In intrusion detection, a set of rules used to detect typical intrusive activity is referred to as _______.
- Encryption
- Firewall
- Honeypot
- Signature
In intrusion detection systems, a 'Signature' is a set of rules used to detect typical intrusive activity. These rules help identify known patterns of attacks or breaches.
Which wireless networking technology is optimized for low power usage and short-range communications, often used in wearable devices?
- Bluetooth LE (Low Energy)
- LTE (Long-Term Evolution)
- NFC (Near Field Communication)
- Wi-Fi
Bluetooth Low Energy (LE) is optimized for low power usage and short-range communications, making it ideal for wearable devices, IoT, and other applications where power efficiency is crucial.
Which type of malware is specifically designed to be activated at a certain time or when a specific condition is met?
- Logic Bomb
- Ransomware
- Spyware
- Trojan Horse
A 'Logic Bomb' is a type of malware that is programmed to execute malicious actions when a predefined condition is met, such as a specific time or event. It can cause harm or data loss.
How does a "risk matrix" aid in the IT risk management process?
- Eliminating risks
- Identifying risks
- Prioritizing risks
- Quantifying risks
A "risk matrix" helps in 'prioritizing risks.' It categorizes risks based on their likelihood and impact, allowing organizations to focus their resources on mitigating the most critical risks first.
In BGP (Border Gateway Protocol), what is the primary metric used for path selection?
- AS Path Length
- Hop Count
- Link Bandwidth
- Network Latency
The primary metric used in BGP for path selection is the 'AS Path Length.' BGP routers use this information to determine the best path to a destination network based on the number of Autonomous Systems (ASes) through which the route has traversed.
What is the primary function of the ALU (Arithmetic Logic Unit) in a computer?
- Display graphics
- Execute instructions
- Manage storage
- Store data
The primary function of the ALU (Arithmetic Logic Unit) is to 'execute instructions.' It performs arithmetic operations (addition, subtraction, etc.) and logical operations (AND, OR, etc.) as directed by the CPU.
Which protocol is used to assign IP addresses to devices on a network automatically?
- DHCP
- DNS
- FTP
- HTTP
The 'DHCP (Dynamic Host Configuration Protocol)' is used to automatically assign IP addresses to devices on a network. It simplifies network management by dynamically allocating IPs to devices.
A common challenge in NLP where words have multiple meanings depending on context is known as _______.
- Ambiguity
- Homonymy
- Polysemy
- Synonymy
In NLP, 'Polysemy' refers to a situation where a word has multiple meanings, and the meaning depends on the context. This is a significant challenge in natural language understanding.
The method where certain portions of a dataset are intentionally left out of training to validate the model's performance is called __________.
- Cross-Validation
- Overfitting
- Regularization
- Underfitting
The method where certain portions of a dataset are intentionally left out of training to validate the model's performance is called "Cross-Validation." Cross-validation helps assess a model's generalization and performance on unseen data.
Which operating system concept allows multiple programs to run concurrently by sharing the same CPU time?
- Multiprocessing
- Multiprogramming
- Multitasking
- Multithreading
'Multitasking' is an operating system concept that allows multiple programs to run concurrently by 'sharing the same CPU time.' This enables users to switch between applications seamlessly.
What is the primary purpose of an ERP system?
- Customer Relationship Management
- Employee Time Tracking
- Integrated Business Operations
- Inventory Management
The primary purpose of an 'ERP (Enterprise Resource Planning) system' is to integrate and streamline various business operations, such as finance, production, inventory, and more, to enhance efficiency and decision-making.
The concept of providing on-demand network access to shared pools of configurable computing resources is known as _______.
- Big Data
- Cloud Computing
- IoT
- Quantum Computing
'Cloud Computing' is the concept of delivering on-demand access to a shared pool of computing resources over the internet. These resources can be easily configured and scaled to meet various computing needs.