Which regulatory compliance mandates the protection of personally identifiable information (PII) for European Union (EU) citizens?
- COPPA
- FERPA
- GDPR
- HIPAA
The General Data Protection Regulation (GDPR) is a regulation in EU law that mandates the protection of personally identifiable information (PII) for EU citizens. It sets strict rules for data privacy and security.
A company wants to ensure that their cloud-hosted application remains available even if one entire data center fails. What should they consider implementing?
- Disaster Recovery Plan
- Failover
- Load Balancing
- Redundancy
To ensure high availability, implementing 'redundancy' is essential. This means duplicating critical components across multiple data centers, ensuring the application remains available even if one center fails.
In virtualization, the primary operating system running on the host machine is often called the _______.
- Emulator
- Guest OS
- Hypervisor
- Kernel
The primary operating system running on the host machine in virtualization is often referred to as the 'Hypervisor.' A hypervisor manages and facilitates the execution of multiple guest operating systems.
The _______ in an operating system acts as a bridge between application software and hardware.
- Compiler
- Firewall
- Kernel
- Router
The 'Kernel' in an operating system serves as the core component that manages the communication between application software and hardware, facilitating the execution of tasks and resource management. It is an essential bridge between software and hardware.
An organization wants to run multiple isolated Linux-based systems on a single host for testing purposes. Which lightweight virtualization technology, operating at the container level, would be suitable?
- Docker
- KVM
- VMware
- Xen
Docker is a containerization platform that allows you to run multiple isolated instances on a single host efficiently. It's known for its lightweight nature and is widely used for testing and deployment.
What is the primary goal of penetration testing?
- To audit financial records
- To design secure systems
- To discover all vulnerabilities
- To exploit vulnerabilities
The primary goal of penetration testing is 'To design secure systems.' It aims to identify weaknesses in a system's security and provide insights to improve and design a more secure infrastructure.
To reduce latency and improve load times for global users, companies use a cloud service called _______.
- Content Delivery Network (CDN)
- Domain Name System (DNS)
- Internet Service Provider (ISP)
- Web Hosting Service
Companies use a 'Content Delivery Network (CDN)' to reduce latency and improve load times for global users. CDNs distribute content to edge servers around the world, ensuring faster access to content for users.
You are a network administrator and receive reports of intermittent connectivity to a cloud-based application. Which tool would you first use to check if the issue is due to packet loss?
- Ping
- Traceroute
- netstat
- nslookup
To diagnose packet loss issues, the first tool you would use is 'Ping.' Ping sends ICMP packets to the target server and measures round-trip time and packet loss, helping identify network problems.
Which scheduling algorithm in operating systems gives the shortest job the highest priority?
- First-Come-First-Served (FCFS)
- Priority Scheduling
- Round Robin
- Shortest Job Next (SJN)
The scheduling algorithm that gives the shortest job the highest priority is "Shortest Job Next" (SJN). This approach minimizes waiting time and helps to execute shorter tasks quickly, leading to optimal resource utilization.
One of the advanced techniques in NLP for handling large vocabularies without assigning a unique token to each word is called _______.
- FastText
- Semantic Segmentation
- Subword Tokenization
- Word2Vec
The technique mentioned is 'Subword Tokenization,' which involves breaking words into smaller units, such as subword pieces or characters, to handle large vocabularies efficiently. This is commonly used in models like BERT.
In Storage Area Networks (SAN), which protocol is commonly used to transfer data between the storage devices and servers?
- FTP (File Transfer Protocol)
- NFS (Network File System)
- SMB (Server Message Block)
- iSCSI (Internet Small Computer System Interface)
In Storage Area Networks (SAN), 'iSCSI' is commonly used to transfer data between storage devices and servers. iSCSI allows for block-level data transfer over IP networks, making it a popular choice for SANs.
In NLP, what is the process of converting words into numerical vectors called?
- Embedding
- Lemmatization
- Stemming
- Tokenization
The process of converting words into numerical vectors in NLP is called 'Embedding.' Word embeddings like Word2Vec, GloVe, and FastText are widely used to represent words as dense vectors in machine learning models.