Which type of malware disguises itself as legitimate software to deceive users into installing malicious code?
- Spyware
- Trojan Horse
- Virus
- Worm
A 'Trojan Horse' is a type of malware that disguises itself as legitimate software, tricking users into installing it. Once installed, it can execute malicious actions without the user's knowledge.
The process of integrating new digital technologies and processes into an organization's existing ecosystem, without a complete overhaul, is called _______ transformation.
- Agile
- Digital
- Incremental
- Radical
'Incremental' transformation is the process of gradually integrating new digital technologies and processes into an organization's existing ecosystem without completely overhauling the existing systems. It allows for a smoother transition and reduces disruption.
In the context of network security, what does "DLP" stand for, and what is its primary function?
- Data Leakage Prevention (DLP)
- Digital Language Processor
- Distributed Logging Process
- Dynamic Link Protocol
"DLP" stands for "Data Leakage Prevention." Its primary function is to identify, monitor, and prevent unauthorized data transfer or disclosure, whether intentional or accidental, to protect sensitive information within an organization.
In the context of IoT, what does the term "edge computing" refer to?
- Processing data at the network core
- Processing data in the cloud
- Processing data on IoT devices
- Processing data on a printed circuit board
"Edge computing" in IoT refers to processing data on the IoT devices themselves, closer to the data source. This helps reduce latency and enhances real-time decision-making, making it an important concept in IoT.
What is the primary goal of IT governance within an organization?
- Aligning IT with business
- Ensuring data security
- Managing IT projects
- Maximizing profits
The primary goal of IT governance is to 'align IT with business.' It ensures that IT investments, resources, and strategies are in harmony with the organization's objectives, contributing to business success.
Which system is designed to detect and prevent unauthorized access to or from a computer network?
- Firewall
- Modem
- Router
- Switch
A 'Firewall' is a security system designed to detect and prevent unauthorized access to or from a computer network. It acts as a barrier between a trusted internal network and untrusted external networks.
Which memory type is non-volatile and can be electrically erased and reprogrammed?
- Cache
- EEPROM
- RAM
- ROM
'EEPROM' stands for Electrically Erasable Programmable Read-Only Memory. It is a non-volatile memory type that can be erased and reprogrammed electrically. It is commonly used for storing firmware and configuration data.
Which component of a computer temporarily stores data that the CPU is currently processing or using?
- Hard Drive
- Keyboard
- Monitor
- RAM
RAM (Random Access Memory) is a component of a computer that 'temporarily stores data' that the CPU is currently processing. It provides fast access to data and programs that are in use.
In most programming languages, which arithmetic operation is performed first if no parentheses are used?
- Addition
- Division
- Multiplication
- Subtraction
In the absence of parentheses, most programming languages follow the order of operations (PEMDAS/BODMAS). This means that 'multiplication' is performed before addition, subtraction, and division. It's important to understand these rules for correctly evaluating mathematical expressions in code.
Which protocol is designed for the management of multicast group memberships and operates at the Network layer?
- ARP (Address Resolution Protocol)
- IGMP (Internet Group Management Protocol)
- OSPF (Open Shortest Path First)
- SMTP (Simple Mail Transfer Protocol)
IGMP, or Internet Group Management Protocol, is specifically designed for the management of multicast group memberships. It operates at the Network layer of the OSI model and is used by routers to learn about active multicast groups on a network.