Search Header Logo

IT Automation Quiz

Authored by Madi Mashekenov

Mathematics

University

Used 1+ times

IT Automation Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the term orchestration in IT automation?

Orchestration is aimed at managing workload lifecycles and reacting dynamically to changing conditions in order to optimize processes.

Orchestration is the process of preparing a server through the installation of libraries or daemons.

Orchestration is the building, arranging, integration, and preparation of multi-component applications across multiple nodes.

Orchestration is the obtaining and provisioning of compute, storage, and network infrastructure.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a read-only automation solution?

streamlining the management of L3 firewall rules in Cisco Meraki networks

gathering SD-WAN inventory data using Python and recording the values in a database

simplifying the automation of network device authentication, configuration, and consistency

gathering the current list of ACL entries on an IOS XE router and enforcing consistency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student is setting up the CSR1000v VM in VirtualBox that is already installed on the local computer. The VM is imported to the VirtualBox and starts successfully. The student tries to verify communications to the CSR1000v VM by opening the Firefox web browser on the local computer and enters the URL https://192.168.56.101. A security message "Warning: Potential Security Risk Ahead" appears. What is the security issue that results in this message?

The SSL/TLS certificate uses a public key size of less than 1024 bits.

The SSL/TLS certificate is self-signed by the router.

The CA for the SSL/TLS certificate cannot be reached.

The traffic to the VM is not encrypted.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do APIs affect traditional IT tasks?

They are used to replace network infrastructure and implement network virtualization.

They are used to eliminate repetitive manual tasks and replace them with automation.

They are used to increase computer processing speed and lower power consumption.

They are used to increase hardware speed and lower power consumption.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Refer to the exhibit. PC1 needs to resolve the host name of the web server into an IP address by using DNS. What destination IP address and destination port number will PC1 assign to the DNS query packet?

192.168.20.2 port 80

192.168.20.3 port 53

192.168.20.3 port 80

192.168.10.1 port 53

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which two statements are true about NTP servers in an enterprise network? (Choose two.)

There can only be one NTP server on an enterprise network

All NTP servers synchronize directly to a stratum 1 time source.

NTP servers at stratum 1 are directly connected to an authoritative time source.

NTP servers ensure an accurate time stamp on logging and debugging information.

NTP servers control the mean time between failures (MTBF) for key network devices.

7.

OPEN ENDED QUESTION

3 mins • 1 pt

Match the steps with the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to an external server at the IP address 209.165.200.254 across a router R1 that is running dynamic NAT. (Not all options are used.)

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?