In software engineering, which process model emphasizes iterative development and the rapid construction of prototypes?

  • Agile Model
  • Spiral Model
  • V-Model
  • Waterfall Model
The 'Agile Model' emphasizes iterative development and rapid prototyping. It promotes flexibility and customer collaboration during the development process, leading to quicker and more adaptable software delivery.

In a switched network, what technique is used to prevent the broadcast storms that can be caused by switching loops?

  • Internet Control Message Protocol (ICMP)
  • Routing Information Protocol (RIP)
  • Spanning Tree Protocol (STP)
  • VLAN Trunking Protocol (VTP)
To prevent broadcast storms caused by switching loops in a network, the 'Spanning Tree Protocol (STP)' is employed. STP helps in determining a loop-free path through the switched network and blocks redundant links to prevent loops.

What is the primary goal of information assurance?

  • Ensuring data accuracy
  • Maximizing data size
  • Protecting data
  • Storing data securely
The primary goal of information assurance is 'protecting data.' Information assurance focuses on safeguarding the confidentiality, integrity, and availability of data and information assets.

What is a key component of IT governance that ensures risks associated with IT investments are identified and managed?

  • Cryptocurrency
  • Data Loss Prevention (DLP)
  • IT Portfolio Management
  • IT Service Management
'IT Portfolio Management' is a critical component of IT governance that focuses on identifying and managing risks associated with IT investments. It involves assessing the value, risk, and performance of IT projects and assets to make informed decisions about resource allocation.

You're managing a project and notice that one of the critical path activities is delayed. What is the most likely impact on the project?

  • Other project activities won't be affected.
  • The project budget will be reduced.
  • The project's duration will be extended.
  • The project's scope will be enhanced.
When a critical path activity is delayed, it can lead to an extension of the project's duration. The critical path represents the longest path in a project, and any delay in these activities directly affects the project's completion time. Other project activities may be delayed as well due to their dependencies on the critical path activities.

What is the primary purpose of a Content Delivery Network (CDN) in cloud networking?

  • Analyzing network traffic
  • Hosting databases
  • Managing email servers
  • Speeding up website loading times
A Content Delivery Network (CDN) is designed to enhance website performance by 'speeding up website loading times.' CDNs store cached content closer to end-users, reducing latency and improving overall user experience.

Which cryptographic scheme provides both authentication and secrecy for a message using block ciphers?

  • AES-GCM
  • Diffie-Hellman Key Exchange
  • HMAC (Hash-based Message Authentication Code)
  • RSA
AES-GCM (Advanced Encryption Standard-Galois/Counter Mode) is a cryptographic scheme that combines block cipher (AES) with a mode of operation (GCM) to provide both authentication and secrecy for a message. It ensures the message's confidentiality and verifies its authenticity.

In the context of convolutional neural networks (CNNs), what operation is used to reduce the spatial dimensions of the input volume?

  • Batch Normalization
  • Normalization
  • Pooling
  • Weight Initialization
In CNNs, 'pooling' is used to reduce the spatial dimensions of the input volume. Pooling layers downsample the feature maps, which helps in reducing computational complexity while retaining essential information, enabling the network to focus on important features.

A user is running multiple applications simultaneously on their computer. Over time, the computer starts to slow down and becomes less responsive. Which operating system feature can help manage and allocate the CPU's time among the various running applications?

  • Device Manager
  • Disk Cleanup Utility
  • File Explorer
  • Task Scheduler
The 'Task Scheduler' is an operating system feature that helps manage and allocate the CPU's time among various running applications. It schedules tasks and processes, ensuring fair and efficient resource allocation.

A computer or network that is compromised and used as a launch point for malicious attacks against other systems is referred to as a _______.

  • Botnet
  • Honey Pot
  • Proxy Server
  • Zero-Day Vulnerability
A 'Proxy Server' is a computer or network device that can be compromised and used to route malicious traffic, making it appear as if the attacks are originating from a different source.