NTEN 123 – IoE

Ch. 1
Which statement describes a characteristic of a converged network?

a. The network establishes separate communication channels for each network service.
b. Network services are delivered over a wide range of network platforms.
c. The network uses different technologies for voice, video, and data.
d. A single network that delivers voice, video, and data to a variety of devices.

d. A single network that delivers voice, video, and data to a variety of devices.
Ch. 1
What is the IoE?

a. It is another term for the Internet.
b. It is a high-speed global cellular service that quickly connects people anywhere in the world.
c. It is an interconnection between people, data, process, and things to provide value.
d. It is an application for connecting and configuring sensors.
e. It is a security protocol for social media.

c. It is an interconnection between people, data, process, and things to provide value.
Ch. 1
Fill in the blank.

The _______ pillar of the IoE focuses on the interactions between the other three pillars so that information is provided to the right place at the appropriate time.

process
Ch. 1
What are two functions of intermediary devices on a network? (Choose two.)

A. They direct data along alternate pathways when there is a link failure.
B. They are the primary source and providers of information and services to end devices.
C. They run applications that support collaboration for business.
D. They filter the flow of data, based on security settings.
E. They form the interface between the human network and the underlying communication network.

A. They direct data along alternate pathways when there is a link failure.

D. They filter the flow of data, based on security settings.

Ch. 1
List four items that will potentially disappear from daily use within the next 25 years because of technological advancements.
telephone booths
video rental stores
watches
stamps
wallets
checks
newspapers
books
telephone landlines
telephone poles
Ch. 1
What two criteria are used to help select a network medium from various network media? (Choose two.)

A. the number of intermediary devices installed in the network
B. the distance the selected medium can successfully carry a signal
C. the types of data that need to be prioritized
D. the cost of the end devices utilized in the network
E. the environment where the selected medium is to be installed

B. the distance the selected medium can successfully carry a signal

E. the environment where the selected medium is to be installed

Ch. 1
How many “things” are predicted to be interconnected on the Internet by 2020?

A. 1 billion
B. 5 million
C. 1 million
D. 50 billion

D. 50 billion
Ch. 1
Match the core priorities of an organization to examples of the value of using the IoE.

A) asset utilization
B) customer experience
C) supply chain
D) innovation
E) employee productivity

i) improving customer relationships and garnering more of the market
ii) reducing time to market products and improving product development to meet customer needs
iii) providing processes and an environment to improve productivity and scalability
iv) lower costs
v) identify areas of waste and delays, while increasing logistic efficiency

A) asset utilization = iv) lower costs

B) customer experience = i) improving customer relationships and garnering more of the market

C) supply chain = v) identify areas of waste and delays, while increasing logistic efficiency

D) innovation = ii) reducing time to market products and improving product development to meet customer needs

E) employee productivity = iii) providing processes and an environment to improve productivity and scalability

Ch. 1
What is the Internet?

A) the type of physical media used by computers to access the Word Wide Web
B) a small isolated internal network of a company
C) a network of networks
D) an application used to access the World Wide Web

Ch. 1
What describes the Networked Economy phase of Internet development?

A) It provided connections that allowed web browsing and email at limited speeds.
B) It involved transitioning everything to the Internet.
C) It is dominated by social media and connecting mobile devices.
D) It is considered the birth of e-commerce.

D) It is considered the birth of e-commerce.
Ch. 1
True or False?
A company that uses customer feedback posted on the Internet to guide the revision of support policies is an example of a company being agile.
True
Ch. 3
Why is Cloud computing necessary for the management of data in the Internet of Everything?

A) It provides security for applications by hiding them in a Cloud.
B) It provides applications and services distributed over the globe.
C) It provides support for latency-sensitive applications.
D) It provides a new secure and transparent programming language to create applications.

B) It provides applications and services distributed over the globe.
Ch. 3
What is an example of a computer program that could be coded with the JavaScript scripting language?

A) a mortgage monthly payment calculator on a web page
B) Microsoft Word
C) a game on an iPad
D) the system software on an Android cell phone

A) a mortgage monthly payment calculator on a web page
Ch. 3
Which network device maintains information on where to forward data packets to reach remote destinations?

A) aggregator
B) router
C) controller
D) actuator

B) router
Ch. 3
Which three 802.15 protocols must forward information to an IP-enabled device to communicate on the Internet? (Choose three.)

a) ZigBee
b) Bluetooth
c) NFC
d) C++
e) Ethernet

a) ZigBee
b) Bluetooth
c) NFC
Ch. 3
question 5 matching
Ch. 3
Fill in the blank.

A default _______ must be configured on an IP-enabled end device so that the device can communicate with devices on different IP networks.​

gateway
Ch. 3
Fill in the blank.

_______ is software that is embedded into the read-only memory of devices such as watches and cell phones. This limited functionality software is often used to boot the device.

firmware
Ch. 3
How many bits make up an IPv6 address?

A) 132
B) 48
C) 128
D) 32
E) 64

C) 128
Ch. 3
Why is a common protocol suite necessary for transmission of data over remote networks?

