_______ is a Cisco proprietary protocol used between switches to maintain a loop-free network.

  • ARP
  • Internet Control Message Protocol (ICMP)
  • Spanning Tree Protocol (STP)
  • VLAN Trunking Protocol (VTP)
The 'Spanning Tree Protocol (STP)' is a Cisco proprietary protocol used to prevent and eliminate loops in Ethernet networks. It helps ensure network reliability by maintaining a loop-free topology.

Which algorithmic paradigm solves problems by trying out solutions using one or more models and then adapting based on what works and what doesn't?

  • Divide and Conquer
  • Dynamic Programming
  • Genetic Algorithms
  • Greedy Algorithms
'Greedy Algorithms' follow a paradigm where they make locally optimal choices at each step, hoping to find a globally optimal solution. They adapt based on immediate success without considering future consequences.

Which memory type is non-volatile and can be electrically erased and reprogrammed?

  • Cache
  • EEPROM
  • RAM
  • ROM
'EEPROM' stands for Electrically Erasable Programmable Read-Only Memory. It is a non-volatile memory type that can be erased and reprogrammed electrically. It is commonly used for storing firmware and configuration data.

Which component of a computer temporarily stores data that the CPU is currently processing or using?

  • Hard Drive
  • Keyboard
  • Monitor
  • RAM
RAM (Random Access Memory) is a component of a computer that 'temporarily stores data' that the CPU is currently processing. It provides fast access to data and programs that are in use.

In most programming languages, which arithmetic operation is performed first if no parentheses are used?

  • Addition
  • Division
  • Multiplication
  • Subtraction
In the absence of parentheses, most programming languages follow the order of operations (PEMDAS/BODMAS). This means that 'multiplication' is performed before addition, subtraction, and division. It's important to understand these rules for correctly evaluating mathematical expressions in code.

Which protocol is designed for the management of multicast group memberships and operates at the Network layer?

  • ARP (Address Resolution Protocol)
  • IGMP (Internet Group Management Protocol)
  • OSPF (Open Shortest Path First)
  • SMTP (Simple Mail Transfer Protocol)
IGMP, or Internet Group Management Protocol, is specifically designed for the management of multicast group memberships. It operates at the Network layer of the OSI model and is used by routers to learn about active multicast groups on a network.

The process of repeatedly merging code from different team members into a shared mainline to prevent integration problems is known as _______.

  • Code Deployment
  • Continuous Integration
  • Parallel Development
  • Version Control
Continuous Integration (CI) is the practice of merging code frequently into a shared repository to ensure early detection of integration problems and maintain code quality throughout the development process.

Which type of attack involves intercepting and possibly altering communications between two parties without their knowledge?

  • DDoS Attack
  • Malware
  • Man-in-the-Middle Attack
  • Phishing
A 'Man-in-the-Middle (MitM) Attack' is a form of cyberattack where an attacker intercepts and possibly alters communications between two parties without their knowledge, compromising data integrity and privacy.

What is the main difference between a shallow neural network and a deep neural network?

  • Activation Function
  • Learning Rate
  • Number of Layers
  • Number of Neurons
The main difference between a shallow neural network and a deep neural network is the 'number of layers.' Shallow networks have only a few layers, while deep networks have many hidden layers.

In IT governance, the framework that provides a reference model to organize IT processes and consider their governance is known as _______.

  • Agile
  • COBIT
  • DevOps
  • ITIL
COBIT (Control Objectives for Information and Related Technologies) is a widely used framework for IT governance. It provides a set of best practices and standards to organize and govern IT processes, ensuring they align with business goals.