What is the primary purpose of a hypervisor in virtualization?
- Managing physical servers
- Providing network security
- Running database queries
- Running virtual machines
A 'hypervisor' is software that allows multiple virtual machines to run on a single physical server. Its primary purpose is to manage and allocate resources to these virtual machines.
Which technique involves an attacker sending multiple requests or inputs to a target system to cause it to crash?
- Cross-Site Scripting
- Denial of Service
- Firewall Bypass
- SQL Injection
'Denial of Service' (DoS) is an attack technique where an attacker overwhelms a target system with a high volume of requests or inputs, causing it to become unavailable or crash.
The process of organizing a database to reduce redundancy and improve data integrity is known as _______.
- Aggregation
- Denormalization
- Normalization
- Optimization
'Normalization' is the process of organizing a database to reduce data redundancy, eliminate anomalies, and improve data integrity. It involves breaking down data into separate tables and defining relationships between them.
Your organization's network is growing rapidly, and you need to ensure that routers can learn about network paths automatically without manual configurations. Which approach would be most suitable?
- BGP (Border Gateway Protocol)
- Dynamic Routing
- RIP (Routing Information Protocol)
- Static Routing
To handle a rapidly growing network while enabling routers to learn network paths automatically, 'Dynamic Routing' is the best approach. Dynamic routing protocols, like OSPF or BGP, allow routers to adapt to network changes without manual intervention.
You've detected an unknown device connected to your wireless home network. What should be the immediate first step to ensure the security of your network?
- Block the Device's MAC Address
- Change Wi-Fi Password
- Restart the Router
- Run Antivirus Software
The immediate first step to secure your home network when an unknown device is detected is to 'block the device's MAC address.' This prevents the unknown device from connecting to your network and ensures the security of your network's perimeter.
In network security, the principle that states users should only have the permissions necessary to perform their job functions is called the principle of _______.
- Authentication
- Encryption
- Firewall
- Least Privilege
The principle of 'Least Privilege' dictates that users and processes should have only the minimum permissions required to perform their specific job functions. This minimizes the risk of unauthorized access and potential security breaches.
The concept of providing a dedicated portion of a public cloud environment exclusively for a single tenant is called _______.
- Cloud Bursting
- Multi-Tenancy
- Single-Tenancy
- Virtualization
Single-Tenancy refers to the practice of allocating a dedicated portion of a public cloud for a single tenant or organization, providing isolation and control over resources.
The concept in ERP where data is entered once and is then accessible from multiple applications without redundancy is referred to as _______.
- Data Aggregation
- Data Duplication
- Data Integration
- Data Normalization
The concept described is 'Data Integration' in ERP. It ensures that data is entered once and can be accessed by multiple applications without duplication. This enhances data accuracy and consistency across the organization.
In app development, the method of delivering updates to only a portion of the app's user base to test changes before a full release is known as _______.
- A/B testing
- Alpha testing
- Beta testing
- Canary testing
A/B testing, or "split testing," is a method where different versions of an application are released to different user groups. It's a technique used to assess the impact of changes before a full release.
An industrial company wants to deploy IoT sensors in their machinery to predict maintenance needs. However, they are concerned about the potential security risks. Which aspect of IoT should they prioritize to ensure the safe transmission of data?
- Data Encryption
- Device Authentication
- Predictive Maintenance Algorithms
- Secure Boot Process
Prioritizing a 'Secure Boot Process' is essential for ensuring the safe transmission of IoT data. This process ensures that only trusted, authenticated firmware and software are loaded onto devices, preventing unauthorized access and enhancing security. While data encryption, device authentication, and predictive maintenance algorithms are important, securing the boot process is the first line of defense.