You've detected an unknown device connected to your wireless home network. What should be the immediate first step to ensure the security of your network?

  • Block the Device's MAC Address
  • Change Wi-Fi Password
  • Restart the Router
  • Run Antivirus Software
The immediate first step to secure your home network when an unknown device is detected is to 'block the device's MAC address.' This prevents the unknown device from connecting to your network and ensures the security of your network's perimeter.

In network security, the principle that states users should only have the permissions necessary to perform their job functions is called the principle of _______.

  • Authentication
  • Encryption
  • Firewall
  • Least Privilege
The principle of 'Least Privilege' dictates that users and processes should have only the minimum permissions required to perform their specific job functions. This minimizes the risk of unauthorized access and potential security breaches.

A software engineer is tasked with finding the shortest path between two nodes in a weighted graph. Which algorithm should they consider implementing first?

  • Dijkstra's Algorithm
  • Depth-First Search (DFS)
  • Breadth-First Search (BFS)
  • Bellman-Ford Algorithm
To find the shortest path in a weighted graph, the 'Dijkstra's Algorithm' is the primary choice. It's efficient for finding the shortest path when all edge weights are non-negative, making it a suitable option for this scenario. It's widely used in network routing and navigation systems.

An organization recently discovered that sensitive customer data was being sent outside the company network. The IT team needs to implement a solution to monitor and control data transfer to ensure this does not happen again. Which solution should they consider?

  • Data Loss Prevention (DLP)
  • Intrusion Detection System (IDS)
  • Secure Socket Layer (SSL)
  • Virtual Private Network (VPN)
In this scenario, the organization needs to monitor and control data transfer to prevent data loss. 'Data Loss Prevention (DLP)' solutions are specifically designed for this purpose, helping identify and block unauthorized data transfers.

What is the main difference between static routing and dynamic routing?

  • Static routing is manually configured, while dynamic routing adjusts routes automatically.
  • Static routing is more efficient, while dynamic routing is slower.
  • Static routing is more secure, while dynamic routing is more flexible.
  • Static routing is used for wireless networks, while dynamic routing is used for wired networks.
Static routing involves manually configuring the routing table, while dynamic routing protocols adjust routes automatically based on network conditions. This makes dynamic routing more adaptable and suitable for larger, changing networks.

Which document outlines the standards, rules, and guidelines for computer systems and their users in an organization?

  • Code of Conduct
  • End-User License Agreement (EULA)
  • IT Policy
  • Service Level Agreement (SL
An 'IT Policy' is a comprehensive document that outlines the standards, rules, and guidelines for computer systems and their users within an organization. It governs how technology is used and maintained.

An industrial company wants to deploy IoT sensors in their machinery to predict maintenance needs. However, they are concerned about the potential security risks. Which aspect of IoT should they prioritize to ensure the safe transmission of data?

  • Data Encryption
  • Device Authentication
  • Predictive Maintenance Algorithms
  • Secure Boot Process
Prioritizing a 'Secure Boot Process' is essential for ensuring the safe transmission of IoT data. This process ensures that only trusted, authenticated firmware and software are loaded onto devices, preventing unauthorized access and enhancing security. While data encryption, device authentication, and predictive maintenance algorithms are important, securing the boot process is the first line of defense.

Which storage device uses NAND-based flash memory and offers quicker data access than traditional HDDs?

  • CD-ROM (Compact Disc Read-Only Memory)
  • Floppy Disk
  • RAM (Random Access Memory)
  • SSD (Solid State Drive)
An SSD, which stands for 'Solid State Drive,' uses NAND-based flash memory to store data. It is significantly faster in terms of data access compared to traditional HDDs (Hard Disk Drives) because it has no moving parts, resulting in quicker data retrieval. SSDs are commonly used for faster storage and improved system performance.

In a distributed database, what term describes the division of a database into parts, each of which is stored on different servers?

  • Data Fragmentation
  • Data Partitioning
  • Data Replication
  • Data Sharding
Data Sharding is a technique in distributed databases where a database is divided into smaller parts called "shards," and each shard is stored on different servers. This improves data distribution and scalability.

In IT project management, what technique visualizes tasks or activities on a board, allowing team members to track project progress?

  • Critical Path Method (CPM)
  • Gantt Chart
  • Kanban
  • Waterfall Method
The technique that visualizes tasks on a board for easy tracking is 'Kanban.' Kanban is widely used in Agile project management, allowing teams to manage work in progress effectively and optimize flow.