UPDATED ACTUAL Exam Questions and
CORRECT Answers
In which scenario is Dynamic RAM (DRAM) typically used?
High-performance computing applications
Embedded systems with limited power
Servers and workstations
Cache memory in CPU - CORRECT ANSWER - Embedded systems with limited power
In Python, what package is primarily used for internal regression testing purposes?
unittest
pytest
nose
test - CORRECT ANSWER - test
What type of system is characterized by small hand-held devices like phones and tablets, often
containing non-magnetic storage media, and dominates with 70% market share for Android and
28% for iOS?
Barebones Computer System
Real-time systems
Mobile device systems
Distributed systems - CORRECT ANSWER - Mobile device systems
You find a script intercepting communication between a user and a website to steal sensitive
information. What type of cyberattack is this?
Cross-Site Scripting (XSS)
SQL Injection
Man-in-the-Middle (MitM)
, Denial of Service (DoS) - CORRECT ANSWER - Man-in-the-Middle (MitM)
What is the primary objective of an attacker exploiting a cross-site scripting vulnerability?
Access user's data
Gain administrative privileges
Execute arbitrary code on the server
Launch denial of service attacks - CORRECT ANSWER - Access user's data
Which term describes motherboards with expansion slots positioned at a 90-degree angle to the
CPU, facilitating improved cooling performance and airflow within the case?
Lateral motherboards
Horizontal motherboards
Vertical motherboards
Parallel motherboards - CORRECT ANSWER - Vertical motherboards
What is the main purpose of a logic bomb?
To steal sensitive information from a computer system
To trigger a malicious action based on a specific event or condition
To display annoying advertisements on a computer screen
To display annoying advertisements on a computer screen - CORRECT ANSWER - To
trigger a malicious action based on a specific event or condition
What is the term for a computer virus that spreads by attaching itself to executable files?
Worm
Trojan horse
Boot sector virus
File infector virus - CORRECT ANSWER - File infector virus