Q91
Q91 When a USB device is not recognized by the system, a useful troubleshooting step is to:
Update the device drivers
Check the device on another computer
Try a different USB port
Restart the computer
Q92
Q92 Solving intermittent device disconnection issues might require examining:
The device's firmware version
The power management settings for the USB ports
The length and quality of the connection cables
All of the above
Q93
Q93 What is the primary purpose of virtualization in computing?
To increase physical hardware costs
To reduce the number of physical servers required
To slow down computing processes
To complicate IT management
Q94
Q94 Cloud computing primarily enables users to:
Store data locally on physical drives
Access computing resources over the internet
Use software without internet access
Increase data processing time
Q95
Q95 Which of the following is a characteristic of cloud computing?
Limited scalability
Pay-per-use pricing model
Dependency on local infrastructure
Reduced access to computing resources
Q96
Q96 In virtualization, what does a hypervisor do?
Acts as a physical server for virtual machines
Manages network traffic exclusively
Enables direct communication between virtual machines
Manages and creates virtual machines
Q97
Q97 What advantage does Platform as a Service (PaaS) provide to developers?
Manual management of underlying hardware
Limited programming language support
Preconfigured development environments
Requires extensive system administration skills
Q98
Q98 What distinguishes private cloud from public cloud computing?
Private cloud is accessible by any user over the internet
Public cloud is hosted on-premises
Private cloud services are dedicated to a single organization
Public cloud is always less secure
Q99
Q99 Serverless computing allows developers to:
Buy servers directly from cloud providers
Focus on server maintenance and management
Build and run applications without thinking about servers
Manually scale cloud resources
Q100
Q100 Which AWS service is a managed NoSQL database?
Amazon RDS
Amazon S3
Amazon EC2
Amazon DynamoDB
Q101
Q101 To automate the deployment of applications in a scalable and secure manner, you would use:
Kubernetes
Docker
VirtualBox
VMware
Q102
Q102 If a virtual machine (VM) is not starting, the first thing to check should be:
The VM's physical hardware compatibility
The network connection speed
The configuration settings of the VM
The color depth of the VM's monitor
Q103
Q103 A cloud application is experiencing intermittent connectivity issues. To diagnose, you should check:
The application's codebase for errors
The cloud service provider's status page for outages
The color settings of the application
The font size used in the application
Q104
Q104 When deploying a new service in a containerized environment fails, a potential cause could be:
Incompatible container image versions
Incorrect user privileges set on the host machine
Both options are potential causes
The container's color scheme
Q105
Q105 Which of the following best describes a firewall?
A physical device that cools down the server
A software tool to manage data storage
A security system that controls the incoming and outgoing network traffic based on predetermined security rules
A protocol for secure file transfer
Q106
Q106 In the context of security, what is encryption?
The process of converting plaintext into a secure format to prevent unauthorized access
The process of removing viruses from a computer
The act of physically securing computing devices
The practice of safe web browsing
Q107
Q107 What is a Denial of Service (DoS) attack?
An attack that prevents users from accessing a particular website by overwhelming it with traffic
A virus that deletes files from the infected computer
A phishing attempt to steal personal information
An exploit in software code
Q108
Q108 What is the principle of least privilege?
Granting users the maximum permissions available
Granting users only the permissions they need to perform their tasks
A method of password protection
A firewall configuration technique
Q109
Q109 What distinguishes a ransomware attack from other forms of malware?
It spreads across networks autonomously
It encrypts files on the victim's system and demands payment for decryption keys
It is undetectable by antivirus software
It can operate without an internet connection
Q110
Q110 What is a zero-day exploit?
A vulnerability that has been known for less than 24 hours
A vulnerability that affects zero devices
An exploit that takes advantage of a previously unknown vulnerability in software
A bug that can be fixed in zero days
Q111
Q111 In cybersecurity, what is social engineering?
The process of building secure networks
The technical method of breaking encryption codes
The use of deception to manipulate individuals into divulging confidential or personal information
The study of computing in society
Q112
Q112 Which mechanism is primarily used in intrusion detection systems (IDS) to identify potential security breaches?
Signature-based detection
Machine learning algorithms
Password strength meters
Firewall rules
Q113
Q113 To securely hash passwords in a Python application, which module provides robust methods for this purpose?
hashlib
crypt
ssl
os
Q114
Q114 Which HTTPS status code indicates that the requested resource is available only through a proxy and the proxy must be provided?
305 Use Proxy
404 Not Found
502 Bad Gateway
403 Forbidden
Q115
Q115 When debugging a web application for security flaws, what tool can help identify vulnerabilities like SQL injection?
A web framework debugger
A static code analyzer
A packet sniffer
A browser's developer console
Q116
Q116 To mitigate an identified SQL injection vulnerability in a web application, you should:
Remove all forms from the application
Use simple quotes to enclose all SQL strings
Validate and sanitize all user inputs
Increase the database's storage capacity
Q117
Q117 What approach can be taken to secure a system after detecting unauthorized access through a network service?
Disabling the network service and applying necessary patches or updates
Increasing the bandwidth of the network
Changing the network service's port number
Using stronger network cables
Q118
Q118 What is a key feature of distributed systems?
Centralized management
Scalability and concurrency
Single-point failure
Manual synchronization
Q119
Q119 How are consistency models important in distributed systems?
They dictate the system's power consumption
They outline data storage and retrieval rules
They control the user interface design
They manage network traffic
Q120
Q120 What does the CAP theorem address?
CPU usage and performance
Network setup and latency
Trade-offs between consistency, availability, and partition tolerance
Data encryption standards