What is the key difference between Type 1 (bare-metal) and Type 2 (hosted) hypervisors?
- Type 1 hypervisors are easier to install than Type 2 hypervisors.
- Type 1 hypervisors are more expensive than Type 2 hypervisors.
- Type 1 hypervisors are used for gaming, while Type 2 hypervisors are used for server virtualization.
- Type 1 hypervisors run directly on the physical hardware, while Type 2 hypervisors run on top of a host operating system.
The key difference is that 'Type 1 hypervisors' run directly on the physical hardware (bare-metal), while 'Type 2 hypervisors' run on top of a host operating system. Type 1 offers better performance and isolation.
A digital _______ is a cryptographic equivalent of a handwritten signature or stamped seal, but much more secure.
- Certificate
- Firewall
- Hash
- Key
The blank should be filled with "Certificate." A digital certificate serves as a cryptographic equivalent of a traditional signature or seal, offering a secure means of verifying the identity and authenticity of a user or entity.
_______ is the process of distributing data across multiple disks to enhance performance and fault tolerance.
- API
- BIOS
- HTTP
- RAID
'RAID' stands for Redundant Array of Independent Disks. It's a technology used to distribute and replicate data across multiple disks for performance and fault tolerance improvement.
Which cryptographic method involves converting plain text into a scrambled format using a key?
- Deciphering
- Decryption
- Encoding
- Encryption
'Encryption' is a cryptographic process that involves converting plain text into a scrambled format (cipher text) using a specific key. This is used to protect data from unauthorized access.
In the context of data storage, what does deduplication refer to?
- Accelerating data access
- Encrypting data
- Increasing data capacity
- Reducing data redundancy
'Deduplication' is a data reduction technique that involves eliminating duplicate copies of data, thus reducing data redundancy. This process saves storage space and improves efficiency.
For HPC applications that require vast amounts of data processing in real-time, which memory characteristic is crucial?
- Bandwidth
- Capacity
- Latency
- Volatility
In High-Performance Computing (HPC), applications often require massive data processing in real-time. In this context, 'memory bandwidth' is crucial because it determines how quickly data can be read from and written to memory. A high memory bandwidth is essential for feeding the processors with data at a rate that matches their processing capabilities, ensuring efficient execution of HPC tasks.
In data visualization, what technique would you use to visualize high-dimensional data in two or three dimensions?
- Bar Charts
- Histograms
- Pie Charts
- Principal Component Analysis (PC
'Principal Component Analysis (PCA)' is a commonly used technique in data visualization to reduce the dimensionality of high-dimensional data while preserving as much variance as possible, making it suitable for 2D or 3D visualization.
Which software engineering principle emphasizes that a system should have only one reason to change?
- DRY (Don't Repeat Yourself)
- OOP (Object-Oriented Programming)
- SRP (Single Responsibility Principle)
- YAGNI (You Ain't Gonna Need It)
The 'SRP' (Single Responsibility Principle) is a principle in software engineering that states that a module, class, or function should have only one reason to change. This helps in maintaining a system by reducing the impact of modifications.
What is the primary benefit of using Virtual Private Cloud (VPC) in a public cloud environment?
- Cost savings
- Enhanced security
- Improved internet speed
- On-premises control
The primary benefit of using a 'Virtual Private Cloud (VPC)' in a public cloud environment is 'enhanced security.' VPCs provide isolated network segments within the public cloud, allowing users to define their own network architecture and apply security measures specific to their needs.
An organization is deploying a secure system where users must prove their identity without revealing any other unnecessary information. Which cryptographic concept allows for this selective disclosure of information?
- Biometric Authentication
- Public Key Infrastructure (PKI)
- Two-Factor Authentication
- Zero-Knowledge Proofs
The cryptographic concept that allows for selective disclosure of information without revealing unnecessary details is 'Zero-Knowledge Proofs.' In this technique, a prover can demonstrate knowledge of a secret without revealing the secret itself, ensuring privacy and security.