A common tool used to capture and analyze network packets for troubleshooting is called _______.
- Gateway
- LAN Switch
- Packet Sniffer
- Router
A 'Packet Sniffer' is a tool used by network professionals to capture and analyze network packets for troubleshooting, monitoring, and security analysis. It's essential for network diagnostics.
Which approach to digital transformation focuses on rapid experimentation, frequent releases, and iterative development?
- Agile
- DevOps
- Six Sigma
- Waterfall
The 'Agile' approach to digital transformation emphasizes rapid experimentation, frequent releases, and iterative development. It is a flexible methodology that adapts to changing requirements and customer feedback.
Which of the following best describes the primary purpose of IoT devices?
- Collect and exchange data
- Cook meals automatically
- Play video games
- Predict the weather
The primary purpose of IoT (Internet of Things) devices is to "collect and exchange data." These devices are designed to gather information from the physical world and share it over the internet for analysis and automation.
Which tool is often used to diagnose the route packets take through the network?
- Firewall Software
- Traceroute
- Video Streaming Tool
- Word Processing Software
'Traceroute' is a network diagnostic tool used to trace the route packets take through the network. It displays the path and measures the transit times between network nodes, helping identify connectivity issues.
Which ERP deployment method involves using the Internet to access software applications provided by third-party vendors?
- Cloud-Based Deployment
- Hybrid Deployment
- On-Premises Deployment
- Open-Source Deployment
'Cloud-Based Deployment' in ERP involves using the Internet to access software applications hosted by third-party vendors. This method offers scalability, cost-efficiency, and flexibility in comparison to traditional on-premises deployments.
You are designing a new computer system that requires very fast temporary storage to hold data between the CPU and main memory. Which type of memory would be most appropriate?
- Cache Memory
- Hard Disk Drive (HDD)
- Optical Drive
- USB Flash Drive
The most appropriate choice for fast temporary storage between the CPU and main memory is 'Cache Memory.' It is a high-speed, volatile memory that reduces latency in data access, improving system performance.
A software engineering practice where production defects are immediately corrected without going through the standard incident management flow is termed _______.
- Agile Development
- Continuous Delivery
- Firefighting
- Zero Defect Approach
This practice is often referred to as the "Zero Defect Approach" or "Zero Bug Bounce." It emphasizes fixing production defects promptly without following the standard incident management process.
A _______ is a consolidated network infrastructure in the cloud that replicates an on-premises network.
- Cloud Network
- Data Center
- Virtual Machine
- Virtual Private Network (VPN)
In cloud computing, a 'Cloud Network' refers to a consolidated network infrastructure in the cloud that replicates an on-premises network. It allows organizations to create virtualized network environments in the cloud.
Which cryptographic method involves converting plain text into a scrambled format using a key?
- Deciphering
- Decryption
- Encoding
- Encryption
'Encryption' is a cryptographic process that involves converting plain text into a scrambled format (cipher text) using a specific key. This is used to protect data from unauthorized access.
_______ is the process of distributing data across multiple disks to enhance performance and fault tolerance.
- API
- BIOS
- HTTP
- RAID
'RAID' stands for Redundant Array of Independent Disks. It's a technology used to distribute and replicate data across multiple disks for performance and fault tolerance improvement.
A digital _______ is a cryptographic equivalent of a handwritten signature or stamped seal, but much more secure.
- Certificate
- Firewall
- Hash
- Key
The blank should be filled with "Certificate." A digital certificate serves as a cryptographic equivalent of a traditional signature or seal, offering a secure means of verifying the identity and authenticity of a user or entity.
What is the key difference between Type 1 (bare-metal) and Type 2 (hosted) hypervisors?
- Type 1 hypervisors are easier to install than Type 2 hypervisors.
- Type 1 hypervisors are more expensive than Type 2 hypervisors.
- Type 1 hypervisors are used for gaming, while Type 2 hypervisors are used for server virtualization.
- Type 1 hypervisors run directly on the physical hardware, while Type 2 hypervisors run on top of a host operating system.
The key difference is that 'Type 1 hypervisors' run directly on the physical hardware (bare-metal), while 'Type 2 hypervisors' run on top of a host operating system. Type 1 offers better performance and isolation.