In intrusion detection, a set of rules used to detect typical intrusive activity is referred to as _______.
- Encryption
- Firewall
- Honeypot
- Signature
In intrusion detection systems, a 'Signature' is a set of rules used to detect typical intrusive activity. These rules help identify known patterns of attacks or breaches.
Which protocol is used to assign IP addresses to devices on a network automatically?
- DHCP
- DNS
- FTP
- HTTP
The 'DHCP (Dynamic Host Configuration Protocol)' is used to automatically assign IP addresses to devices on a network. It simplifies network management by dynamically allocating IPs to devices.
What is the primary function of the ALU (Arithmetic Logic Unit) in a computer?
- Display graphics
- Execute instructions
- Manage storage
- Store data
The primary function of the ALU (Arithmetic Logic Unit) is to 'execute instructions.' It performs arithmetic operations (addition, subtraction, etc.) and logical operations (AND, OR, etc.) as directed by the CPU.
In BGP (Border Gateway Protocol), what is the primary metric used for path selection?
- AS Path Length
- Hop Count
- Link Bandwidth
- Network Latency
The primary metric used in BGP for path selection is the 'AS Path Length.' BGP routers use this information to determine the best path to a destination network based on the number of Autonomous Systems (ASes) through which the route has traversed.
How does a "risk matrix" aid in the IT risk management process?
- Eliminating risks
- Identifying risks
- Prioritizing risks
- Quantifying risks
A "risk matrix" helps in 'prioritizing risks.' It categorizes risks based on their likelihood and impact, allowing organizations to focus their resources on mitigating the most critical risks first.
Which type of malware is specifically designed to be activated at a certain time or when a specific condition is met?
- Logic Bomb
- Ransomware
- Spyware
- Trojan Horse
A 'Logic Bomb' is a type of malware that is programmed to execute malicious actions when a predefined condition is met, such as a specific time or event. It can cause harm or data loss.
Which wireless networking technology is optimized for low power usage and short-range communications, often used in wearable devices?
- Bluetooth LE (Low Energy)
- LTE (Long-Term Evolution)
- NFC (Near Field Communication)
- Wi-Fi
Bluetooth Low Energy (LE) is optimized for low power usage and short-range communications, making it ideal for wearable devices, IoT, and other applications where power efficiency is crucial.
The method where certain portions of a dataset are intentionally left out of training to validate the model's performance is called __________.
- Cross-Validation
- Overfitting
- Regularization
- Underfitting
The method where certain portions of a dataset are intentionally left out of training to validate the model's performance is called "Cross-Validation." Cross-validation helps assess a model's generalization and performance on unseen data.
A common challenge in NLP where words have multiple meanings depending on context is known as _______.
- Ambiguity
- Homonymy
- Polysemy
- Synonymy
In NLP, 'Polysemy' refers to a situation where a word has multiple meanings, and the meaning depends on the context. This is a significant challenge in natural language understanding.
Which operating system concept allows multiple programs to run concurrently by sharing the same CPU time?
- Multiprocessing
- Multiprogramming
- Multitasking
- Multithreading
'Multitasking' is an operating system concept that allows multiple programs to run concurrently by 'sharing the same CPU time.' This enables users to switch between applications seamlessly.