Which component of IT risk management focuses on identifying and analyzing potential events that may negatively impact the organization?

  • Disaster Recovery
  • Hardware Maintenance
  • Risk Assessment
  • Risk Mitigation
'Risk Assessment' is a key element in IT risk management. It involves identifying and analyzing potential risks, vulnerabilities, and threats that could have adverse effects on an organization's IT infrastructure and operations.

A company wants to ensure the integrity and authenticity of its software downloads. What cryptographic technique should it use to allow users to verify that the software has not been tampered with?

  • Code Obfuscation
  • Digital Signatures
  • Firewalls
  • Hash Functions
To ensure the integrity and authenticity of software downloads, 'Digital Signatures' are used. Digital signatures provide a way for users to verify that the software has not been tampered with, as they are unique cryptographic stamps applied to the software package.

In advanced IoT architectures, _______ computing allows for processing data closer to the data source rather than in a centralized cloud.

  • Centralized
  • Edge
  • Fog
  • Quantum
In advanced IoT systems, 'Edge' computing is a concept that enables data processing closer to the data source, reducing latency and dependence on centralized cloud services.

An e-commerce app is experiencing slow query times due to large datasets. What database indexing technique might be implemented to optimize search performance?

  • B-Tree Indexing
  • Bitmap Indexing
  • Full-Text Indexing
  • Hash Indexing
To optimize search performance with large datasets, 'B-Tree indexing' is commonly used. B-Tree structures provide efficient range queries and are well-suited for scenarios like e-commerce apps that need to search large datasets efficiently.

A company wants to develop a mobile app that works both offline and online, syncing data when a connection is available. Which type of database would be most suitable for this requirement?

  • Graph Database
  • In-Memory Database
  • NoSQL
  • SQL (Relational)
For offline-online sync, a 'NoSQL' database, like document-oriented databases, is often used. NoSQL databases offer flexible schema and can efficiently handle unstructured data, making them suitable for mobile apps with sync requirements.

Which protocol is used to assign IP addresses to devices on a network automatically?

  • DHCP
  • DNS
  • FTP
  • HTTP
The 'DHCP (Dynamic Host Configuration Protocol)' is used to automatically assign IP addresses to devices on a network. It simplifies network management by dynamically allocating IPs to devices.

What is the primary function of the ALU (Arithmetic Logic Unit) in a computer?

  • Display graphics
  • Execute instructions
  • Manage storage
  • Store data
The primary function of the ALU (Arithmetic Logic Unit) is to 'execute instructions.' It performs arithmetic operations (addition, subtraction, etc.) and logical operations (AND, OR, etc.) as directed by the CPU.

In BGP (Border Gateway Protocol), what is the primary metric used for path selection?

  • AS Path Length
  • Hop Count
  • Link Bandwidth
  • Network Latency
The primary metric used in BGP for path selection is the 'AS Path Length.' BGP routers use this information to determine the best path to a destination network based on the number of Autonomous Systems (ASes) through which the route has traversed.

How does a "risk matrix" aid in the IT risk management process?

  • Eliminating risks
  • Identifying risks
  • Prioritizing risks
  • Quantifying risks
A "risk matrix" helps in 'prioritizing risks.' It categorizes risks based on their likelihood and impact, allowing organizations to focus their resources on mitigating the most critical risks first.

Which type of malware is specifically designed to be activated at a certain time or when a specific condition is met?

  • Logic Bomb
  • Ransomware
  • Spyware
  • Trojan Horse
A 'Logic Bomb' is a type of malware that is programmed to execute malicious actions when a predefined condition is met, such as a specific time or event. It can cause harm or data loss.