Which ACID property ensures that once a transaction is committed, it remains permanent even in the event of system failures?
- Atomicity
- Consistency
- Durability
- Isolation
The 'Durability' property in the ACID (Atomicity, Consistency, Isolation, Durability) transaction model ensures that once a transaction is committed, the changes are permanent and will survive system failures, such as power outages or crashes.
In ITSM, which process focuses primarily on restoring services to normal operation as quickly as possible?
- Change Management
- Incident Management
- Problem Management
- Service Level Management
'Incident Management' in IT Service Management (ITSM) primarily focuses on restoring services to normal operation as quickly as possible after an incident or disruption occurs. It aims to minimize service downtime.
Which advanced threat in network security involves a cyber attacker establishing a foothold within a network and then moving laterally to access more resources?
- APT (Advanced Persistent Threat)
- DoS (Denial of Service)
- Phishing Attack
- Ransomware
An "APT" (Advanced Persistent Threat) is a complex and prolonged cyberattack where an attacker gains initial access to a network and then stealthily moves laterally to maintain a persistent presence and access more resources.
What is the main difference between a cloud-based "load balancer" and a "traffic manager"?
- Load balancers distribute network traffic across multiple servers.
- Load balancers route traffic based on geographical locations.
- Traffic managers monitor the quality of network traffic.
- Traffic managers provide cybersecurity for cloud-based services.
The main difference is that 'load balancers' distribute incoming network traffic across multiple servers to ensure high availability and optimal resource utilization. 'Traffic managers' typically focus on routing traffic efficiently based on various factors but may not necessarily distribute load.
Which cryptographic scheme provides both authentication and secrecy for a message using block ciphers?
- AES-GCM
- Diffie-Hellman Key Exchange
- HMAC (Hash-based Message Authentication Code)
- RSA
AES-GCM (Advanced Encryption Standard-Galois/Counter Mode) is a cryptographic scheme that combines block cipher (AES) with a mode of operation (GCM) to provide both authentication and secrecy for a message. It ensures the message's confidentiality and verifies its authenticity.
In the context of convolutional neural networks (CNNs), what operation is used to reduce the spatial dimensions of the input volume?
- Batch Normalization
- Normalization
- Pooling
- Weight Initialization
In CNNs, 'pooling' is used to reduce the spatial dimensions of the input volume. Pooling layers downsample the feature maps, which helps in reducing computational complexity while retaining essential information, enabling the network to focus on important features.
A user is running multiple applications simultaneously on their computer. Over time, the computer starts to slow down and becomes less responsive. Which operating system feature can help manage and allocate the CPU's time among the various running applications?
- Device Manager
- Disk Cleanup Utility
- File Explorer
- Task Scheduler
The 'Task Scheduler' is an operating system feature that helps manage and allocate the CPU's time among various running applications. It schedules tasks and processes, ensuring fair and efficient resource allocation.
What is the primary purpose of a network switch in a local area network (LAN)?
- Connect devices
- Connect to the internet
- Provide wireless access
- Store data temporarily
A network switch primarily serves to 'connect devices' within a local area network (LAN). It intelligently forwards data to the appropriate device based on the device's MAC address, improving network efficiency.
In HPC, what is the primary purpose of using parallel processing techniques?
- Enhancing data security
- Minimizing software complexity
- Reducing hardware costs
- Speeding up individual tasks
Parallel processing in High-Performance Computing (HPC) aims to 'speed up individual tasks' by breaking them into smaller sub-tasks that can be processed simultaneously on multiple processors, increasing overall computation speed.
Which approach in ERP involves tailoring the software to fit the specific needs and processes of an organization, often leading to longer implementation times?
- Configuration
- Customization
- Off-the-shelf
- Standardization
The approach of 'customization' in ERP entails tailoring the software to meet specific organizational needs. This can lead to longer implementation times but results in a more tailored solution.