ADistribute data across multiple servers to improve scalability
BCreate backups of databases
CEncrypt sensitive data
DPerform real-time analytics
Correct Answer:
A. Distribute data across multiple servers to improve scalability
Explanation:
Sharding partitions data based on a key (e.g., user ID) across servers. This horizontal scaling improves performance and handles large datasets efficiently.
In AI/ML, what does a neural network's activation function do?
AIntroduce non-linearity to enable learning complex patterns
BNormalize input data
CCalculate loss function
DPerform data augmentation
Correct Answer:
A. Introduce non-linearity to enable learning complex patterns
Explanation:
Activation functions (ReLU, Sigmoid, Tanh) add non-linearity, allowing neural networks to learn non-linear relationships. Without them, networks become linear classifiers.
Which of the following best describes microservices architecture?
ABreaking applications into small, independently deployable services
BRunning entire application as single monolith
CStoring all data in one centralized database
DUsing multiple programming languages is forbidden
Correct Answer:
A. Breaking applications into small, independently deployable services
Explanation:
Microservices decompose applications into loosely-coupled, independently deployable services. This enables scalability, flexibility, and technology diversity.
What is the purpose of connection pooling in database management?
AReuse database connections to reduce overhead and improve performance
BEncrypt all database communications
CBackup database at regular intervals
DMonitor database queries in real-time
Correct Answer:
A. Reuse database connections to reduce overhead and improve performance
Explanation:
Connection pooling maintains a pool of reusable connections, reducing the cost of opening/closing connections repeatedly. This significantly improves application performance.
In cybersecurity, what is a zero-day vulnerability?
AA security flaw unknown to vendors with no patch available
BA vulnerability found on the first day of software release
CA virus that activates at midnight
DA type of brute-force attack
Correct Answer:
A. A security flaw unknown to vendors with no patch available
Explanation:
Zero-day vulnerabilities are previously unknown exploits with no patch. They're extremely dangerous because users have no defense until vendors develop and release fixes.
Correct Answer:
A. Basically Available, Soft state, Eventually consistent
Explanation:
BASE is an alternative to ACID, prioritizing availability and partition tolerance. It accepts temporary inconsistencies that resolve eventually (eventual consistency).
In cloud security, what is the principle of least privilege?
AGrant users only minimum permissions necessary to perform tasks
BGive all users administrator access for efficiency
CDisable security features for better performance
DUse the weakest encryption available
Correct Answer:
A. Grant users only minimum permissions necessary to perform tasks
Explanation:
Least privilege minimizes security risk by restricting access. Users get only permissions needed for their role, reducing damage from compromised accounts.