You are tasked with setting up a public Wi-Fi network for a cafe. Which security measure would be most appropriate to prevent users from seeing the traffic of other users?
- Intrusion Detection System
- MAC Filtering
- VPN Configuration
- WPA3 Encryption
Utilizing WPA3 (Wi-Fi Protected Access 3) encryption is a crucial security measure for a public Wi-Fi network. It encrypts the data between the user's device and the access point, preventing other users from intercepting or seeing the traffic.
In the context of ERP, what is the primary challenge of "data silos"?
- Data duplication
- Data encryption
- Data integration
- Data isolation
"Data silos" in ERP refer to isolated data repositories within an organization, and the primary challenge they pose is 'data integration.' Integrated data is essential for a holistic view of business processes and decision-making.
What does RAID stand for in terms of data storage?
- Random Access and Integrated Data
- Rapid Access and Integrated Devices
- Read-Write Automation and Integrated Data
- Redundant Array of Independent Disks
RAID, which stands for 'Redundant Array of Independent Disks,' is a technology used in data storage to combine multiple physical disks into a single logical unit for the purpose of data redundancy, improved performance, or both. It helps protect data from disk failures and can enhance data access speed.
A _______ is a virtualized storage model that pools physical storage from multiple network storage devices and makes it appear as if it's a single storage device.
- DNS
- NAS
- RAID
- SAN
A 'SAN' (Storage Area Network) is a virtualized storage model that combines physical storage from various network storage devices into a single storage device. It provides high-speed data access and centralized storage management.
In a router, the table that keeps track of paths to active networks and how to reach them is known as the _______ table.
- ARP
- Destination
- Routing
- Routing Information Base (RIB)
In a router, the table that keeps track of paths to active networks and how to reach them is known as the 'Routing' table. This table is used for making forwarding decisions based on the destination address.
You are working on a real-time trading application where the order of transactions is crucial. Which data structure would be most appropriate to ensure that the first transaction entered is the first one processed?
- Binary Tree
- Hash Table
- Queue
- Stack
In real-time trading, the order of transactions is critical. A 'Queue' is the most suitable data structure to ensure the first transaction entered is the first one processed. It follows a First-In-First-Out (FIFO) order, which aligns with transaction sequence requirements.
An organization wants to run multiple isolated Linux-based systems on a single host for testing purposes. Which lightweight virtualization technology, operating at the container level, would be suitable?
- Docker
- KVM
- VMware
- Xen
Docker is a containerization platform that allows you to run multiple isolated instances on a single host efficiently. It's known for its lightweight nature and is widely used for testing and deployment.
The _______ in an operating system acts as a bridge between application software and hardware.
- Compiler
- Firewall
- Kernel
- Router
The 'Kernel' in an operating system serves as the core component that manages the communication between application software and hardware, facilitating the execution of tasks and resource management. It is an essential bridge between software and hardware.
In virtualization, the primary operating system running on the host machine is often called the _______.
- Emulator
- Guest OS
- Hypervisor
- Kernel
The primary operating system running on the host machine in virtualization is often referred to as the 'Hypervisor.' A hypervisor manages and facilitates the execution of multiple guest operating systems.
A company wants to ensure that their cloud-hosted application remains available even if one entire data center fails. What should they consider implementing?
- Disaster Recovery Plan
- Failover
- Load Balancing
- Redundancy
To ensure high availability, implementing 'redundancy' is essential. This means duplicating critical components across multiple data centers, ensuring the application remains available even if one center fails.