INTRO TO IOT AND DIGITAL TRANSFORMATION

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

Which attribute of big data involves an exponential data growth rate?

velocity

2
New cards

True or false? Structured data is easier to analyze and store than unstructured data.

true

3
New cards

which challenge of big data storage is characterized by the need to make data accessible from anywhere at anytime?

access

4
New cards

making data accessible to only authorized users addresses which data storage problem associated with big data?

security

5
New cards

What characterizes data management problems associated with big data storage?

generating and collecting data from multiple sources

6
New cards

true or false? Distributed data processing involves large databases being centrally processed by powerful mainframe computers and stored in giant disk arrays.

false

7
New cards

What are three features of Hadoop? (Choose three.)

Easily scalable cluster sizes, uses HDFS as a fault tolerant file system, automatic replication of data across clusters.

8
New cards

What is cloud computing?

a system of data centers or connected servers that provide anywhere/anytime access to data and applications.

9
New cards

True or false? data is defined as big data if it is more than 1 petabyte.

false

10
New cards

A business is analyzing sales information as the sales data is being generated from the point-of-sale machines. What type of data is captured and process as the events happen?

transactional data

11
New cards

Which type of data can be used by a business to support managerial analysis tasks and organizational decision making?

analyzed data

12
New cards

What type of data is being collected when an organization is using spreadsheets and forms for data input?

structured data

13
New cards

true or false? Web scraping tools are used to extract and manipulate structured data.

false

14
New cards

What is the process of discovering patterns and relationships in large data sets in order to convert raw data into meaningful information?

data mining

15
New cards

what is artificial intelligence?

the ability of a device to "learn" based on code and provided data

16
New cards

Which field has traditionally been tied to automation?

robotics

17
New cards

What is a requirement for a device to be referred to as a smart device?

the device can make a decision or take a course of action based on outside information.

18
New cards

True or false? an appliance that lowers power consumption during peak demand is considered a smart device.

true

19
New cards

which two applications commonly use ML technology? (Choose two)

credit card fraud detection, speech recognition

20
New cards

Which ML technology can be used to identify and track individual persons?

facial recognition

21
New cards

which technology uses AI and other technologies to reconfigure a network to comply with service levels?

IBN

22
New cards

What is a key feature of the translation element of the intent-based networking model?

application of business intent to network configuration

23
New cards

What three technologies control network functions to accomplish a desired intent in an intent based network? (Choose three.)

Automation, artificial intelligence, machine learning

24
New cards

What are two characteristics of artificial intelligence? (Choose two.)

it uses systems that mimic human cognitive functions such as learning and problem solving, it uses intelligent agents that interact with the environment and make decisions to reach a specific goal.

25
New cards

what term is used to describe the intelligence demonstrated by machines?

artificial intelligence

26
New cards

which technology enables features such as speech recognition, products recommendations, and credit card fraud detection?

machine learning

27
New cards

What are two examples of automation? (Choose two.)

A building automatically adjusts the heating and lights based on the routine of the occupants, a robot cleans up an industrial chemical spill.

28
New cards

Which element of the IBN model orchestrates policies and configures systems?

activation

29
New cards

Which action takes place in the assurance element of the IBN model?

verification and corrective action

30
New cards

What is a goal of performing a risk assessment?

valuing assets to justify security expenditures

31
New cards

match the security best practice to the description

research and perform background checks on employees - implementing human resource security measures.

assign user roles and privilege levels - employing access controls.

train users on security procedures - educating users.

perform and test emergency response scenarios - regularly testing incident responses

32
New cards

What is used to identify a wireless network?

SSID

33
New cards

What are two recommended steps to protect and secure a wireless network? (Choose two.)

update firmware, use WPA2-AES encryption

34
New cards

What is a wireless router security best practice that limits access to only specific internal hosts?

MAC address filtering

35
New cards

How can a virtual assistant be a security risk?

personal information could be leaked.

36
New cards

How are USB flash drives a security risk?

they have a controller that can be infected.

