to using the API in order to control the volume of API requests received and processed.

Which technology virtualizes the network control plane and moves it to a centralized controller?​

Correct! Wrong!

Networking devices operate in two planes: the data plane and the control plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the CPU. The data plane forwards traffic flows. SDN virtualizes the control plane and moves it to a centralized network controller.​

What is a difference between the XML and HTML data formats?

Correct! Wrong!

XML is a human readable data structure used to store, transfer, and read data by applications. Like HTML, XML uses a related set of tags to enclose data. However, unlike HTML, XML uses no predefined tags or document structure.

What is the function of the key contained in most RESTful APIs?

Correct! Wrong!

Many RESTful APIs, including public APIs, require a key. The key is used to identify the source of the request through authentication.

How does virtualization help with disaster recovery within a data center?

Correct! Wrong!

Live migration allows moving of one virtual server to another virtual server that could be in a different location that is some distance from the original data center.

What is REST?

Correct! Wrong!

REST is not a protocol or service, but rather a style of software architecture for designing web service applications.

What is YAML?

Correct! Wrong!

Like JSON, YAML Ain’t Markup Language (YAML) is a data format used by applications to store and transport data. YAML is considered a superset of JSON.

Which two configuration management tools are developed using Ruby? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

Chef and Puppet are configuration management tools developed using Ruby. Ansible and SaltStack are configuration management tools developed using Python. Ruby is typically considered a more difficult language to learn than Python. RESTCONF is a network management protocol.

Refer to the exhibit. Which data format is used to represent the data for network automation applications?

Correct! Wrong!

The common data formats that are used in many applications including network automation and programmability are as follows:

JavaScript Object Notation (JSON): In JSON, the data known as an object is one or more key/value pairs enclosed in braces { }. Keys must be strings within double quotation marks " ". Keys and values are separated by a colon.
eXtensible Markup Language (XML): In XML, the data is enclosed within a related set of tags 'data'.
YAML Ain’t Markup Language (YAML): In YAML, the data known as an object is one or more key value pairs. Key value pairs are separated by a colon without the use of quotation marks. YAML uses indentation to define its structure, without the use of brackets or commas.

What pre-populates the FIB on Cisco devices that use CEF to process packets?

Correct! Wrong!

CEF uses the FIB and adjacency table to make fast forwarding decisions without control plane processing. The adjacency table is pre-populated by the ARP table and the FIB is pre-populated by the routing table.​

Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?

Correct! Wrong!

What is a difference between the functions of Cloud computing and virtualization?

Correct! Wrong!

Cloud computing separates the application from the hardware. Virtualization separates the OS from the underlying hardware. Virtualization is a typical component within cloud computing. Virtualization is also widely used in data centers. Although the implementation of virtualization facilitates an easy server fault tolerance setup, it is not a fault tolerance technology by design. The Internet connection from a data center or service provider needs redundant physical WAN connections to ISPs.​​

A company uses a cloud-based payroll system. Which cloud computing technology is this company using?

Correct! Wrong!

What technology allows users to access data anywhere and at any time?

Correct! Wrong!

Cloud computing allows organizations to eliminate the need for on-site IT equipment, maintenance, and management. Cloud computing allows organizations to expand their services or capabilities while avoiding the increased costs of energy and space.

What is a function of the data plane of a network device?

Correct! Wrong!

Networking devices operate in two planes; the data plane and the control plane. The control plane maintains Layer 2 and Layer 3 forwarding mechanisms using the CPU. The data plane forwards traffic flows.

What component is considered the brains of the ACI architecture and translates application policies​?

Correct! Wrong!

The ACI architecture consists of three core components: the Application Network Profile, the Application Policy Infrastructure Controller, which serves as the brains of the ACI architecture, and the Cisco Nexus 9000 switch.

What is the most widely used API for web services?

Correct! Wrong!

REST accounts for more than 80% of all API types used for web services, making it the most widely used web service API.

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

Correct! Wrong!

This item is based on information contained in the presentation.
Routers, switches, and firewalls are infrastructure devices that can be provided in the cloud.

Which RESTFul operation corresponds to the HTTP GET method?

Correct! Wrong!

RESTful operations correspond to the following HTTP methods (shown to the left with the RESTful operation on the right):

POST > Create
GET > Read
PUT/PATCH > Update
DELETE > Delete

How is the YAML data format structure different from JSON?

Correct! Wrong!

The structure in YAML is defined by indentations rather than brackets and commas.

Which term is used to describe a set of instructions for execution by the configuration management tool Puppet?

Correct! Wrong!

The configuration management tool Puppet uses the name Manifest to describe the set of instructions to be executed.

Which statement describes the concept of cloud computing?

Correct! Wrong!

Cloud computing is used to separate the application or service from hardware. Virtualization separates the operating system from the hardware.

Which is a characteristic of a Type 1 hypervisor?​

Correct! Wrong!

Type 1 hypervisors are installed directly on a server and are known as “bare metal” solutions giving direct access to hardware resources. They also require a management console and are best suited for enterprise environments.​

What two benefits are gained when an organization adopts cloud computing and virtualization? (Choose two.)

Please select 2 correct answers

Correct! Wrong!

Organizations can use virtualization to consolidate the number of required servers by running many virtual servers on a single physical server. Cloud computing allows organizations to scale their solutions as required and to pay only for the resources they require.

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?

Correct! Wrong!

Type 2 hypervisors, also know as hosted hypervisors, are installed on top of an existing operating system, such as Mac OS, Windows, or Linux.

ENSA | Modules 13 – 14
Final Score

Congratulations, you have completed the CCNA3 v7 – ENSA – Modules 13 – 14! Tell us your rating!

Share your Results: