In terms of information assurance, what practice ensures that only authorized modifications are made to an organization's assets?
- Change Management
- Data Encryption
- Firewall Configuration
- Intrusion Detection
Change Management is a crucial practice in information assurance that ensures that only authorized modifications are made to an organization's assets, including hardware, software, and data. It involves a structured process of requesting, reviewing, and approving changes to maintain system integrity and security.
The process of repeatedly merging code from different team members into a shared mainline to prevent integration problems is known as _______.
- Code Deployment
- Continuous Integration
- Parallel Development
- Version Control
Continuous Integration (CI) is the practice of merging code frequently into a shared repository to ensure early detection of integration problems and maintain code quality throughout the development process.
Which protocol is designed for the management of multicast group memberships and operates at the Network layer?
- ARP (Address Resolution Protocol)
- IGMP (Internet Group Management Protocol)
- OSPF (Open Shortest Path First)
- SMTP (Simple Mail Transfer Protocol)
IGMP, or Internet Group Management Protocol, is specifically designed for the management of multicast group memberships. It operates at the Network layer of the OSI model and is used by routers to learn about active multicast groups on a network.
In most programming languages, which arithmetic operation is performed first if no parentheses are used?
- Addition
- Division
- Multiplication
- Subtraction
In the absence of parentheses, most programming languages follow the order of operations (PEMDAS/BODMAS). This means that 'multiplication' is performed before addition, subtraction, and division. It's important to understand these rules for correctly evaluating mathematical expressions in code.
Which component of a computer temporarily stores data that the CPU is currently processing or using?
- Hard Drive
- Keyboard
- Monitor
- RAM
RAM (Random Access Memory) is a component of a computer that 'temporarily stores data' that the CPU is currently processing. It provides fast access to data and programs that are in use.
What is the main difference between a shallow neural network and a deep neural network?
- Activation Function
- Learning Rate
- Number of Layers
- Number of Neurons
The main difference between a shallow neural network and a deep neural network is the 'number of layers.' Shallow networks have only a few layers, while deep networks have many hidden layers.
Which type of attack involves intercepting and possibly altering communications between two parties without their knowledge?
- DDoS Attack
- Malware
- Man-in-the-Middle Attack
- Phishing
A 'Man-in-the-Middle (MitM) Attack' is a form of cyberattack where an attacker intercepts and possibly alters communications between two parties without their knowledge, compromising data integrity and privacy.
Which type of penetration testing focuses on testing from an attacker's perspective without prior knowledge of the target infrastructure?
- Black-Box Testing
- Gray-Box Testing
- Vulnerability Scanning
- White-Box Testing
'Black-Box Testing' is a type of penetration testing where testers simulate an attacker with no prior knowledge of the target infrastructure. The goal is to identify vulnerabilities as if they were an external attacker.
Which protocol is often used for lightweight communication in IoT devices due to its low power consumption?
- FTP (File Transfer Protocol)
- HTTP (Hypertext Transfer Protocol)
- MQTT (Message Queuing Telemetry Transport)
- TCP (Transmission Control Protocol)
MQTT is widely used in IoT because it's designed for low-power, efficient communication. MQTT's publish-subscribe model minimizes overhead and is well-suited for resource-constrained devices.
Which concept in IT governance emphasizes the importance of decision rights and accountability to encourage desirable behavior in the use of IT?
- API (Application Programming Interface)
- COBIT (Control Objectives for Information and Related Technologies)
- ITIL (Information Technology Infrastructure Library)
- SIEM (Security Information and Event Management)
In IT governance, 'COBIT' (Control Objectives for Information and Related Technologies) is a framework that emphasizes decision rights, accountability, and governance to ensure that IT is used in a way that aligns with business objectives and encourages desirable behavior.
A type of regularization technique that adds a penalty to the loss function for large weights is called _______.
- Activation Function
- Dropout
- Gradient Descent
- L1 Regularization
The technique you're describing is 'L1 Regularization.' It adds a penalty term to the loss function for large weights, encouraging the model to use only the most important features and prevent overfitting.
What is the primary purpose of a firewall in network security?
- Access Control
- Data Encryption
- Network Monitoring
- Virus Detection
The primary purpose of a 'firewall' in network security is to enforce access control policies. It acts as a barrier between a trusted network and an untrusted network, allowing or blocking network traffic based on predefined rules.