What is the time complexity of a binary search on a sorted array?

  • O(1)
  • O(log n)
  • O(n log n)
  • O(n)
Binary search has a time complexity of O(log n) on a sorted array. It efficiently narrows down the search space with each comparison, making it a highly efficient algorithm for searching.

When changes are proposed during a project, they're typically reviewed and either approved or denied by a group known as the _______.

  • Change Control Board
  • Decision Directorate
  • Project Conveners
  • Revision Review Team
In project management, the group responsible for reviewing and deciding on proposed changes is known as the 'Change Control Board.' They evaluate the potential impact of changes on the project's scope, schedule, and budget, and determine whether to approve or deny the proposed changes. This process helps maintain project integrity.

A _______ is a formal, approved version of a plan against which project execution is compared to measure and manage variances.

  • Baseline
  • Gantt Chart
  • Project Charter
  • Stakeholder Register
In project management, a 'baseline' is a crucial concept. It represents a formal, approved version of a project plan, which serves as a reference point to compare and manage variances during project execution. It includes key project elements such as schedule, scope, and budget. A Gantt Chart is a visual representation of a project schedule, a Project Charter is a document that authorizes the project's existence, and a Stakeholder Register is a record of project stakeholders.

A wireless network that is set up by a malicious actor to mimic a legitimate network and trick users into connecting is known as a(n) _______.

  • Encryption Key
  • Firewall Rule
  • Intrusion Detection
  • Rogue Access Point
A 'Rogue Access Point' is a deceptive wireless network set up by a malicious actor to imitate a legitimate network. When users connect to it, the attacker can intercept data and potentially launch attacks. Detecting and avoiding rogue access points is crucial for network security.

A manufacturing company wants to integrate its supply chain management with its financial accounting. Which ERP module should be primarily considered?

  • Financial Accounting Module
  • Human Resources Management Module
  • Inventory Management Module
  • Supply Chain Management Module
In this case, the primary ERP module to consider is the 'Financial Accounting Module' as it is focused on managing financial aspects and integrating them with other business processes, including supply chain management.

In agile project management, what term describes a fixed-length iteration during which a potentially shippable product increment is created?

  • Kanban
  • Scrum
  • Sprint
  • Waterfall
In agile project management, a 'Sprint' is a fixed-length iteration typically lasting two to four weeks during which the development team creates a potentially shippable product increment. Sprints are a core component of the Scrum framework, an agile methodology.

In the context of cybersecurity, what is the primary goal of data loss prevention (DLP) systems?

  • To detect malware
  • To encrypt all data
  • To prevent all data loss
  • To protect against hackers
Data Loss Prevention (DLP) systems are primarily designed to 'protect against hackers' and unauthorized access, ensuring sensitive data doesn't fall into the wrong hands. They use policies and rules to monitor and prevent data breaches.

You've detected an unknown device connected to your wireless home network. What should be the immediate first step to ensure the security of your network?

  • Block the Device's MAC Address
  • Change Wi-Fi Password
  • Restart the Router
  • Run Antivirus Software
The immediate first step to secure your home network when an unknown device is detected is to 'block the device's MAC address.' This prevents the unknown device from connecting to your network and ensures the security of your network's perimeter.

Your organization's network is growing rapidly, and you need to ensure that routers can learn about network paths automatically without manual configurations. Which approach would be most suitable?

  • BGP (Border Gateway Protocol)
  • Dynamic Routing
  • RIP (Routing Information Protocol)
  • Static Routing
To handle a rapidly growing network while enabling routers to learn network paths automatically, 'Dynamic Routing' is the best approach. Dynamic routing protocols, like OSPF or BGP, allow routers to adapt to network changes without manual intervention.

The process of organizing a database to reduce redundancy and improve data integrity is known as _______.

  • Aggregation
  • Denormalization
  • Normalization
  • Optimization
'Normalization' is the process of organizing a database to reduce data redundancy, eliminate anomalies, and improve data integrity. It involves breaking down data into separate tables and defining relationships between them.

Which technique involves an attacker sending multiple requests or inputs to a target system to cause it to crash?

  • Cross-Site Scripting
  • Denial of Service
  • Firewall Bypass
  • SQL Injection
'Denial of Service' (DoS) is an attack technique where an attacker overwhelms a target system with a high volume of requests or inputs, causing it to become unavailable or crash.

What is the primary purpose of a hypervisor in virtualization?

  • Managing physical servers
  • Providing network security
  • Running database queries
  • Running virtual machines
A 'hypervisor' is software that allows multiple virtual machines to run on a single physical server. Its primary purpose is to manage and allocate resources to these virtual machines.