Which system is designed to detect and prevent unauthorized access to or from a computer network?
- Firewall
- Modem
- Router
- Switch
A 'Firewall' is a security system designed to detect and prevent unauthorized access to or from a computer network. It acts as a barrier between a trusted internal network and untrusted external networks.
What is the primary goal of IT governance within an organization?
- Aligning IT with business
- Ensuring data security
- Managing IT projects
- Maximizing profits
The primary goal of IT governance is to 'align IT with business.' It ensures that IT investments, resources, and strategies are in harmony with the organization's objectives, contributing to business success.
In the context of IoT, what does the term "edge computing" refer to?
- Processing data at the network core
- Processing data in the cloud
- Processing data on IoT devices
- Processing data on a printed circuit board
"Edge computing" in IoT refers to processing data on the IoT devices themselves, closer to the data source. This helps reduce latency and enhances real-time decision-making, making it an important concept in IoT.
In the context of network security, what does "DLP" stand for, and what is its primary function?
- Data Leakage Prevention (DLP)
- Digital Language Processor
- Distributed Logging Process
- Dynamic Link Protocol
"DLP" stands for "Data Leakage Prevention." Its primary function is to identify, monitor, and prevent unauthorized data transfer or disclosure, whether intentional or accidental, to protect sensitive information within an organization.
The process of integrating new digital technologies and processes into an organization's existing ecosystem, without a complete overhaul, is called _______ transformation.
- Agile
- Digital
- Incremental
- Radical
'Incremental' transformation is the process of gradually integrating new digital technologies and processes into an organization's existing ecosystem without completely overhauling the existing systems. It allows for a smoother transition and reduces disruption.
Which type of malware disguises itself as legitimate software to deceive users into installing malicious code?
- Spyware
- Trojan Horse
- Virus
- Worm
A 'Trojan Horse' is a type of malware that disguises itself as legitimate software, tricking users into installing it. Once installed, it can execute malicious actions without the user's knowledge.
Which memory type is non-volatile and can be electrically erased and reprogrammed?
- Cache
- EEPROM
- RAM
- ROM
'EEPROM' stands for Electrically Erasable Programmable Read-Only Memory. It is a non-volatile memory type that can be erased and reprogrammed electrically. It is commonly used for storing firmware and configuration data.
Which algorithmic paradigm solves problems by trying out solutions using one or more models and then adapting based on what works and what doesn't?
- Divide and Conquer
- Dynamic Programming
- Genetic Algorithms
- Greedy Algorithms
'Greedy Algorithms' follow a paradigm where they make locally optimal choices at each step, hoping to find a globally optimal solution. They adapt based on immediate success without considering future consequences.
_______ is a Cisco proprietary protocol used between switches to maintain a loop-free network.
- ARP
- Internet Control Message Protocol (ICMP)
- Spanning Tree Protocol (STP)
- VLAN Trunking Protocol (VTP)
The 'Spanning Tree Protocol (STP)' is a Cisco proprietary protocol used to prevent and eliminate loops in Ethernet networks. It helps ensure network reliability by maintaining a loop-free topology.
In the context of computer architecture, what does the term "bus" refer to?
- A communication pathway for data
- A high-speed memory
- A system's central processing unit
- A type of storage device
In computer architecture, a "bus" refers to a communication pathway for data, serving as a conduit to transfer data and control signals between different hardware components in a computer system.
A research institute is working on a complex weather prediction model that requires the simultaneous processing of vast datasets. Which type of computing infrastructure would best suit their needs?
- Grid Computing
- High-Performance Computing (HPC)
- Mainframe Computing
- Quantum Computing
For the processing of vast datasets and complex simulations, 'High-Performance Computing (HPC)' is the ideal choice. It offers exceptional processing power and parallel computing capabilities, making it suitable for tasks like weather prediction models. Mainframes, grid computing, and quantum computing may not provide the necessary performance.
What technique do threat actors use to exploit human psychology, rather than technical vulnerabilities, to gain unauthorized access or information?
- Encryption
- Firewall
- Intrusion Detection System (IDS)
- Phishing
'Phishing' is a technique where threat actors use social engineering to manipulate human psychology and trick individuals into revealing sensitive information or granting unauthorized access.