Web pages that can change content dynamically without requiring the page to be fully reloaded are often referred to as _______.
- AJAX pages
- Cookies
- Dynamic pages
- Static pages
Web pages that can change content dynamically without a full page reload are often referred to as 'AJAX pages.' AJAX stands for Asynchronous JavaScript and XML, and it allows for seamless, dynamic content updates in web applications.
In a hybrid cloud environment, what mechanism ensures secure data transmission between on-premises data centers and the cloud?
- Cloud-based firewall
- Data encryption
- Intrusion Detection System (IDS)
- Virtual Private Network (VPN)
In a hybrid cloud environment, a 'Virtual Private Network (VPN)' is commonly used to ensure secure data transmission between on-premises data centers and the cloud. VPNs create encrypted communication tunnels over the public internet, enhancing security. Data encryption alone may not secure the entire transmission path.
The technology that enables one physical piece of hardware to function as multiple "logical" devices is known as _______.
- Cloud Computing
- Firewall
- Mainframe
- Virtualization
The technology that enables one physical piece of hardware to function as multiple "logical" devices is called 'Virtualization.' It abstracts and isolates resources for efficient use.
A security measure where multiple layers of defense are placed throughout an information technology system is known as _______.
- Antivirus
- Defense-in-Depth
- Encryption
- Firewall
Defense-in-Depth is a comprehensive security strategy that involves implementing multiple layers of defense mechanisms to protect an IT system, making it more resilient to various threats and attacks.
Which type of virtualization allows multiple operating systems to run on a single physical machine?
- Application Virtualization
- Cloud Virtualization
- Hypervisor Virtualization
- Network Virtualization
Hypervisor virtualization allows multiple operating systems (OS) to run on a single physical machine simultaneously. A hypervisor, also known as a virtual machine monitor, manages and allocates resources to each virtualized OS, enabling efficient utilization of hardware resources and facilitating tasks like testing different OS environments on a single server.
In computer architecture, what is the role of the control unit?
- Executes arithmetic operations
- Manages computer peripherals
- Manages instruction execution
- Stores data temporarily
In computer architecture, the 'control unit' is responsible for managing instruction execution. It fetches, decodes, and coordinates the execution of instructions, ensuring the proper flow of data and control within the CPU.
In the realm of information assurance, which process ensures that data has not been altered during transmission?
- Data Authentication
- Data Compression
- Data Encryption
- Data Integrity Check
Data Integrity Check ensures that data remains unaltered during transmission. This is typically achieved through methods like checksums or hash functions, which detect any changes in data.
In cloud networking, which service allows users to deploy and manage applications without worrying about the underlying infrastructure?
- Infrastructure as a Service (IaaS)
- On-Premises Deployment
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
'Platform as a Service (PaaS)' is a cloud computing service that provides a platform for developers to build, deploy, and manage applications without having to manage the underlying infrastructure. It abstracts hardware and allows a focus on software development.
A wireless network that is set up by a malicious actor to mimic a legitimate network and trick users into connecting is known as a(n) _______.
- Encryption Key
- Firewall Rule
- Intrusion Detection
- Rogue Access Point
A 'Rogue Access Point' is a deceptive wireless network set up by a malicious actor to imitate a legitimate network. When users connect to it, the attacker can intercept data and potentially launch attacks. Detecting and avoiding rogue access points is crucial for network security.
A _______ is a formal, approved version of a plan against which project execution is compared to measure and manage variances.
- Baseline
- Gantt Chart
- Project Charter
- Stakeholder Register
In project management, a 'baseline' is a crucial concept. It represents a formal, approved version of a project plan, which serves as a reference point to compare and manage variances during project execution. It includes key project elements such as schedule, scope, and budget. A Gantt Chart is a visual representation of a project schedule, a Project Charter is a document that authorizes the project's existence, and a Stakeholder Register is a record of project stakeholders.