An embedded system, like a microwave or a washing machine, needs an operating system. What type of OS would be most suitable for such systems?

  • Linux
  • Real-time Operating System (RTOS)
  • Windows OS
  • macOS
Embedded systems, like microwaves or washing machines, benefit from a 'Real-time Operating System (RTOS)' because it provides predictable and timely responses, essential for control and automation in such devices.

A structured approach to aligning IT with business objectives and ensuring its optimal performance is often referred to as IT _______.

  • Alignment
  • Collaboration
  • Enhancement
  • Optimization
IT Alignment is the practice of ensuring that an organization's information technology (IT) strategy and initiatives are closely aligned with its business objectives. This alignment is crucial for maximizing the value IT can provide to the business.

A(n) _______ attack attempts to make a computer resource unavailable to its intended users by flooding it with superfluous requests.

  • Denial of Service
  • Encryption
  • Intrusion
  • Phishing
A 'Denial of Service' attack aims to disrupt a computer resource's availability by overwhelming it with excessive requests. This is often done maliciously to disrupt services.

What is the primary purpose of a firewall in network security?

  • Access Control
  • Data Encryption
  • Network Monitoring
  • Virus Detection
The primary purpose of a 'firewall' in network security is to enforce access control policies. It acts as a barrier between a trusted network and an untrusted network, allowing or blocking network traffic based on predefined rules.

A type of regularization technique that adds a penalty to the loss function for large weights is called _______.

  • Activation Function
  • Dropout
  • Gradient Descent
  • L1 Regularization
The technique you're describing is 'L1 Regularization.' It adds a penalty term to the loss function for large weights, encouraging the model to use only the most important features and prevent overfitting.

Which concept in IT governance emphasizes the importance of decision rights and accountability to encourage desirable behavior in the use of IT?

  • API (Application Programming Interface)
  • COBIT (Control Objectives for Information and Related Technologies)
  • ITIL (Information Technology Infrastructure Library)
  • SIEM (Security Information and Event Management)
In IT governance, 'COBIT' (Control Objectives for Information and Related Technologies) is a framework that emphasizes decision rights, accountability, and governance to ensure that IT is used in a way that aligns with business objectives and encourages desirable behavior.

Which protocol is often used for lightweight communication in IoT devices due to its low power consumption?

  • FTP (File Transfer Protocol)
  • HTTP (Hypertext Transfer Protocol)
  • MQTT (Message Queuing Telemetry Transport)
  • TCP (Transmission Control Protocol)
MQTT is widely used in IoT because it's designed for low-power, efficient communication. MQTT's publish-subscribe model minimizes overhead and is well-suited for resource-constrained devices.

Which type of penetration testing focuses on testing from an attacker's perspective without prior knowledge of the target infrastructure?

  • Black-Box Testing
  • Gray-Box Testing
  • Vulnerability Scanning
  • White-Box Testing
'Black-Box Testing' is a type of penetration testing where testers simulate an attacker with no prior knowledge of the target infrastructure. The goal is to identify vulnerabilities as if they were an external attacker.

Which of the following best describes the term "risk appetite" in IT risk management?

  • A measure of potential profit
  • A tolerance for loss
  • Likelihood of an incident
  • Willingness to accept risk
"Risk appetite" in IT risk management refers to an organization's 'willingness to accept risk.' It signifies how much risk an organization is prepared to undertake in pursuit of its objectives, balancing potential rewards and uncertainties.

Which layer of the OSI model deals with the logical addressing of devices and routing?

  • Data link layer
  • Network layer
  • Physical layer
  • Transport layer
The 'Network layer' in the OSI model is responsible for logical addressing of devices and routing. This layer handles tasks like IP addressing and determining the best path for data to travel.