What technique do threat actors use to exploit human psychology, rather than technical vulnerabilities, to gain unauthorized access or information?

  • Encryption
  • Firewall
  • Intrusion Detection System (IDS)
  • Phishing
'Phishing' is a technique where threat actors use social engineering to manipulate human psychology and trick individuals into revealing sensitive information or granting unauthorized access.

A research institute is working on a complex weather prediction model that requires the simultaneous processing of vast datasets. Which type of computing infrastructure would best suit their needs?

  • Grid Computing
  • High-Performance Computing (HPC)
  • Mainframe Computing
  • Quantum Computing
For the processing of vast datasets and complex simulations, 'High-Performance Computing (HPC)' is the ideal choice. It offers exceptional processing power and parallel computing capabilities, making it suitable for tasks like weather prediction models. Mainframes, grid computing, and quantum computing may not provide the necessary performance.

In the context of computer architecture, what does the term "bus" refer to?

  • A communication pathway for data
  • A high-speed memory
  • A system's central processing unit
  • A type of storage device
In computer architecture, a "bus" refers to a communication pathway for data, serving as a conduit to transfer data and control signals between different hardware components in a computer system.

_______ is a Cisco proprietary protocol used between switches to maintain a loop-free network.

  • ARP
  • Internet Control Message Protocol (ICMP)
  • Spanning Tree Protocol (STP)
  • VLAN Trunking Protocol (VTP)
The 'Spanning Tree Protocol (STP)' is a Cisco proprietary protocol used to prevent and eliminate loops in Ethernet networks. It helps ensure network reliability by maintaining a loop-free topology.

Which algorithmic paradigm solves problems by trying out solutions using one or more models and then adapting based on what works and what doesn't?

  • Divide and Conquer
  • Dynamic Programming
  • Genetic Algorithms
  • Greedy Algorithms
'Greedy Algorithms' follow a paradigm where they make locally optimal choices at each step, hoping to find a globally optimal solution. They adapt based on immediate success without considering future consequences.

Which memory type is non-volatile and can be electrically erased and reprogrammed?

  • Cache
  • EEPROM
  • RAM
  • ROM
'EEPROM' stands for Electrically Erasable Programmable Read-Only Memory. It is a non-volatile memory type that can be erased and reprogrammed electrically. It is commonly used for storing firmware and configuration data.

Which component of a computer temporarily stores data that the CPU is currently processing or using?

  • Hard Drive
  • Keyboard
  • Monitor
  • RAM
RAM (Random Access Memory) is a component of a computer that 'temporarily stores data' that the CPU is currently processing. It provides fast access to data and programs that are in use.

A type of regularization technique that adds a penalty to the loss function for large weights is called _______.

  • Activation Function
  • Dropout
  • Gradient Descent
  • L1 Regularization
The technique you're describing is 'L1 Regularization.' It adds a penalty term to the loss function for large weights, encouraging the model to use only the most important features and prevent overfitting.

Which concept in IT governance emphasizes the importance of decision rights and accountability to encourage desirable behavior in the use of IT?

  • API (Application Programming Interface)
  • COBIT (Control Objectives for Information and Related Technologies)
  • ITIL (Information Technology Infrastructure Library)
  • SIEM (Security Information and Event Management)
In IT governance, 'COBIT' (Control Objectives for Information and Related Technologies) is a framework that emphasizes decision rights, accountability, and governance to ensure that IT is used in a way that aligns with business objectives and encourages desirable behavior.

Which protocol is often used for lightweight communication in IoT devices due to its low power consumption?

  • FTP (File Transfer Protocol)
  • HTTP (Hypertext Transfer Protocol)
  • MQTT (Message Queuing Telemetry Transport)
  • TCP (Transmission Control Protocol)
MQTT is widely used in IoT because it's designed for low-power, efficient communication. MQTT's publish-subscribe model minimizes overhead and is well-suited for resource-constrained devices.