A user is running multiple applications simultaneously on their computer. Over time, the computer starts to slow down and becomes less responsive. Which operating system feature can help manage and allocate the CPU's time among the various running applications?

  • Device Manager
  • Disk Cleanup Utility
  • File Explorer
  • Task Scheduler
The 'Task Scheduler' is an operating system feature that helps manage and allocate the CPU's time among various running applications. It schedules tasks and processes, ensuring fair and efficient resource allocation.

A computer or network that is compromised and used as a launch point for malicious attacks against other systems is referred to as a _______.

  • Botnet
  • Honey Pot
  • Proxy Server
  • Zero-Day Vulnerability
A 'Proxy Server' is a computer or network device that can be compromised and used to route malicious traffic, making it appear as if the attacks are originating from a different source.

Which encryption method ensures that a message can only be decrypted by a specific recipient using their private key?

  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing
  • Public Key Encryption
"Asymmetric Encryption" (Option b) uses a pair of keys: a public key for encryption and a private key for decryption. This ensures that a message encrypted with the recipient's public key can only be decrypted using their private key, providing secure communication.

A cybersecurity analyst comes across a file that appears benign but suspects it might contain concealed malicious code. Which analysis technique would be most suitable to inspect the file without executing it?

  • Behavioral Analysis
  • Dynamic Analysis
  • Signature-based Analysis
  • Static Analysis
When dealing with a file suspected of containing concealed malicious code, 'Static Analysis' is the most suitable technique. It involves examining the file's code and structure without executing it to identify potential threats.

Which ACID property ensures that once a transaction is committed, it remains permanent even in the event of system failures?

  • Atomicity
  • Consistency
  • Durability
  • Isolation
The 'Durability' property in the ACID (Atomicity, Consistency, Isolation, Durability) transaction model ensures that once a transaction is committed, the changes are permanent and will survive system failures, such as power outages or crashes.

In ITSM, which process focuses primarily on restoring services to normal operation as quickly as possible?

  • Change Management
  • Incident Management
  • Problem Management
  • Service Level Management
'Incident Management' in IT Service Management (ITSM) primarily focuses on restoring services to normal operation as quickly as possible after an incident or disruption occurs. It aims to minimize service downtime.

Which module in an ERP system typically manages human resources, payroll, and benefits?

  • Finance Module
  • HR Module
  • Inventory Module
  • Sales Module
The 'HR (Human Resources) Module' in an ERP system is responsible for managing various aspects of an organization's human resources, including payroll, employee benefits, and personnel data. It helps streamline HR-related processes.

Which RAID level provides disk mirroring for fault tolerance without striping?

  • RAID 0
  • RAID 1
  • RAID 10
  • RAID 5
RAID 1, also known as disk mirroring, is a RAID level that provides fault tolerance by duplicating data on two or more disks. It doesn't involve striping, making it a reliable choice for data redundancy.

High-Performance Computing (HPC) is commonly associated with which type of processing?

  • Everyday computing tasks
  • Scientific and data-intensive tasks
  • Simple mathematical calculations
  • Social media management
High-Performance Computing (HPC) is associated with "scientific and data-intensive tasks." These tasks involve complex simulations, modeling, and data analysis that require immense computational power, often beyond the capability of regular computers.

Which activation function in neural networks maps its input to values between 0 and 1?

  • Leaky ReLU
  • ReLU (Rectified Linear Unit)
  • Sigmoid
  • Tanh (Hyperbolic Tangent)
The activation function that maps its input to values between 0 and 1 is the 'Sigmoid' function. It's commonly used in the output layer of a neural network for binary classification tasks, where it represents probabilities.