Home Certification CISCO Introduction to IoT Chapter 4 Quiz Answers

CISCO Introduction to IoT Chapter 4 Quiz Answers

387
0

Q1)Which ML technology can be used to identify and track individual persons?

Group of answer choices

  • credit card fraud detection
  • e-readers
  • facial recognition
  • shape recognition

Q2)True or False?

An appliance that lowers power consumption during peak demand is considered a smart device.

Group of answer choices

  • false
  • true

Q3)Which two applications commonly use ML technology? (Choose two.)

Group of answer choices

  • playground safety scanning
  • speech recognition
  • credit card fraud detection
  • e-readers
  • graphic design

 Q4)What term is used to describe the intelligence demonstrated by machines?

Group of answer choices

  • machine learning
  • IBN
  • artificial intelligence
  • natural intelligence

Q5)Which field has traditionally been tied to automation?

Group of answer choices

  • education
  • medicine
  • sports
  • robotics

 Q6)Which element of the IBN model orchestrates policies and configures systems?

Group of answer choices

  • physical and virtual infrastructure
  • activation
  • assurance
  • translation

Q7)What three technologies control network functions to accomplish a desired intent in an intent based network? (Choose three.)

Group of answer choices

  • artificial intelligence
  • robots
  • advanced analytics
  • cloud computing
  • machine learning
  • automation

Q8)What are two characteristics of artificial intelligence? (Choose two.)

Group of answer choices

  • Artificial intelligence uses statistical techniques to give computers the ability to learn from their environment.
  • It uses systems that mimic human cognitive functions such as learning and problem solving.
  • It translates intent into policies and then uses automation to deploy appropriate network configurations.
  • It uses intelligent agents that interact with the environment and make decisions to reach a specific goal.
  • It is an agile, responsive network technology that scales easily and adapts to meet business requirements.

Q9)What is a key feature of the translation element of the intent-based networking model?

Group of answer choices

  • provisioning of intent-based policies
  • end-to-end verification of network-wide behavior
  • application of business intent to network configuration
  • verification of configuration before devices are deployed

 Q11) What are two examples of automation? (Choose two.)

Group of answer choices

  • A user changes TV channels via a wireless remote.
  • A customer uses online banking to pay a bill.
  • A robot cleans up an industrial chemical spill.
  • An automobile is started remotely by the owner.
  • A building automatically adjusts the heating and lights based the routine of the occupants.

Q12)Which technology enables features such as speech recognition, product recommendations, and credit card fraud detection?

Group of answer choices

  • artificial intelligence
  • natural intelligence
  • IBN
  • machine learning

Q12)Which technology uses AI and other technologies to reconfigure a network to comply with service levels?

Group of answer choices

  • CSV
  • JSON
  • IBN
  • ML

Q13)What is a requirement for a device to be referred to as a smart device?

Group of answer choices

  • The device can perform a series of steps based on programmed code.
  • The device can make a decision or take a course of action based on outside information.
  • The device can accept human input.
  • The device stores data that is retrievable.

 Q14)Which action takes place in the assurance element of the IBN model?

Group of answer choices

  • verification and corrective action
  • integrity checks
  • translation of policies
  • configuring systems

Q15)What is artificial intelligence?

Group of answer choices

  • the intersection of innovation and society
  • the ability of a device to “learn” based on code and provided data
  • the connectivity of multiple devices and transmission of data through the internet
  • the gathering of data from sensors

LEAVE A REPLY

Please enter your comment!
Please enter your name here