Search Header Logo

Digital Fluency ATTEMT 2

Authored by Chetan Badami

Instructional Technology

University

Used 23+ times

Digital Fluency ATTEMT 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Cloud Computing offering enables users to develop, manage and deliver applications?

Infrastructure as a service (IaaS)

Platform as a service (PaaS)

Software as a service (SaaS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these attacks is a ‘Smurf attack’?

One where the attacker exploits the use of the buffer space during a Transmission Control Protocol session initialization handshake

One where the attack causes the length and fragmentation offset fields in sequential Internet Protocol (IP) packets to overlap one another on the attacked host

One where the attack involves use of IP spoofing and the ICMP to saturate a target network with traffic

One where the Botnets (millions of systems infected with malware) under hacker control carry out DDoS attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a shortcoming of the two traditional security methods, Risk Assessment and Identifying Vulnerabilities, and Correlation Rules?

False positives

Inability to deal with unique events

Slower incident response

Handle Zero-Day Attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The primary purpose of ________ is to scale the scope of data and to make predictions of unavailable, future or unseen data based on labeled sample data

Supervised Learning

Unsupervised Learning

Semi-supervised Learning

Reinforcement Learning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arrange the four stages of IoT Architecture in right order.

Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Edge IT, Data Center and Cloud

Sensors and Actuators, Data Center and Cloud, Internet Getaways and Data Acquisition Systems, Edge IT

Sensors and Actuators, Edge IT, Internet Getaways and Data Acquisition Systems, Data Center and Cloud

Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Data Center and Cloud, Edge IT

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ allows networks to adjust their hidden layers of neurons in situations where the expected outcome is not achieved.

Backpropagation

Feed Forward Neural Network

Recurrent Neural Network

Convolutional Neural Network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ uses the classification process to identify data assets and clustering to group data into distinct parts.

Supervised Learning

Unsupervised Learning

Semi-supervised Learning

Reinforcement Learning

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?