1.
What technology allows devices to communicate and share data without human intervention, based on predefined rules?
2.
In a network with a subnet mask of 255.255.255.192, how many subnets and hosts per subnet are possible?
3.
What is the primary purpose of GDPR (General Data Protection Regulation)?
4.
What does the term "net neutrality" refer to in the context of internet governance?
5.
Which of the following is a primary function of a Virtual Private Network (VPN) in an organization?
6.
What is the primary purpose of an ICT Steering Committee within an organization?
7.
What is the term for a malicious software that blocks access to a computer system until a sum of money is paid?
8.
What is the purpose of a Disaster Recovery Plan (DRP) in an ICT infrastructure?
9.
What does RAID stand for in the context of data storage?
10.
What is the term for a computing system that mimics the functioning of the human brain to process information?
11.
Which practice involves protecting sensitive information by converting it into unreadable code?
12.
Which leadership style involves leaders who encourage participation and input from team members in decision-making processes?
13.
Which security measure verifies a user's identity by requesting multiple forms of authentication?
14.
Which project management methodology involves breaking tasks into small, manageable parts that can be completed in short cycles?
15.
What does the term "phishing" refer to in the context of cybersecurity?
16.
In a project team, what role is responsible for ensuring the project remains on schedule and within budget?
17.
Which type of database model organizes data into tables that can be linked based on common fields?
18.
What does the term "Big Data" refer to in the context of information technology?
19.
What ethical principle emphasizes respecting the rights of individuals and maintaining confidentiality in handling sensitive data?