What term is used to describe a collection of data elements that have a specific order and can be indexed?
- Array
- Function
- String
- Variable
An 'array' is a data structure in programming that allows you to store a collection of data elements in a specific order. Each element in an array can be accessed using an index, which is a numerical reference. Arrays are commonly used for organizing and manipulating data efficiently.
An organization wants to run multiple isolated Linux-based systems on a single host for testing purposes. Which lightweight virtualization technology, operating at the container level, would be suitable?
- Docker
- KVM
- VMware
- Xen
Docker is a containerization platform that allows you to run multiple isolated instances on a single host efficiently. It's known for its lightweight nature and is widely used for testing and deployment.
The _______ in an operating system acts as a bridge between application software and hardware.
- Compiler
- Firewall
- Kernel
- Router
The 'Kernel' in an operating system serves as the core component that manages the communication between application software and hardware, facilitating the execution of tasks and resource management. It is an essential bridge between software and hardware.
What is the primary goal of penetration testing?
- To audit financial records
- To design secure systems
- To discover all vulnerabilities
- To exploit vulnerabilities
The primary goal of penetration testing is 'To design secure systems.' It aims to identify weaknesses in a system's security and provide insights to improve and design a more secure infrastructure.
Which scheduling algorithm in operating systems gives the shortest job the highest priority?
- First-Come-First-Served (FCFS)
- Priority Scheduling
- Round Robin
- Shortest Job Next (SJN)
The scheduling algorithm that gives the shortest job the highest priority is "Shortest Job Next" (SJN). This approach minimizes waiting time and helps to execute shorter tasks quickly, leading to optimal resource utilization.
You are a network administrator and receive reports of intermittent connectivity to a cloud-based application. Which tool would you first use to check if the issue is due to packet loss?
- Ping
- Traceroute
- netstat
- nslookup
To diagnose packet loss issues, the first tool you would use is 'Ping.' Ping sends ICMP packets to the target server and measures round-trip time and packet loss, helping identify network problems.
To reduce latency and improve load times for global users, companies use a cloud service called _______.
- Content Delivery Network (CDN)
- Domain Name System (DNS)
- Internet Service Provider (ISP)
- Web Hosting Service
Companies use a 'Content Delivery Network (CDN)' to reduce latency and improve load times for global users. CDNs distribute content to edge servers around the world, ensuring faster access to content for users.
In the context of IoT, what does the term "edge computing" refer to?
- Processing data at the network core
- Processing data in the cloud
- Processing data on IoT devices
- Processing data on a printed circuit board
"Edge computing" in IoT refers to processing data on the IoT devices themselves, closer to the data source. This helps reduce latency and enhances real-time decision-making, making it an important concept in IoT.
What is the primary goal of IT governance within an organization?
- Aligning IT with business
- Ensuring data security
- Managing IT projects
- Maximizing profits
The primary goal of IT governance is to 'align IT with business.' It ensures that IT investments, resources, and strategies are in harmony with the organization's objectives, contributing to business success.
Which system is designed to detect and prevent unauthorized access to or from a computer network?
- Firewall
- Modem
- Router
- Switch
A 'Firewall' is a security system designed to detect and prevent unauthorized access to or from a computer network. It acts as a barrier between a trusted internal network and untrusted external networks.