Which document outlines the standards, rules, and guidelines for computer systems and their users in an organization?

  • Code of Conduct
  • End-User License Agreement (EULA)
  • IT Policy
  • Service Level Agreement (SL
An 'IT Policy' is a comprehensive document that outlines the standards, rules, and guidelines for computer systems and their users within an organization. It governs how technology is used and maintained.

Which technology is essential in HPC to interconnect multiple processors and achieve faster data transfer rates?

  • Bluetooth
  • Ethernet
  • InfiniBand
  • USB (Universal Serial Bus)
InfiniBand is a high-speed interconnect technology used in HPC to connect processors, memory, and storage devices. It enables 'faster data transfer rates' essential for high-performance computing applications.

What is the primary purpose of a hypervisor in virtualization?

  • Managing physical servers
  • Providing network security
  • Running database queries
  • Running virtual machines
A 'hypervisor' is software that allows multiple virtual machines to run on a single physical server. Its primary purpose is to manage and allocate resources to these virtual machines.

Which technique involves an attacker sending multiple requests or inputs to a target system to cause it to crash?

  • Cross-Site Scripting
  • Denial of Service
  • Firewall Bypass
  • SQL Injection
'Denial of Service' (DoS) is an attack technique where an attacker overwhelms a target system with a high volume of requests or inputs, causing it to become unavailable or crash.

The process of organizing a database to reduce redundancy and improve data integrity is known as _______.

  • Aggregation
  • Denormalization
  • Normalization
  • Optimization
'Normalization' is the process of organizing a database to reduce data redundancy, eliminate anomalies, and improve data integrity. It involves breaking down data into separate tables and defining relationships between them.

Your organization's network is growing rapidly, and you need to ensure that routers can learn about network paths automatically without manual configurations. Which approach would be most suitable?

  • BGP (Border Gateway Protocol)
  • Dynamic Routing
  • RIP (Routing Information Protocol)
  • Static Routing
To handle a rapidly growing network while enabling routers to learn network paths automatically, 'Dynamic Routing' is the best approach. Dynamic routing protocols, like OSPF or BGP, allow routers to adapt to network changes without manual intervention.

You've detected an unknown device connected to your wireless home network. What should be the immediate first step to ensure the security of your network?

  • Block the Device's MAC Address
  • Change Wi-Fi Password
  • Restart the Router
  • Run Antivirus Software
The immediate first step to secure your home network when an unknown device is detected is to 'block the device's MAC address.' This prevents the unknown device from connecting to your network and ensures the security of your network's perimeter.

In wireless networks, what does the term "SSID" stand for?

  • Secure System Identifier
  • Signal Strength Indicator
  • Service Set Identifier
  • Subnet Specification
"SSID" stands for "Service Set Identifier" (Option c). It is a unique name used to identify a wireless network. When connecting to a Wi-Fi network, users select the network with the matching SSID. This helps users distinguish between different networks.

In ITSM, a _______ is a standard or set of guidelines for how something might be accomplished, but without mandating a particular tool or method.

  • Best Practice
  • Change Request Form
  • Process Model
  • Service Catalog
In IT Service Management (ITSM), a 'best practice' refers to a standard or set of guidelines for achieving a specific objective or task effectively. It provides recommendations and proven methods, but it doesn't require the use of a particular tool or approach. A Process Model outlines how a specific process works, a Service Catalog lists available services, and a Change Request Form is used to request changes in IT services.

The concept of providing a dedicated portion of a public cloud environment exclusively for a single tenant is called _______.

  • Cloud Bursting
  • Multi-Tenancy
  • Single-Tenancy
  • Virtualization
Single-Tenancy refers to the practice of allocating a dedicated portion of a public cloud for a single tenant or organization, providing isolation and control over resources.