Which technology is essential in HPC to interconnect multiple processors and achieve faster data transfer rates?

  • Bluetooth
  • Ethernet
  • InfiniBand
  • USB (Universal Serial Bus)
InfiniBand is a high-speed interconnect technology used in HPC to connect processors, memory, and storage devices. It enables 'faster data transfer rates' essential for high-performance computing applications.

Which document outlines the standards, rules, and guidelines for computer systems and their users in an organization?

  • Code of Conduct
  • End-User License Agreement (EULA)
  • IT Policy
  • Service Level Agreement (SL
An 'IT Policy' is a comprehensive document that outlines the standards, rules, and guidelines for computer systems and their users within an organization. It governs how technology is used and maintained.

What is the main difference between static routing and dynamic routing?

  • Static routing is manually configured, while dynamic routing adjusts routes automatically.
  • Static routing is more efficient, while dynamic routing is slower.
  • Static routing is more secure, while dynamic routing is more flexible.
  • Static routing is used for wireless networks, while dynamic routing is used for wired networks.
Static routing involves manually configuring the routing table, while dynamic routing protocols adjust routes automatically based on network conditions. This makes dynamic routing more adaptable and suitable for larger, changing networks.

An organization recently discovered that sensitive customer data was being sent outside the company network. The IT team needs to implement a solution to monitor and control data transfer to ensure this does not happen again. Which solution should they consider?

  • Data Loss Prevention (DLP)
  • Intrusion Detection System (IDS)
  • Secure Socket Layer (SSL)
  • Virtual Private Network (VPN)
In this scenario, the organization needs to monitor and control data transfer to prevent data loss. 'Data Loss Prevention (DLP)' solutions are specifically designed for this purpose, helping identify and block unauthorized data transfers.

A software engineer is tasked with finding the shortest path between two nodes in a weighted graph. Which algorithm should they consider implementing first?

  • Dijkstra's Algorithm
  • Depth-First Search (DFS)
  • Breadth-First Search (BFS)
  • Bellman-Ford Algorithm
To find the shortest path in a weighted graph, the 'Dijkstra's Algorithm' is the primary choice. It's efficient for finding the shortest path when all edge weights are non-negative, making it a suitable option for this scenario. It's widely used in network routing and navigation systems.

In network security, the principle that states users should only have the permissions necessary to perform their job functions is called the principle of _______.

  • Authentication
  • Encryption
  • Firewall
  • Least Privilege
The principle of 'Least Privilege' dictates that users and processes should have only the minimum permissions required to perform their specific job functions. This minimizes the risk of unauthorized access and potential security breaches.

In app development, the method of delivering updates to only a portion of the app's user base to test changes before a full release is known as _______.

  • A/B testing
  • Alpha testing
  • Beta testing
  • Canary testing
A/B testing, or "split testing," is a method where different versions of an application are released to different user groups. It's a technique used to assess the impact of changes before a full release.

The concept in ERP where data is entered once and is then accessible from multiple applications without redundancy is referred to as _______.

  • Data Aggregation
  • Data Duplication
  • Data Integration
  • Data Normalization
The concept described is 'Data Integration' in ERP. It ensures that data is entered once and can be accessed by multiple applications without duplication. This enhances data accuracy and consistency across the organization.

The concept of providing a dedicated portion of a public cloud environment exclusively for a single tenant is called _______.

  • Cloud Bursting
  • Multi-Tenancy
  • Single-Tenancy
  • Virtualization
Single-Tenancy refers to the practice of allocating a dedicated portion of a public cloud for a single tenant or organization, providing isolation and control over resources.

In ITSM, a _______ is a standard or set of guidelines for how something might be accomplished, but without mandating a particular tool or method.

  • Best Practice
  • Change Request Form
  • Process Model
  • Service Catalog
In IT Service Management (ITSM), a 'best practice' refers to a standard or set of guidelines for achieving a specific objective or task effectively. It provides recommendations and proven methods, but it doesn't require the use of a particular tool or approach. A Process Model outlines how a specific process works, a Service Catalog lists available services, and a Change Request Form is used to request changes in IT services.

In wireless networks, what does the term "SSID" stand for?

  • Secure System Identifier
  • Signal Strength Indicator
  • Service Set Identifier
  • Subnet Specification
"SSID" stands for "Service Set Identifier" (Option c). It is a unique name used to identify a wireless network. When connecting to a Wi-Fi network, users select the network with the matching SSID. This helps users distinguish between different networks.

In IT project management, what technique visualizes tasks or activities on a board, allowing team members to track project progress?

  • Critical Path Method (CPM)
  • Gantt Chart
  • Kanban
  • Waterfall Method
The technique that visualizes tasks on a board for easy tracking is 'Kanban.' Kanban is widely used in Agile project management, allowing teams to manage work in progress effectively and optimize flow.