The process of gathering information about a target system to find vulnerabilities that can be exploited is called _______.

  • Debugging
  • Encryption
  • Hacking
  • Scanning
The process of gathering information about a target system to find vulnerabilities is known as 'Scanning.' It's a critical phase in penetration testing and security assessment.

In a O(nlog?n) sorting algorithm, the log?n typically indicates the use of a _______ process.

  • Divide and Conquer
  • Linear
  • Parallel
  • Recursive
In a sorting algorithm with a time complexity of O(nlog?n), the log?n typically indicates the use of a 'Divide and Conquer' process, where the problem is split into smaller subproblems and solved recursively.

In HPC, the practice of splitting a single task into smaller tasks that run simultaneously across multiple processors is called _______.

  • Clustering
  • Multithreading
  • Parallelism
  • Virtualization
In High-Performance Computing (HPC), 'parallelism' is the technique of dividing a single task into smaller tasks that can run concurrently across multiple processors or cores, improving performance.

A neural network with three or more layers (input, output, and one or more hidden layers) is termed as a __________.

  • Deep Learning Network
  • Feedforward Network
  • Perceptron
  • Recurrent Network
A neural network with three or more layers, including input, output, and one or more hidden layers, is termed as a "Deep Learning Network." Deep networks are known for their ability to model complex relationships.

In deep learning, when the internal states of a neural network capture necessary information about previous time steps, it is particularly referred to as _______.

  • Backpropagation
  • Convolutional Layer
  • Long Short-Term Memory
  • Recurrent Neural Network
The term you're referring to is 'Recurrent Neural Network' (RNN). RNNs are designed to capture information from previous time steps, making them suitable for sequential data tasks like natural language processing and time series analysis.

An essential consideration for IoT security is ensuring the _______ of data as it is transferred from devices to servers.

  • Availability
  • Confidentiality
  • Integrity
  • Performance
IoT security requires data 'Integrity' to ensure that data remains unchanged during transmission from IoT devices to servers, preventing data tampering.

A project manager receives feedback from the quality team that certain features do not meet the quality standards. What should be the project manager's immediate step?

  • Blame the quality team for the issues.
  • Ignore the feedback and proceed with the project.
  • Prioritize the project's schedule over quality.
  • Review and address the quality issues.
When a project manager receives feedback from the quality team indicating quality issues, the immediate step should be to review and address these issues. Ignoring quality concerns can lead to project failure or costly rework later. It's crucial to ensure that the project meets the required quality standards to deliver a successful outcome.

Which ITSM framework is designed around five lifecycle stages: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement?

  • Agile
  • DevOps
  • ITIL
  • Scrum
The ITSM framework that is structured around the five lifecycle stages mentioned is 'ITIL' (Information Technology Infrastructure Library). ITIL provides a comprehensive approach to IT service management.

The _______ is a protocol stack used in IoT to facilitate device-to-device, device-to-server, and server-to-server communication.

  • HTML
  • HTTP
  • MQTT
  • OSI Model
The 'MQTT (Message Queuing Telemetry Transport)' protocol stack is commonly used in IoT for facilitating communication between devices and servers. It's designed for efficient, lightweight messaging.

You are tasked with securely transmitting credit card data over the internet. Which cryptographic protocol would be most appropriate to ensure data integrity, confidentiality, and authentication?

  • FTP
  • MD5
  • SHA-256
  • SSL/TLS
The most appropriate cryptographic protocol for securely transmitting sensitive data like credit card information over the internet is 'SSL/TLS' (Secure Sockets Layer/Transport Layer Security). SSL/TLS provides data integrity, confidentiality, and authentication through encryption and certificates.