A) to reduce the number of vendors needed
B) to ensure the interoperability of devices from various vendors
C) to consolidate multiple protocols for both short distance and long distance networks
D) to increase the bandwidth of network connections

B) to ensure the interoperability of devices from various vendors
Ch. 3
Which type of device will be most responsible for the explosive growth of the IoT?

a) sensors
b) computers
c) actuators
d) smart phones

a) sensors
Ch. 3
What statement describes Fog computing?

a) It supports larger networks than Cloud computing does.
b) It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center.
c) It requires Cloud computing services to support non-IP enabled sensors and controllers.
d) It creates a distributed computing infrastructure that provides services close to the network edge.

d) It creates a distributed computing infrastructure that provides services close to the network edge.
Ch. 4
A vibration sensor on an automated production line detects an unusual condition. The sensor communicates with a controller that automatically shuts down the line and activates an alarm. What type of communication does this scenario represent?

A) people-to-machine
B) people-to-people
C) machine-to-people
D) machine-to-machine

D) machine-to-machine
Ch. 4
Which scenario is an example of M2P interactions in an IoE implementation?

a) a wireless sensor obtaining an IP address dynamically
b) sensors and actuators controlling equipment operation
c) sensors reporting the status of equipment on a production line to a controller
d) a technician investigating a condition reported by a sensor

d) a technician investigating a condition reported by a sensor
Ch. 4
What process in a basic wireless security implementation is used to encode information so that only authorized individuals can read it?

a) authorization
b) authentication
c) encryption
d) polarization

c) encryption
Ch. 4
Connecting things in the IoT requires the convergence of information technology and ___________ technology within an organization.

a) analytical
b) operational
c) infrastructure
d) financial
e) statistical

b) operational
Ch. 4
What effect is the Internet of Things expected to have on the amount of data generated on the Internet?

a) exponential growth
b) stay about the same
c) dramatic decrease

a) exponential growth
Ch. 4
The IoE can improve employee productivity through empowering employees with tools to complete their work where and how they need. True/False?
True
Ch. 4
question 7
Ch. 4
Which two types of devices can be used to protect end devices in the IoE from attacks? (Choose two.)

a) sensor
b) firewall
c) DSL and cable modems
d) file server
e) intrusion prevention system

b) firewall
e) intrusion prevention system
Ch. 4
Which layer of the Cisco IoE architectural approach includes the proper mix of hardware and software within the corporate environment, Cloud, and service provider network?

a) network
b) platform
c) infrastructure
d) application

c) infrastructure
Ch. 4
In the Cisco Streamlines Old Mining Operations video, what type of device would monitor the truck drivers for alertness?

a) sensor
b) satellite
c) actuator
d) wireless router
e) GPS

a) sensor
Ch. 2
As IoE connections are evolving, which component will change to get the right information to the right place at the right time more efficiently?
things
people
intelligence
process
process
Ch. 2
question2
Ch. 2
A few days ago, a person was browsing a website that sells sporting goods. After some time, this person receives an email from the same website about a sale on a similar item. What kind of business practice is this?​

telemarketing
retail marketing
micromarketing

micromarketing
Ch. 2
Which scenario is an example of an M2M interaction in a retail IoE solution?

When a customer removes an item from the shelf, the RFID tag sends an inventory update message to the ordering management system.
A customer uses a kiosk to order food in a gas station.
A customer reviews the receipt after paying the shopping expense with a credit card.
An employee replenishes canned fruits to a shelf after the sensor sends the signal that the shelf is almost empty.

When a customer removes an item from the shelf, the RFID tag sends an inventory update message to the ordering management system.
Ch. 2
In a new smart home, the refrigerator has a sensor that detects that the milk container is almost empty. To what device would this sensor send this data so that eventually a text message is sent to the home owner?

sensor server
Internet provider server
controller
RFID

controller
Ch. 2
True or False?
The term big data refers only to the amount of data being generated?
False
Ch. 2
How do packets travel across the Internet?
They are packet switched independently, from router to router, along the best path.
An end-to-end circuit is created between the source and destination before the packets are transmitted.
The ISP of the sender communicates with the destination device to determine the path the packets should take through the Internet.
They are broadcast across all links on the Internet until they are received by the destination device.
They are packet switched independently, from router to router, along the best path.
Ch. 2
What is the purpose of an IP address?
It identifies the source and destination of data packets on a network.
It identifies a return address for replying to email messages.
It identifies a location in memory from which a program runs.
It identifies the physical location of a data center.
It identifies the source and destination of data packets on a network.
Ch. 2
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
maintaining communication integrity
virtualization
BYOD
online collaboration
virtualization
Ch. 2
What are two reasons that electronic data is represented as bits? (Choose two.)

Bits are more secure and make transmissions harder to hack.

Bits are more efficient for storing data.

Bits are the format best understood by people.

Bits can be transmitted over longer distances without quality degradation.

Bits decrease the number of connections that need to be made in the IoE.

Bits are more efficient for storing data.

Bits can be transmitted over longer distances without quality degradation.