Digital Fluency ATTEMT 2

Digital Fluency ATTEMT 2

University

20 Qs

quiz-placeholder

Similar activities

LAUNDRY 1 SMK PURIWISATA

LAUNDRY 1 SMK PURIWISATA

1st Grade - University

20 Qs

Final Tes Teknologi Informasi

Final Tes Teknologi Informasi

University

15 Qs

ICT709 Convergence Technology

ICT709 Convergence Technology

University

20 Qs

Software Testing

Software Testing

University

19 Qs

Casting

Casting

University

20 Qs

Python Basic II

Python Basic II

11th Grade - University

20 Qs

QUIZ PRA PAS

QUIZ PRA PAS

University - Professional Development

20 Qs

Antenna and Wave Propagation

Antenna and Wave Propagation

University

20 Qs

Digital Fluency ATTEMT 2

Digital Fluency ATTEMT 2

Assessment

Quiz

Instructional Technology

University

Practice Problem

Medium

Created by

Chetan Badami

Used 23+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Cloud Computing offering enables users to develop, manage and deliver applications?

Infrastructure as a service (IaaS)

Platform as a service (PaaS)

Software as a service (SaaS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these attacks is a ‘Smurf attack’?

One where the attacker exploits the use of the buffer space during a Transmission Control Protocol session initialization handshake

One where the attack causes the length and fragmentation offset fields in sequential Internet Protocol (IP) packets to overlap one another on the attacked host

One where the attack involves use of IP spoofing and the ICMP to saturate a target network with traffic

One where the Botnets (millions of systems infected with malware) under hacker control carry out DDoS attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a shortcoming of the two traditional security methods, Risk Assessment and Identifying Vulnerabilities, and Correlation Rules?

False positives

Inability to deal with unique events

Slower incident response

Handle Zero-Day Attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The primary purpose of ________ is to scale the scope of data and to make predictions of unavailable, future or unseen data based on labeled sample data

Supervised Learning

Unsupervised Learning

Semi-supervised Learning

Reinforcement Learning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arrange the four stages of IoT Architecture in right order.

Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Edge IT, Data Center and Cloud

Sensors and Actuators, Data Center and Cloud, Internet Getaways and Data Acquisition Systems, Edge IT

Sensors and Actuators, Edge IT, Internet Getaways and Data Acquisition Systems, Data Center and Cloud

Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Data Center and Cloud, Edge IT

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ allows networks to adjust their hidden layers of neurons in situations where the expected outcome is not achieved.

Backpropagation

Feed Forward Neural Network

Recurrent Neural Network

Convolutional Neural Network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ uses the classification process to identify data assets and clustering to group data into distinct parts.

Supervised Learning

Unsupervised Learning

Semi-supervised Learning

Reinforcement Learning

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?