A(n) _______ attack attempts to make a computer resource unavailable to its intended users by flooding it with superfluous requests.
- Denial of Service
- Encryption
- Intrusion
- Phishing
A 'Denial of Service' attack aims to disrupt a computer resource's availability by overwhelming it with excessive requests. This is often done maliciously to disrupt services.
A structured approach to aligning IT with business objectives and ensuring its optimal performance is often referred to as IT _______.
- Alignment
- Collaboration
- Enhancement
- Optimization
IT Alignment is the practice of ensuring that an organization's information technology (IT) strategy and initiatives are closely aligned with its business objectives. This alignment is crucial for maximizing the value IT can provide to the business.
An embedded system, like a microwave or a washing machine, needs an operating system. What type of OS would be most suitable for such systems?
- Linux
- Real-time Operating System (RTOS)
- Windows OS
- macOS
Embedded systems, like microwaves or washing machines, benefit from a 'Real-time Operating System (RTOS)' because it provides predictable and timely responses, essential for control and automation in such devices.
In IT governance, the framework that provides a reference model to organize IT processes and consider their governance is known as _______.
- Agile
- COBIT
- DevOps
- ITIL
COBIT (Control Objectives for Information and Related Technologies) is a widely used framework for IT governance. It provides a set of best practices and standards to organize and govern IT processes, ensuring they align with business goals.
Which method is commonly used by malware analysts to observe the behavior of malware in a controlled environment without endangering real systems?
- Debugging
- Penetration testing
- Sandboxing
- Vulnerability scanning
Malware analysts often use 'sandboxing' to run malware in a controlled, isolated environment. This method allows them to observe the malware's behavior without risking damage to real systems. Sandbox environments are designed for this purpose.
In IT risk management, a(n) _______ is an unforeseen event that can have negative consequences for an organization's objectives.
- Incident
- Risk
- Threat
- Vulnerability
An unforeseen event with the potential to harm an organization's objectives is referred to as a 'Threat' in IT risk management. It's a factor or circumstance that could exploit a vulnerability and negatively impact an organization.
After installing a new intrusion detection system, a company notices it's getting alerts for normal user activities. What type of error is the system likely experiencing?
- False Negative
- False Positive
- True Negative
- True Positive
The system is likely experiencing a 'False Positive' error. This occurs when the system incorrectly detects normal user activities as security threats. False positives can lead to alert fatigue and should be minimized to ensure effective intrusion detection.
Which type of intrusion detection system (IDS) analyzes the traffic on the entire network?
- Anomaly-Based IDS
- Host-Based IDS
- Network-Based IDS
- Signature-Based IDS
A 'Network-Based IDS' (Intrusion Detection System) monitors and analyzes the traffic on the entire network. It's designed to detect unauthorized or malicious network activities.
Which optimization algorithm is commonly used to adjust weights in neural networks based on the gradient of the loss function?
- Gradient Descent
- K-Means Clustering
- Principal Component Analysis
- Random Forest
The commonly used optimization algorithm for adjusting weights in neural networks based on the gradient of the loss function is 'Gradient Descent.' It iteratively updates weights to minimize the loss.
In cloud environments, the service that automatically distributes incoming traffic across multiple targets is termed _______.
- DNS
- Firewall
- Load Balancer
- Proxy Server
A 'Load Balancer' is a crucial service in cloud environments that evenly distributes incoming network traffic across multiple targets, enhancing performance, availability, and reliability.
Company wants to analyze images to detect defects in products on an assembly line. Which type of neural network would be most suitable for this task?
- Convolutional Neural Network (CNN)
- Deep Q-Network (DQN)
- Generative Adversarial Network (GAN)
- Recurrent Neural Network (RNN)
For image analysis and object detection tasks, a 'Convolutional Neural Network (CNN)' is the most suitable choice. CNNs are designed to effectively process grid-like data, making them ideal for tasks like defect detection in images. They excel at identifying patterns and features in images.
In wireless networking, the method used to spread communication signals across available bandwidths to enhance data throughput is called _______.
- Encryption
- Latency Reduction
- Modulation
- Multiplexing
Multiplexing is the technique of spreading multiple communication signals across available bandwidth to increase data throughput and efficiency in wireless networks.