What type of attack involves overwhelming a target with a flood of internet traffic, rendering it inaccessible?

  • Cross-Site Scripting
  • DDoS attack
  • Phishing attack
  • SQL injection
A 'DDoS attack' (Distributed Denial of Service) is when a target is overwhelmed by a massive flood of internet traffic from multiple sources, causing it to become inaccessible. It's a common attack to disrupt online services.

In data visualization, the process of displaying three-dimensional data on a two-dimensional plane is known as _______.

  • 3D Mapping
  • Data Projection
  • Dimension Reduction
  • Flat Visualization
The process described here is 'Data Projection.' It involves transforming three-dimensional data onto a two-dimensional plane while preserving important relationships and patterns, which is crucial in data visualization and analysis.

A common tool used to capture and analyze network packets for troubleshooting is called _______.

  • Gateway
  • LAN Switch
  • Packet Sniffer
  • Router
A 'Packet Sniffer' is a tool used by network professionals to capture and analyze network packets for troubleshooting, monitoring, and security analysis. It's essential for network diagnostics.

Which ERP deployment method involves using the Internet to access software applications provided by third-party vendors?

  • Cloud-Based Deployment
  • Hybrid Deployment
  • On-Premises Deployment
  • Open-Source Deployment
'Cloud-Based Deployment' in ERP involves using the Internet to access software applications hosted by third-party vendors. This method offers scalability, cost-efficiency, and flexibility in comparison to traditional on-premises deployments.

Which tool is often used to diagnose the route packets take through the network?

  • Firewall Software
  • Traceroute
  • Video Streaming Tool
  • Word Processing Software
'Traceroute' is a network diagnostic tool used to trace the route packets take through the network. It displays the path and measures the transit times between network nodes, helping identify connectivity issues.

Which of the following best describes the primary purpose of IoT devices?

  • Collect and exchange data
  • Cook meals automatically
  • Play video games
  • Predict the weather
The primary purpose of IoT (Internet of Things) devices is to "collect and exchange data." These devices are designed to gather information from the physical world and share it over the internet for analysis and automation.

Which approach to digital transformation focuses on rapid experimentation, frequent releases, and iterative development?

  • Agile
  • DevOps
  • Six Sigma
  • Waterfall
The 'Agile' approach to digital transformation emphasizes rapid experimentation, frequent releases, and iterative development. It is a flexible methodology that adapts to changing requirements and customer feedback.

Which cryptographic method involves converting plain text into a scrambled format using a key?

  • Deciphering
  • Decryption
  • Encoding
  • Encryption
'Encryption' is a cryptographic process that involves converting plain text into a scrambled format (cipher text) using a specific key. This is used to protect data from unauthorized access.

A _______ is a consolidated network infrastructure in the cloud that replicates an on-premises network.

  • Cloud Network
  • Data Center
  • Virtual Machine
  • Virtual Private Network (VPN)
In cloud computing, a 'Cloud Network' refers to a consolidated network infrastructure in the cloud that replicates an on-premises network. It allows organizations to create virtualized network environments in the cloud.

A software engineering practice where production defects are immediately corrected without going through the standard incident management flow is termed _______.

  • Agile Development
  • Continuous Delivery
  • Firefighting
  • Zero Defect Approach
This practice is often referred to as the "Zero Defect Approach" or "Zero Bug Bounce." It emphasizes fixing production defects promptly without following the standard incident management process.