
IT Automation Quiz
Authored by Madi Mashekenov
Mathematics
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes the term orchestration in IT automation?
Orchestration is aimed at managing workload lifecycles and reacting dynamically to changing conditions in order to optimize processes.
Orchestration is the process of preparing a server through the installation of libraries or daemons.
Orchestration is the building, arranging, integration, and preparation of multi-component applications across multiple nodes.
Orchestration is the obtaining and provisioning of compute, storage, and network infrastructure.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a read-only automation solution?
streamlining the management of L3 firewall rules in Cisco Meraki networks
gathering SD-WAN inventory data using Python and recording the values in a database
simplifying the automation of network device authentication, configuration, and consistency
gathering the current list of ACL entries on an IOS XE router and enforcing consistency
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A student is setting up the CSR1000v VM in VirtualBox that is already installed on the local computer. The VM is imported to the VirtualBox and starts successfully. The student tries to verify communications to the CSR1000v VM by opening the Firefox web browser on the local computer and enters the URL https://192.168.56.101. A security message "Warning: Potential Security Risk Ahead" appears. What is the security issue that results in this message?
The SSL/TLS certificate uses a public key size of less than 1024 bits.
The SSL/TLS certificate is self-signed by the router.
The CA for the SSL/TLS certificate cannot be reached.
The traffic to the VM is not encrypted.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do APIs affect traditional IT tasks?
They are used to replace network infrastructure and implement network virtualization.
They are used to eliminate repetitive manual tasks and replace them with automation.
They are used to increase computer processing speed and lower power consumption.
They are used to increase hardware speed and lower power consumption.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Refer to the exhibit. PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet?
192.168.20.2 port 80
192.168.20.3 port 53
192.168.20.3 port 80
192.168.10.1 port 53
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which two statements are true about NTP servers in an enterprise network? (Choose two.)
There can only be one NTP server on an enterprise network
All NTP servers synchronize directly to a stratum 1 time source.
NTP servers at stratum 1 are directly connected to an authoritative time source.
NTP servers ensure an accurate time stamp on logging and debugging information.
NTP servers control the mean time between failures (MTBF) for key network devices.
7.
OPEN ENDED QUESTION
3 mins • 1 pt
Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.)
Evaluate responses using AI:
OFF
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?