In the context of intrusion detection, what does "false positive" refer to?

  • Inactive System
  • Legitimate Activity
  • Successful Intrusion
  • System Patched
A 'false positive' in intrusion detection occurs when the system incorrectly identifies legitimate activity as a security threat or intrusion attempt. It can lead to unnecessary alerts.

In cryptography, the process of disguising plaintext to hide its content is called _______.

  • Compression
  • Decryption
  • Encryption
  • Steganography
The blank should be filled with "Steganography." Steganography is the practice of concealing data within other data, making it appear as if the hidden information doesn't exist, enhancing security and confidentiality.

The practice of using technology to innovate business practices, customer experiences, and culture is known as _______ transformation.

  • Cultural
  • Digital
  • Innovation
  • Technological
Digital transformation involves using technology to fundamentally change and improve business processes, customer interactions, and organizational culture. It's about leveraging digital tools to drive innovation and stay competitive.

The section of the operating system that chooses which task will be performed by the system at any given time is known as the _______.

  • Compiler
  • File System
  • Kernel
  • Scheduler
The 'scheduler' is a crucial part of the operating system that determines the order and priority in which tasks are executed, ensuring efficient resource allocation.

In ERP systems, the module that handles the production, shipping, and delivery of products is commonly referred to as _______.

  • Customer Relationship Module
  • Finance Module
  • HR Module
  • Supply Chain Module
In ERP systems, the module responsible for managing the production, shipping, and delivery of products is often called the 'Supply Chain Module.' It streamlines these processes for efficiency.

A research team is building a chatbot and needs it to understand and respond to user queries contextually over a conversation. Which NLP mechanism allows the model to remember and utilize previous interactions in a conversation?

  • Bag of Words (BoW)
  • Latent Dirichlet Allocation (LDA)
  • Recurrent Neural Networks (RNN)
  • Transformer Models
Transformer models, such as the GPT-3 and BERT, are capable of understanding context in conversations and remembering previous interactions. They use attention mechanisms to capture context and respond contextually.

A company wants to ensure the integrity and authenticity of its software downloads. What cryptographic technique should it use to allow users to verify that the software has not been tampered with?

  • Code Obfuscation
  • Digital Signatures
  • Firewalls
  • Hash Functions
To ensure the integrity and authenticity of software downloads, 'Digital Signatures' are used. Digital signatures provide a way for users to verify that the software has not been tampered with, as they are unique cryptographic stamps applied to the software package.

In advanced IoT architectures, _______ computing allows for processing data closer to the data source rather than in a centralized cloud.

  • Centralized
  • Edge
  • Fog
  • Quantum
In advanced IoT systems, 'Edge' computing is a concept that enables data processing closer to the data source, reducing latency and dependence on centralized cloud services.

An e-commerce app is experiencing slow query times due to large datasets. What database indexing technique might be implemented to optimize search performance?

  • B-Tree Indexing
  • Bitmap Indexing
  • Full-Text Indexing
  • Hash Indexing
To optimize search performance with large datasets, 'B-Tree indexing' is commonly used. B-Tree structures provide efficient range queries and are well-suited for scenarios like e-commerce apps that need to search large datasets efficiently.

A company wants to develop a mobile app that works both offline and online, syncing data when a connection is available. Which type of database would be most suitable for this requirement?

  • Graph Database
  • In-Memory Database
  • NoSQL
  • SQL (Relational)
For offline-online sync, a 'NoSQL' database, like document-oriented databases, is often used. NoSQL databases offer flexible schema and can efficiently handle unstructured data, making them suitable for mobile apps with sync requirements.