A manufacturing company wants to integrate its supply chain management with its financial accounting. Which ERP module should be primarily considered?

  • Financial Accounting Module
  • Human Resources Management Module
  • Inventory Management Module
  • Supply Chain Management Module
In this case, the primary ERP module to consider is the 'Financial Accounting Module' as it is focused on managing financial aspects and integrating them with other business processes, including supply chain management.

A wireless network that is set up by a malicious actor to mimic a legitimate network and trick users into connecting is known as a(n) _______.

  • Encryption Key
  • Firewall Rule
  • Intrusion Detection
  • Rogue Access Point
A 'Rogue Access Point' is a deceptive wireless network set up by a malicious actor to imitate a legitimate network. When users connect to it, the attacker can intercept data and potentially launch attacks. Detecting and avoiding rogue access points is crucial for network security.

A _______ is a formal, approved version of a plan against which project execution is compared to measure and manage variances.

  • Baseline
  • Gantt Chart
  • Project Charter
  • Stakeholder Register
In project management, a 'baseline' is a crucial concept. It represents a formal, approved version of a project plan, which serves as a reference point to compare and manage variances during project execution. It includes key project elements such as schedule, scope, and budget. A Gantt Chart is a visual representation of a project schedule, a Project Charter is a document that authorizes the project's existence, and a Stakeholder Register is a record of project stakeholders.

When changes are proposed during a project, they're typically reviewed and either approved or denied by a group known as the _______.

  • Change Control Board
  • Decision Directorate
  • Project Conveners
  • Revision Review Team
In project management, the group responsible for reviewing and deciding on proposed changes is known as the 'Change Control Board.' They evaluate the potential impact of changes on the project's scope, schedule, and budget, and determine whether to approve or deny the proposed changes. This process helps maintain project integrity.

What is the time complexity of a binary search on a sorted array?

  • O(1)
  • O(log n)
  • O(n log n)
  • O(n)
Binary search has a time complexity of O(log n) on a sorted array. It efficiently narrows down the search space with each comparison, making it a highly efficient algorithm for searching.

In network security, the principle that states users should only have the permissions necessary to perform their job functions is called the principle of _______.

  • Authentication
  • Encryption
  • Firewall
  • Least Privilege
The principle of 'Least Privilege' dictates that users and processes should have only the minimum permissions required to perform their specific job functions. This minimizes the risk of unauthorized access and potential security breaches.

A software engineer is tasked with finding the shortest path between two nodes in a weighted graph. Which algorithm should they consider implementing first?

  • Dijkstra's Algorithm
  • Depth-First Search (DFS)
  • Breadth-First Search (BFS)
  • Bellman-Ford Algorithm
To find the shortest path in a weighted graph, the 'Dijkstra's Algorithm' is the primary choice. It's efficient for finding the shortest path when all edge weights are non-negative, making it a suitable option for this scenario. It's widely used in network routing and navigation systems.

An organization recently discovered that sensitive customer data was being sent outside the company network. The IT team needs to implement a solution to monitor and control data transfer to ensure this does not happen again. Which solution should they consider?

  • Data Loss Prevention (DLP)
  • Intrusion Detection System (IDS)
  • Secure Socket Layer (SSL)
  • Virtual Private Network (VPN)
In this scenario, the organization needs to monitor and control data transfer to prevent data loss. 'Data Loss Prevention (DLP)' solutions are specifically designed for this purpose, helping identify and block unauthorized data transfers.

What is the main difference between static routing and dynamic routing?

  • Static routing is manually configured, while dynamic routing adjusts routes automatically.
  • Static routing is more efficient, while dynamic routing is slower.
  • Static routing is more secure, while dynamic routing is more flexible.
  • Static routing is used for wireless networks, while dynamic routing is used for wired networks.
Static routing involves manually configuring the routing table, while dynamic routing protocols adjust routes automatically based on network conditions. This makes dynamic routing more adaptable and suitable for larger, changing networks.

Which document outlines the standards, rules, and guidelines for computer systems and their users in an organization?

  • Code of Conduct
  • End-User License Agreement (EULA)
  • IT Policy
  • Service Level Agreement (SL
An 'IT Policy' is a comprehensive document that outlines the standards, rules, and guidelines for computer systems and their users within an organization. It governs how technology is used and maintained.