What is the primary goal of penetration testing?

  • To audit financial records
  • To design secure systems
  • To discover all vulnerabilities
  • To exploit vulnerabilities
The primary goal of penetration testing is 'To design secure systems.' It aims to identify weaknesses in a system's security and provide insights to improve and design a more secure infrastructure.

One of the advanced techniques in NLP for handling large vocabularies without assigning a unique token to each word is called _______.

  • FastText
  • Semantic Segmentation
  • Subword Tokenization
  • Word2Vec
The technique mentioned is 'Subword Tokenization,' which involves breaking words into smaller units, such as subword pieces or characters, to handle large vocabularies efficiently. This is commonly used in models like BERT.

Which type of malware disguises itself as legitimate software to deceive users into installing malicious code?

  • Spyware
  • Trojan Horse
  • Virus
  • Worm
A 'Trojan Horse' is a type of malware that disguises itself as legitimate software, tricking users into installing it. Once installed, it can execute malicious actions without the user's knowledge.

The process of integrating new digital technologies and processes into an organization's existing ecosystem, without a complete overhaul, is called _______ transformation.

  • Agile
  • Digital
  • Incremental
  • Radical
'Incremental' transformation is the process of gradually integrating new digital technologies and processes into an organization's existing ecosystem without completely overhauling the existing systems. It allows for a smoother transition and reduces disruption.

In the context of network security, what does "DLP" stand for, and what is its primary function?

  • Data Leakage Prevention (DLP)
  • Digital Language Processor
  • Distributed Logging Process
  • Dynamic Link Protocol
"DLP" stands for "Data Leakage Prevention." Its primary function is to identify, monitor, and prevent unauthorized data transfer or disclosure, whether intentional or accidental, to protect sensitive information within an organization.

In the context of IoT, what does the term "edge computing" refer to?

  • Processing data at the network core
  • Processing data in the cloud
  • Processing data on IoT devices
  • Processing data on a printed circuit board
"Edge computing" in IoT refers to processing data on the IoT devices themselves, closer to the data source. This helps reduce latency and enhances real-time decision-making, making it an important concept in IoT.

What is the primary goal of IT governance within an organization?

  • Aligning IT with business
  • Ensuring data security
  • Managing IT projects
  • Maximizing profits
The primary goal of IT governance is to 'align IT with business.' It ensures that IT investments, resources, and strategies are in harmony with the organization's objectives, contributing to business success.

Which system is designed to detect and prevent unauthorized access to or from a computer network?

  • Firewall
  • Modem
  • Router
  • Switch
A 'Firewall' is a security system designed to detect and prevent unauthorized access to or from a computer network. It acts as a barrier between a trusted internal network and untrusted external networks.

In NLP, what is the process of converting words into numerical vectors called?

  • Embedding
  • Lemmatization
  • Stemming
  • Tokenization
The process of converting words into numerical vectors in NLP is called 'Embedding.' Word embeddings like Word2Vec, GloVe, and FastText are widely used to represent words as dense vectors in machine learning models.

In Storage Area Networks (SAN), which protocol is commonly used to transfer data between the storage devices and servers?

  • FTP (File Transfer Protocol)
  • NFS (Network File System)
  • SMB (Server Message Block)
  • iSCSI (Internet Small Computer System Interface)
In Storage Area Networks (SAN), 'iSCSI' is commonly used to transfer data between storage devices and servers. iSCSI allows for block-level data transfer over IP networks, making it a popular choice for SANs.