Which technology is essential in HPC to interconnect multiple processors and achieve faster data transfer rates?

  • Bluetooth
  • Ethernet
  • InfiniBand
  • USB (Universal Serial Bus)
InfiniBand is a high-speed interconnect technology used in HPC to connect processors, memory, and storage devices. It enables 'faster data transfer rates' essential for high-performance computing applications.

What is the primary purpose of a hypervisor in virtualization?

  • Managing physical servers
  • Providing network security
  • Running database queries
  • Running virtual machines
A 'hypervisor' is software that allows multiple virtual machines to run on a single physical server. Its primary purpose is to manage and allocate resources to these virtual machines.

Which technique involves an attacker sending multiple requests or inputs to a target system to cause it to crash?

  • Cross-Site Scripting
  • Denial of Service
  • Firewall Bypass
  • SQL Injection
'Denial of Service' (DoS) is an attack technique where an attacker overwhelms a target system with a high volume of requests or inputs, causing it to become unavailable or crash.

The process of organizing a database to reduce redundancy and improve data integrity is known as _______.

  • Aggregation
  • Denormalization
  • Normalization
  • Optimization
'Normalization' is the process of organizing a database to reduce data redundancy, eliminate anomalies, and improve data integrity. It involves breaking down data into separate tables and defining relationships between them.

Your organization's network is growing rapidly, and you need to ensure that routers can learn about network paths automatically without manual configurations. Which approach would be most suitable?

  • BGP (Border Gateway Protocol)
  • Dynamic Routing
  • RIP (Routing Information Protocol)
  • Static Routing
To handle a rapidly growing network while enabling routers to learn network paths automatically, 'Dynamic Routing' is the best approach. Dynamic routing protocols, like OSPF or BGP, allow routers to adapt to network changes without manual intervention.

You've detected an unknown device connected to your wireless home network. What should be the immediate first step to ensure the security of your network?

  • Block the Device's MAC Address
  • Change Wi-Fi Password
  • Restart the Router
  • Run Antivirus Software
The immediate first step to secure your home network when an unknown device is detected is to 'block the device's MAC address.' This prevents the unknown device from connecting to your network and ensures the security of your network's perimeter.

In ITSM, a _______ is a standard or set of guidelines for how something might be accomplished, but without mandating a particular tool or method.

  • Best Practice
  • Change Request Form
  • Process Model
  • Service Catalog
In IT Service Management (ITSM), a 'best practice' refers to a standard or set of guidelines for achieving a specific objective or task effectively. It provides recommendations and proven methods, but it doesn't require the use of a particular tool or approach. A Process Model outlines how a specific process works, a Service Catalog lists available services, and a Change Request Form is used to request changes in IT services.

The concept of providing a dedicated portion of a public cloud environment exclusively for a single tenant is called _______.

  • Cloud Bursting
  • Multi-Tenancy
  • Single-Tenancy
  • Virtualization
Single-Tenancy refers to the practice of allocating a dedicated portion of a public cloud for a single tenant or organization, providing isolation and control over resources.

The concept in ERP where data is entered once and is then accessible from multiple applications without redundancy is referred to as _______.

  • Data Aggregation
  • Data Duplication
  • Data Integration
  • Data Normalization
The concept described is 'Data Integration' in ERP. It ensures that data is entered once and can be accessed by multiple applications without duplication. This enhances data accuracy and consistency across the organization.

In app development, the method of delivering updates to only a portion of the app's user base to test changes before a full release is known as _______.

  • A/B testing
  • Alpha testing
  • Beta testing
  • Canary testing
A/B testing, or "split testing," is a method where different versions of an application are released to different user groups. It's a technique used to assess the impact of changes before a full release.