37
New cards

Which three passwords are the least secure? (Choose three.)

randolph, 135792468, asdfghjkl

38
New cards

Why would an IT person use Zabasearch?

to research a person

39
New cards

what is the goal of a white hat hacker?

protecting data

40
New cards

which action can help reduce online risk?

only conduct transactions on websites after verifying the URL is correct.

41
New cards

An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?

encrypt traffic through a VPN.

42
New cards

Which three elements should be combines when creating a strong password? (Choose three.)

combinations of letters and numbers, special characters, phrases

43
New cards

What are three examples of personally identifiable information? (Choose three.)

bank account number, birth date, vehicle identification number

44
New cards

Which two online activities pose high security risks? (Choose two.)

sharing information on social media, following email links that have already been scanned by the email server.

45
New cards

What is an open-source physical computing platform that can take input from a variety of switches or sensors to control physical objects?

Arduino

46
New cards

What is used to provide IoT sensors with access to the network?

a microcontroller

47
New cards

What limits the types of different objects that can become intelligent sensors on the Internet of Things?

our imagination

48
New cards

true or false? With artificial intelligence, smart devices can modify processes and settings on the fly in response to changes on the network.

true

49
New cards

What is the core component of intent-based networking?

Artificial intelligence

50
New cards

What device provides auto discovery service for smart devices that are connected to the network?

home gateway

51
New cards

what are two requirements to connect a smart device to a home wireless network? (Choose two.)

IP addressing, SSID

52
New cards

What are two things that all digital devices need in order to work? (Choose two.)

Computer program, data

53
New cards

What is the largest network in existence?

the internet

54
New cards

Which type of network is the connection between a Bluetooth headset and a vehicle?

PAN (Personal area network)

55
New cards

Which type of network consists of wired computers in a college classroom?

LAN

56
New cards

Which technology is used as a visual programming tool to create a program by connecting colored blocks?

blockly

57
New cards

Which two skills help with IoT prototyping? (Choose two.)

design, programming

58
New cards

What are three attributes of data that would indicate that it may be big data? (Choose three.)

volume, velocity, variety

59
New cards

What are three benefits of cloud computing? (Choose three.)

It enables access to organizational data anywhere and at any time, it streamlines the IT operations of an organization by subscribing only to needed services, it eliminates or reduces the need for onsite IT equipment maintenance and management.

60
New cards

Which statement describes global variables in programming languages?

they can be used within any function of a program

61
New cards

What are two characteristics of the Python programming language? (Choose two.)

it runs without conversion to machine-language, the code is easy to read

62
New cards

what is the purpose of data analytics?

to gain new insights from data

63
New cards

how is data that has been collected through sources such as web pages, audio, or tweets categorized?

unstructured data

64
New cards

true or false? comma-separated values (CSV), JSON, and XML are all tools that can be used to manipulate structured data.

true

65
New cards

Mined data can be visualized through the use of charts. Select two criteria that can be used to determine the best chart selection.

number of variables to be shown, items requiring comparison.

66
New cards

Change will have to occur in the corporate network in order to prepare for the Internet of Things. Which type of testing would a company do to demonstrate the benefits of networking a new "thing" that was not on the netwrok before?

prototyping

67
New cards

A company requires using a secure encrypted internet connection when connecting to the corporate network from outside the company. Which technology should be used when employees travel and use a laptop?

VPN

68
New cards

Which two types of institution do malicious web pages often look like? (Choose two.)

bank, financial

69
New cards

Which security best practice involves defining company rules, job duties, and expectations?

developing a security policy.

70
New cards

What are two feature of automation? (Choose two.)

a process that is self-driven, a process that eventually eliminates the need for human intervention.

71
New cards

Which technology has the intelligence that is demonstrated by machines in a way that mimics human cognitive functions?

AI

72
New cards

Which technology is a subset of AI that uses statistical techniques to enable computers to "learn" from collected data?

ML

73
New cards

What is a key feature of the assurance element of the intent-based networking model?

end-to-end verification of network-wide behavior

74
New cards

match the logic structure to the function.

IF THEN - allow the code to make decisions

WHILE - execute a block of code while a condition is true

FOR - repeat the execution of a specific block of code for a specific number of times

75
New cards

What are the two areas of physical security within a data center? (Choose two.)

inside, outside

Explore top flashcards