CISCO Introduction To IoT Final Exam Answers
CISCO Introduction To IoT Final Exam Answers
Q1)Change will have to occur in the corporate network in order to prepare for the Internet of Things. Which
type of testing would a company do to demonstrate the benefits of networking a new “thing” that was not
on the network before?
• prototyping
• transference
• developmental
• formative
Q2) A company requires using a secure encrypted internet connection when connecting to the corporate
network from outside the company. Which technology should be used when employees travel and use a
laptop?
• VPN
• Wi-Fi hotspot
• Siri
• Bluetooth
Q 3)What is a key feature of the assurance element of the intent-based networking model?
Q4)Which security best practice involves defining company rules, job duties, and expectations?
Q5)Which two data types would be classified as personally identifiable information (PII)? (Choose two.)
• Facebook photographs
• Navigation Bar
6True or False? Comma-separated values (CSV), JSON, and XML are all tools that can be used to manipulate
structured data.
• false
• true
• They can only be used within the function they are declared.
Q 8 )Which two types of institutions do malicious web pages often look like? (Choose two.)
• bank
• commercial
• financial
• technical
• academic
Q9)True or False?
With artificial intelligence, smart devices can modify processes and settings on the fly in response to
changes on the network.
• false
• true
• welding
• programming
• design
Q11)Match the term with the definition. (Not all options are used.)
Q12)Which technology is used as a visual programming tool to create a program by connecting colored
blocks?
• Arduino
• JavaScript
• Python
• Blockly
Q13)What limits the types of different objects that can become intelligent sensors on the Internet of Things?
repeat the execution of a specific block of code for a specific number of times – for
Q15) What device provides auto discovery services for smart devices that are connected to the network?
• PC
• laptop
• tablet
• to enable the sharing of resources such as printers, documents, pictures, and music between a few local
computers
• to use electromagnetic waves to carry signals over a specific geographic area
• a process that eventually eliminates the need for human intervention
Q18 )How is data that has been collected through sources such as web pages, audio, or tweets categorized?
Q 19)What is an open-source physical computing platform that can take input from a variety of switches or
sensors to control physical objects?
• Raspberry Pi
• Beaglebone
• Arduino
Q20)Which technology has the intelligence that is demonstrated by machines in a way that mimics human
cognitive functions?
• AI
• IBN
• CSV
• ML
Q 21)Which character is used within a search engine to gather data efficiently by placing the character
before and after the name of a particular person?
• a PAN
• a WAN
• PAN
• LAN
• MAN
• WAN
Q24) What are the two areas of physical security within a data center?
• inside
• restricted
• public
• private
• outside
Q25) What are two things that all digital devices need in order to work? (Choose two.)
• sensor
• data
Q26 )What are two requirements to connect a smart device to a home wireless network? (Choose two.)
• URL
• SSID
• IP addressing
• GUI
Q 28)What are three attributes of data that would indicate that it may be big data? (Choose three.)
• volume
• vulnerability
• velocity
• versatility
• visibility
• variety
Q 29)Which technology is a subset of AI that uses statistical techniques to enable computers to “learn” from
collected data?
• ML
• CSV
• IBN
• JSON
Q 31)What are two characteristics of the Python programming language? (Choose two.)
• It uses the & symbol to indicate that the interactive mode is ready to accept commands.
Q 32)Which type of network is the connection between a Bluetooth headset and a vehicle?
• PAN
• cloud
• LAN
• MAN
Q 33) What is used to provide IoT sensors with access to the network?
• an actuator
• a microcontroller
• a laptop
• It eliminates or reduces the need for onsite IT equipment, maintenance, and management.
• It turns raw data into meaningful information by discovering patterns and relationships.
• It utilizes end-user clients to do a substantial amount of data preprocessing and storage.
Q35)Mined data can be visualized through the use of charts. Select two criteria that can be used to
determine the best chart selection. (Choose two.)