A) Design automation solutions to improve business processes B) Manage network traffic C) Build and deploy cloud infrastructures D) Write technical documentation
Correct Answer: A) Design automation solutions to improve business processes
Explanation: An automation architect designs solutions that automate business processes, reducing manual effort and improving efficiency.
Question 42
What does a security analyst primarily focus on?
A) Database management B) Web design C) Monitoring network security and detecting breaches D) Software development
Correct Answer: C) Monitoring network security and detecting breaches
Explanation: A security analyst focuses on monitoring network security, identifying vulnerabilities, and detecting potential breaches.
Question 43
Which type of cloud computing model provides infrastructure resources such as virtual servers and storage?
A) SaaS B) PaaS C) IaaS D) DaaS
Correct Answer: C) IaaS
Explanation: Infrastructure as a Service (IaaS) provides virtualized computing resources such as servers, storage, and networking infrastructure over the cloud.
Question 44
Which of the following describes a relational database’s “foreign key”?
A) A key used to encrypt data B) A unique identifier for each record C) A field that links one table to another D) A temporary placeholder for values
Correct Answer: C) A field that links one table to another
Explanation: A foreign key is a field in a relational database table that links records to another table, establishing a relationship between the two tables.
Question 45
What is a characteristic of a compiled programming language?
A) Translates code line-by-line B) Allows real-time debugging C) Translates the entire program at once D) Requires no translation for execution
Correct Answer: C) Translates the entire program at once
Explanation: A compiled programming language translates the entire source code into machine code before execution.
Question 46
Which project management risk can result from adding unnecessary features to a project?
A) Risk Transference B) Scope Creep C) Risk Avoidance D) Risk Mitigation
Correct Answer: B) Scope Creep
Explanation: Scope creep refers to the addition of unnecessary features or changes to a project, which can affect the project's timeline and budget.
Question 47
Which type of network topology has each device directly connected to every other device in the network?
A) Star B) Bus C) Ring D) Mesh
Correct Answer: D) Mesh
Explanation: In a mesh topology, every device is directly connected to every other device, providing high redundancy and reliability.
Question 48
Which programming concept involves creating functions or objects to be reused across different parts of an application?
A) Recursion B) Encapsulation C) Inheritance D) Modularity
Correct Answer: D) Modularity
Explanation: Modularity refers to breaking down a program into separate functions or objects that can be reused and maintained independently.
Question 49
Which technology allows for multiple operating systems to run on the same physical machine?
A) Virtual Machine B) LAN C) DNS D) VPN
Correct Answer: A) Virtual Machine
Explanation: A virtual machine (VM) allows multiple operating systems to run on the same physical hardware by simulating separate environments.
Question 50
Which software development methodology emphasizes iterative development and rapid prototyping?
A) Waterfall B) Agile C) DevOps D) V-Model
Correct Answer: B) Agile
Explanation: Agile is a software development methodology