21. Data Centre Architecture and Cloud Concepts Flashcards

1
Q
  1. On a three-tiered network, servers connect at which level?
    a. Core
    b. Distribution
    c. Aggregation
    d. Access
A

d. The core layer provides high-speed interconnections, the aggregate/distribution layer provides services and access switch connectivity, and the access layer is where devices such as servers connect to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which type of cable will have the pins in the same order on both connectors?
    a. Crossover cable
    b. Straight-through
    c. Console cable
    d. Telephone cable
A

b. Straight-through cables, known as drop cables or patch cables will have the pins in the same order on both connectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which pins are switched in a crossover cable?
    a. 1 and 2, 3 and 4
    b. 1 and 3, 2 and 6
    c. 2 and 4, 5 and 7
    d. 1 and 4, 5 and 8
A

b. On a crossover cable, one connector has flipped the wires. Specifically, pins 1 and 3 get switched as well as pins 2 and 6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. UTP cable has specific colours for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct colour order, starting with pin 1?
    a. W/O, O, Bl, W/G, W/Bl, G, W/Br, Br
    b. O, W/O, W/G, Bl, W/Bl, W/Br, Br, G
    c. W/O, O, W/G, Bl, W/Bl, G, W/Br, Br
    d. W/G, G, W/O, Bl, W/Bl, O, W/Br, Br
A

c. If you are going to make your own UTP cables (drop/patch cables) to customise length, you need to make sure that the right wires get to the right pins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What is used to describe network traffic flows that remain inside the data centre?
    a. Ingress
    b. Aggregation
    c. East-West
    d. North-South
A

c. East-West

[The answer in the book is clearly wrong, and contradicts the descriptions on page 659]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following govern how the network is configured and operated as well as how people are expected to behave on a network?
    a. Baselines
    b. Laws
    c. Policies
    d. Procedures
A

c. Policies govern how the network is configured and operated as well as how people are expected to behave on the network, such as how users are able to access resources and which types of employees get network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. You have upgraded the firmware on your switches and access points. What documentation do you need to update?
    a. Baseline and configuration documentation.
    b. Physical network diagram
    c. Logical network diagram
    d. Wiring schematics
A

b. A physical network diagram contains all the physical devices and connectivity paths on your network and should accurately picture how your network fits together in detail. This document will also have the firmware revisions on all switches and access points in your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Where does the SDN controller interface with the switching fabric?
    a. Spine
    b. Control plane
    c. Forwarding plane
    d. P Core
A

b. The software-defined networking controller provides the control plane for a SDN-based switching fabric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Load testing, connectivity testing, and throughput testing are all examples of what?
    a. Load balancing
    b. Network monitoring
    c. Packet sniffing
    d. Traffic shaping
A

b. Network monitoring can have several names, including load testing, connectivity testing, and throughput testing. You will also hear network monitors referred to as protocol analysers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Abstracting the Cloud hardware into software objects for automated configuration is referred to as _______.
    a. Application programming interface
    b. Elasticity
    c. Infrastructure as code
    d. Aoftware-defined networking
A

c. The practice of creating infrastructure definitions in software is called Infrastructure as Code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Which of the following identifies steps to recover from adverse effects caused by a change?
    a. Rollback process
    b. Approvable process
    c. Notification process
    d. Impact assessment
A

a. Those making the changes should be completely briefed on rollback procedures, and they should exhibit a clear understanding of them prior to implementing the changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. After a network configuration change has been made, which three of the following is not a document that needs to be updated?
    a. Network configurations
    b. Additions to the network
    c. Physical location changes
    d. Application document
A

b, c, d. You need to update the network configuration document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. When the vendor provides the hardware platform or data centre, and the company installs and manages its own operating systems and application systems, which service type is being used?
    a. Software as a service
    b. Infrastructure as a service
    c. Platform as a service
    d. Desktop as a service
A

b. There are many different service type offerings from the colud providers, IaaS, or Infrastructure as a service, is when the cloud vendor provides the hardware platform, and the company installs and manages its own operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. You have added a new cable segment to your network. You need to make sure you document this for troubleshooting purposes. What should you update?
    a. The disaster recovery plan.
    b. The wiring schematics
    c. The router connections document
    d. The baseline document
A

b. If you add a new cable segment to the network, you need to update the wiring schematics document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Machine to machine configuration interfaces are called _______.
    a. Northbound interfaces
    b. Southbound interfaces
    c. APIs
    d. SDN
A

c. Machine to machine interfaces are called application programming interfaces (APIs), and used to communicate with each other instead of human-based interfaces such as a GUI or the command-line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Public clouds are divided into logical groupings that allow many different customers to access a section as if it were their own private data centre. This is known as _________.
    a. Multi-fabric
    b. Elasticity
    c. Multi-tenancy
    d. Platform as a service.
A

c. Multi-tenant clouds offer isolated space in the dataa centres to run services such as compute, storage, and databases. Think of this as your own private data centre in the cloud.

17
Q
  1. Which of the following are methods used to connect a private cloud to a public cloud? (choose all that apply)
    a. Internet
    b. SDN
    c. VPN
    d. Direct connect
    e. Virtual switches
A

a, c, d. Common cloud interconnect methods include Internet, VPN and Direct Connect.

18
Q
  1. Which of the following are reasons to optimise network performance? (choose all that apply).
    a. Maximising uptime
    b. Minimising latency
    c. Using VOIP
    d. Using video applications
    e. None of the above
A

a, b, c, d. There are many bandwidth-intensive programs, like VOIP and Video Streaming. These are just a few of the reasons it’s necessary to optimise network performance.

19
Q
  1. What term describes technologies that can deliver voice communications over the internet?
    a. Jitter
    b. Uptime
    c. Voice over Internet Protocol
    d. None of the above
A

c. Voice over Internet Protocol (VOIP) is a general term that describes several technologies that are able to deliver voice communications over the internet or other data networks.

20
Q
  1. Which virtualisation approach is run as an application?
    a. Type 1 hypervisor
    b. Type 2 hypervisor
    c. SDN
    d. Virtual switch
    e. None of the above
A

b. A type 2 hypervisor runs within a conventional operating system environment. With the hypervisor layer as a distinct second software level, guest operating systems run at the third level above the hardware.