A. By encrypting traffic flows for secure transmission.
B. By analyzing historical data and identifying trends.
C. By allocating bandwidth to prioritized applications.
D. By compressing real-time network traffic logs.
正解:B
解説:
Machine learning predicts network traffic patterns by analyzing historical data and identifying trends over time. AI+ Network documentation explains that ML models are trained on past traffic metrics such as bandwidth usage, latency, packet loss, time-of-day patterns, and application behavior.
By learning from this data, machine learning algorithms can forecast future traffic demands, anticipate congestion, and enable proactive network optimization. This predictive capability allows networks to scale resources in advance, adjust routing paths, and maintain consistent Quality of Service (QoS).
Machine learning does not compress traffic or perform encryption directly. While it can inform bandwidth allocation decisions, prediction itself is achieved through pattern recognition and trend analysis. AI+ Network materials emphasize predictive analytics as a core advantage of AI-driven networking solutions.
質問 # 25
(What is a key advantage of using Ansible for network automation?)
A. It relies on Ruby scripts for configuration tasks.
B. It utilizes an agentless architecture for managing devices.
C. It limits network management to Linux-based devices only.
D. It mandates pre-installation of agents on managed devices.
正解:B
解説:
Ansible's key advantage in network automation is itsagentless architecture, which allows devices to be managed without installing additional software on them. AI+ Network automation documentation emphasizes that Ansible uses standard protocols such as SSH and APIs to communicate with network devices, making deployment simple and scalable.
This design significantly reduces operational overhead and security risks associated with maintaining agents across hundreds or thousands of devices. Ansible playbooks, written in YAML, define desired configurations in a clear, human-readable format, improving collaboration and reducing configuration errors.
Unlike Chef, which relies on Ruby-based cookbooks, Ansible does not require specialized programming knowledge. It also supports a wide range of vendors and platforms beyond Linux. AI+ Network materials consistently position Ansible as an efficient, low-complexity automation tool ideal for both enterprise and multi-vendor network environments.
質問 # 26
(What does a cookbook define in Chef's configuration process?)
A. Resources and the sequence of their application on nodes.
B. Environment variables for physical and virtual machines.
C. Metadata storage for verifying configuration changes.
D. Communication protocols between servers and nodes.
正解:A
解説:
In Chef's configuration management process, a cookbook defines the resources and the sequence in which they are applied to nodes. AI+ Network automation documentation explains that cookbooks are the fundamental building blocks of Chef, containing recipes, attributes, templates, and files required to configure systems consistently.
Recipes within a cookbook specifywhat resources are needed-such as packages, services, files, and users- andthe order in which they should be executed. This ensures predictable and repeatable configuration across large-scale infrastructures. Chef follows a declarative approach, meaning the desired system state is defined, and Chef enforces that state automatically.
Cookbooks do not define communication protocols or environment variables directly, nor are they limited to metadata storage. AI+ Network orchestration principles emphasize Chef cookbooks as essential for scalable automation, compliance enforcement, and infrastructure-as-code practices.
質問 # 27
(Scenario: A multinational corporation faces an issue where employees working remotely often connect to corporate resources using unsecured devices. Despite enforcing strong password policies, they still encounter breaches due to compromised endpoints. The security team needs a strategy to ensure only compliant devices can access sensitive resources while minimizing user disruption.
Question: What approach should the corporation adopt to resolve this issue?)
A. Implement Zero Trust Architecture to verify user and device compliance.
B. Enforce stricter password policies to enhance user authentication security.
C. Restrict remote access entirely to prevent breaches from unsecured devices.
D. Deploy network segmentation to isolate critical resources from remote access.
正解:A
解説:
Implementing a Zero Trust Architecture (ZTA) is the most effective approach for securing access from remote and potentially unsecured devices. AI+ Network security documentation explains that Zero Trust operates on the principle of "never trust, always verify," requiring continuous validation of both user identity and device posture before granting access.
Unlike traditional perimeter-based security, Zero Trust evaluates device compliance factors such as operating system health, patch status, and endpoint security controls. Access is granted dynamically and contextually, minimizing disruption while significantly reducing risk. Even authenticated users are restricted to least- privilege access.
Stricter passwords alone do not address compromised endpoints, and completely restricting remote access harms productivity. Network segmentation helps limit damage but does not verify endpoint integrity. AI+ Network frameworks clearly identify Zero Trust as the preferred model for modern, distributed workforces.
質問 # 28
(How does DeepSlice enhance 5G network slicing?)
A. By using deep learning to optimize load management.
B. By automating penetration testing for security vulnerabilities.
C. By preemptively blocking threats to web applications and APIs.
D. By focusing on static DNS domain classifications.
正解:A
解説:
DeepSlice enhances 5G network slicing by applying deep learning techniques to optimize load management across network slices. AI+ Network documentation explains that 5G slicing allows multiple virtual networks to operate on the same physical infrastructure, each tailored to specific service requirements such as latency, bandwidth, or reliability.
DeepSlice continuously analyzes traffic demand, user mobility, and application performance metrics. Using deep learning models, it dynamically adjusts resource allocation to ensure each slice receives the appropriate level of service. This improves efficiency, reduces congestion, and maintains Quality of Service (QoS) for diverse use cases such as autonomous vehicles, IoT, and enhanced mobile broadband.
Other options relate to security or DNS analysis and do not address slice optimization. AI+ Network materials identify DeepSlice as a critical innovation for intelligent, adaptive 5G resource management.