An organization recently discovered that sensitive customer data was being sent outside the company network. The IT team needs to implement a solution to monitor and control data transfer to ensure this does not happen again. Which solution should they consider?
- Data Loss Prevention (DLP)
- Intrusion Detection System (IDS)
- Secure Socket Layer (SSL)
- Virtual Private Network (VPN)
In this scenario, the organization needs to monitor and control data transfer to prevent data loss. 'Data Loss Prevention (DLP)' solutions are specifically designed for this purpose, helping identify and block unauthorized data transfers.
What is the main difference between static routing and dynamic routing?
- Static routing is manually configured, while dynamic routing adjusts routes automatically.
- Static routing is more efficient, while dynamic routing is slower.
- Static routing is more secure, while dynamic routing is more flexible.
- Static routing is used for wireless networks, while dynamic routing is used for wired networks.
Static routing involves manually configuring the routing table, while dynamic routing protocols adjust routes automatically based on network conditions. This makes dynamic routing more adaptable and suitable for larger, changing networks.
Which document outlines the standards, rules, and guidelines for computer systems and their users in an organization?
- Code of Conduct
- End-User License Agreement (EULA)
- IT Policy
- Service Level Agreement (SL
An 'IT Policy' is a comprehensive document that outlines the standards, rules, and guidelines for computer systems and their users within an organization. It governs how technology is used and maintained.
Which technology is essential in HPC to interconnect multiple processors and achieve faster data transfer rates?
- Bluetooth
- Ethernet
- InfiniBand
- USB (Universal Serial Bus)
InfiniBand is a high-speed interconnect technology used in HPC to connect processors, memory, and storage devices. It enables 'faster data transfer rates' essential for high-performance computing applications.
What is the primary purpose of a hypervisor in virtualization?
- Managing physical servers
- Providing network security
- Running database queries
- Running virtual machines
A 'hypervisor' is software that allows multiple virtual machines to run on a single physical server. Its primary purpose is to manage and allocate resources to these virtual machines.
Which technique involves an attacker sending multiple requests or inputs to a target system to cause it to crash?
- Cross-Site Scripting
- Denial of Service
- Firewall Bypass
- SQL Injection
'Denial of Service' (DoS) is an attack technique where an attacker overwhelms a target system with a high volume of requests or inputs, causing it to become unavailable or crash.
An industrial company wants to deploy IoT sensors in their machinery to predict maintenance needs. However, they are concerned about the potential security risks. Which aspect of IoT should they prioritize to ensure the safe transmission of data?
- Data Encryption
- Device Authentication
- Predictive Maintenance Algorithms
- Secure Boot Process
Prioritizing a 'Secure Boot Process' is essential for ensuring the safe transmission of IoT data. This process ensures that only trusted, authenticated firmware and software are loaded onto devices, preventing unauthorized access and enhancing security. While data encryption, device authentication, and predictive maintenance algorithms are important, securing the boot process is the first line of defense.
Which storage device uses NAND-based flash memory and offers quicker data access than traditional HDDs?
- CD-ROM (Compact Disc Read-Only Memory)
- Floppy Disk
- RAM (Random Access Memory)
- SSD (Solid State Drive)
An SSD, which stands for 'Solid State Drive,' uses NAND-based flash memory to store data. It is significantly faster in terms of data access compared to traditional HDDs (Hard Disk Drives) because it has no moving parts, resulting in quicker data retrieval. SSDs are commonly used for faster storage and improved system performance.
In a distributed database, what term describes the division of a database into parts, each of which is stored on different servers?
- Data Fragmentation
- Data Partitioning
- Data Replication
- Data Sharding
Data Sharding is a technique in distributed databases where a database is divided into smaller parts called "shards," and each shard is stored on different servers. This improves data distribution and scalability.
In IT project management, what technique visualizes tasks or activities on a board, allowing team members to track project progress?
- Critical Path Method (CPM)
- Gantt Chart
- Kanban
- Waterfall Method
The technique that visualizes tasks on a board for easy tracking is 'Kanban.' Kanban is widely used in Agile project management, allowing teams to manage work in progress effectively and optimize flow.