An industrial company wants to deploy IoT sensors in their machinery to predict maintenance needs. However, they are concerned about the potential security risks. Which aspect of IoT should they prioritize to ensure the safe transmission of data?

  • Data Encryption
  • Device Authentication
  • Predictive Maintenance Algorithms
  • Secure Boot Process
Prioritizing a 'Secure Boot Process' is essential for ensuring the safe transmission of IoT data. This process ensures that only trusted, authenticated firmware and software are loaded onto devices, preventing unauthorized access and enhancing security. While data encryption, device authentication, and predictive maintenance algorithms are important, securing the boot process is the first line of defense.

Which storage device uses NAND-based flash memory and offers quicker data access than traditional HDDs?

  • CD-ROM (Compact Disc Read-Only Memory)
  • Floppy Disk
  • RAM (Random Access Memory)
  • SSD (Solid State Drive)
An SSD, which stands for 'Solid State Drive,' uses NAND-based flash memory to store data. It is significantly faster in terms of data access compared to traditional HDDs (Hard Disk Drives) because it has no moving parts, resulting in quicker data retrieval. SSDs are commonly used for faster storage and improved system performance.

In a distributed database, what term describes the division of a database into parts, each of which is stored on different servers?

  • Data Fragmentation
  • Data Partitioning
  • Data Replication
  • Data Sharding
Data Sharding is a technique in distributed databases where a database is divided into smaller parts called "shards," and each shard is stored on different servers. This improves data distribution and scalability.

In IT project management, what technique visualizes tasks or activities on a board, allowing team members to track project progress?

  • Critical Path Method (CPM)
  • Gantt Chart
  • Kanban
  • Waterfall Method
The technique that visualizes tasks on a board for easy tracking is 'Kanban.' Kanban is widely used in Agile project management, allowing teams to manage work in progress effectively and optimize flow.

In wireless networks, what does the term "SSID" stand for?

  • Secure System Identifier
  • Signal Strength Indicator
  • Service Set Identifier
  • Subnet Specification
"SSID" stands for "Service Set Identifier" (Option c). It is a unique name used to identify a wireless network. When connecting to a Wi-Fi network, users select the network with the matching SSID. This helps users distinguish between different networks.

In ITSM, a _______ is a standard or set of guidelines for how something might be accomplished, but without mandating a particular tool or method.

  • Best Practice
  • Change Request Form
  • Process Model
  • Service Catalog
In IT Service Management (ITSM), a 'best practice' refers to a standard or set of guidelines for achieving a specific objective or task effectively. It provides recommendations and proven methods, but it doesn't require the use of a particular tool or approach. A Process Model outlines how a specific process works, a Service Catalog lists available services, and a Change Request Form is used to request changes in IT services.

When visualizing data with a large number of categories, a _______ chart can help in displaying the data in a compact and organized manner.

  • Bar
  • Line
  • Pie
  • Treemap
For data visualization with many categories, a 'Treemap' chart is useful. It displays hierarchical data in a compact way, with nested rectangles representing different categories.

In object-oriented programming, what concept involves hiding the internal states and requiring all interaction to be performed through well-defined interfaces?

  • Abstraction
  • Encapsulation
  • Inheritance
  • Polymorphism
'Encapsulation' is a key concept in object-oriented programming that involves bundling the internal state and methods into a single unit (a class) and allowing interaction through well-defined interfaces, thus hiding implementation details.

Which ITSM process aims to minimize the negative impact of changes to the IT infrastructure?

  • Asset Management
  • Change Management
  • Incident Management
  • Problem Management
'Change Management' in ITSM focuses on controlling and managing changes to the IT infrastructure. It aims to minimize the negative impact of changes, ensuring that they are planned and implemented effectively.

In IT governance, the principle that ensures stakeholders' rights are protected and taken into consideration is called _______.

  • Accountability
  • Compliance
  • Equity
  • Transparency
In IT governance, the principle that ensures stakeholders' rights are protected and taken into consideration is 'equity.' This means that the interests and concerns of all stakeholders are fairly addressed, promoting fairness and inclusivity.