Which document outlines the standards, rules, and guidelines for computer systems and their users in an organization?

  • Code of Conduct
  • End-User License Agreement (EULA)
  • IT Policy
  • Service Level Agreement (SL
An 'IT Policy' is a comprehensive document that outlines the standards, rules, and guidelines for computer systems and their users within an organization. It governs how technology is used and maintained.

Which technology is essential in HPC to interconnect multiple processors and achieve faster data transfer rates?

  • Bluetooth
  • Ethernet
  • InfiniBand
  • USB (Universal Serial Bus)
InfiniBand is a high-speed interconnect technology used in HPC to connect processors, memory, and storage devices. It enables 'faster data transfer rates' essential for high-performance computing applications.

What is the primary purpose of a hypervisor in virtualization?

  • Managing physical servers
  • Providing network security
  • Running database queries
  • Running virtual machines
A 'hypervisor' is software that allows multiple virtual machines to run on a single physical server. Its primary purpose is to manage and allocate resources to these virtual machines.

Which technique involves an attacker sending multiple requests or inputs to a target system to cause it to crash?

  • Cross-Site Scripting
  • Denial of Service
  • Firewall Bypass
  • SQL Injection
'Denial of Service' (DoS) is an attack technique where an attacker overwhelms a target system with a high volume of requests or inputs, causing it to become unavailable or crash.

The process of organizing a database to reduce redundancy and improve data integrity is known as _______.

  • Aggregation
  • Denormalization
  • Normalization
  • Optimization
'Normalization' is the process of organizing a database to reduce data redundancy, eliminate anomalies, and improve data integrity. It involves breaking down data into separate tables and defining relationships between them.

Your organization's network is growing rapidly, and you need to ensure that routers can learn about network paths automatically without manual configurations. Which approach would be most suitable?

  • BGP (Border Gateway Protocol)
  • Dynamic Routing
  • RIP (Routing Information Protocol)
  • Static Routing
To handle a rapidly growing network while enabling routers to learn network paths automatically, 'Dynamic Routing' is the best approach. Dynamic routing protocols, like OSPF or BGP, allow routers to adapt to network changes without manual intervention.

An industrial company wants to deploy IoT sensors in their machinery to predict maintenance needs. However, they are concerned about the potential security risks. Which aspect of IoT should they prioritize to ensure the safe transmission of data?

  • Data Encryption
  • Device Authentication
  • Predictive Maintenance Algorithms
  • Secure Boot Process
Prioritizing a 'Secure Boot Process' is essential for ensuring the safe transmission of IoT data. This process ensures that only trusted, authenticated firmware and software are loaded onto devices, preventing unauthorized access and enhancing security. While data encryption, device authentication, and predictive maintenance algorithms are important, securing the boot process is the first line of defense.

Which storage device uses NAND-based flash memory and offers quicker data access than traditional HDDs?

  • CD-ROM (Compact Disc Read-Only Memory)
  • Floppy Disk
  • RAM (Random Access Memory)
  • SSD (Solid State Drive)
An SSD, which stands for 'Solid State Drive,' uses NAND-based flash memory to store data. It is significantly faster in terms of data access compared to traditional HDDs (Hard Disk Drives) because it has no moving parts, resulting in quicker data retrieval. SSDs are commonly used for faster storage and improved system performance.

In a distributed database, what term describes the division of a database into parts, each of which is stored on different servers?

  • Data Fragmentation
  • Data Partitioning
  • Data Replication
  • Data Sharding
Data Sharding is a technique in distributed databases where a database is divided into smaller parts called "shards," and each shard is stored on different servers. This improves data distribution and scalability.

In IT project management, what technique visualizes tasks or activities on a board, allowing team members to track project progress?

  • Critical Path Method (CPM)
  • Gantt Chart
  • Kanban
  • Waterfall Method
The technique that visualizes tasks on a board for easy tracking is 'Kanban.' Kanban is widely used in Agile project management, allowing teams to manage work in progress effectively and optimize flow.