RPA
AI
General IT
Cyber
Cloud
100

How does RPA differ from Business Process Automation (BPA)?

RPA automates individual, repetitive tasks with software bots, while BPA focuses on optimizing entire business processes end-to-end, sometimes involving human interaction.

100

Which AI concept refers to systems that learn without any supervision, dynamically adjusting based on new data inputs?

Reinforcement Learning

100

What does RAID stand for, and what is its purpose in data storage?

Redundant Array of Independent Disks; RAID is used to increase data redundancy or performance by combining multiple physical disks into one logical unit.

100

What is the difference between phishing and spear-phishing?

Phishing targets a broad audience with generic bait, while spear-phishing targets a specific individual or organization with personalized, more convincing bait.

100

What is the difference between vertical scaling and horizontal scaling in cloud environments?

ertical scaling (scaling up) adds more resources to a single server, while horizontal scaling (scaling out) adds more servers to distribute the load.

200

Which type of RPA bot would you use to automate a process that relies on scraping data from legacy systems that do not have APIs?

Screen scraping bots, which interact with the user interface to gather data when APIs are unavailable.

200

What is "overfitting," and how can it be prevented in machine learning models?

Overfitting happens when a model learns the noise and details in training data to the extent that it negatively impacts performance on unseen data.

200

What is "shadow IT," and why is it a concern for organizations?

Shadow IT refers to IT systems or solutions used within an organization without official approval, potentially leading to security risks and compliance issues.

200

Explain the concept of multi-factor authentication (MFA).

MFA requires users to provide two or more verification factors to gain access to an account or system, improving security by combining something they know (password), something they have (token), and something they are (biometrics).

200

What is a cloud-native application, and how is it different from a traditional application?

Cloud-native applications are designed to run in cloud environments, often using microservices and containerization, whereas traditional applications are typically monolithic and designed for on-premise environments.

300

What is the difference between "front-office" and "back-office" RPA?

Front-office RPA involves automating customer-facing processes, often attended by employees (e.g., call centers), while back-office RPA automates processes like invoicing and data entry without user involvement.

300

Explain the difference between "transfer learning" and "multitask learning" in AI.

Transfer learning reuses a pre-trained model on a new task, while multitask learning trains a single model to handle multiple tasks simultaneously.

300

What is the purpose of a VLAN in networking, and how does it improve network performance?

A Virtual Local Area Network (VLAN) segments a physical network into smaller logical networks, improving performance by reducing broadcast domains and enhancing security.

300

What is the purpose of encryption in cybersecurity, and how does it differ from hashing?

Encryption protects data by encoding it so that only authorized parties can decode it, while hashing transforms data into a fixed-length string, primarily for integrity verification.

300

Explain the concept of serverless computing and provide an example of a serverless service.

Serverless computing allows developers to run code without provisioning or managing servers. An example is AWS Lambda, where code runs in response to events and scales automatically.

400

What are "replay-ability" and "reusability" in RPA development?

Replay-ability refers to the ability to rerun a bot with different inputs without modification, while reusability refers to creating modular workflows that can be reused across different automation processes.

400

What are GANs (Generative Adversarial Networks), and what is their primary use?

GANs are a class of machine learning frameworks where two neural networks compete against each other to generate new data instances resembling training data, often used for image generation.

400

What is the difference between symmetric and asymmetric encryption?

Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public and private key pair.

400

What is the difference between an IDS and an IPS?

An Intrusion Detection System (IDS) monitors traffic and alerts on suspicious activity, while an Intrusion Prevention System (IPS) actively blocks malicious traffic.

400

What are the main advantages of using Infrastructure as Code (IaC) in cloud computing?

IaC allows infrastructure to be defined and managed through code, ensuring consistency, automating deployments, enabling version control, and reducing manual errors.

500

What is the future of RPA with hyperautomation, and how does it transform traditional automation?

Hyperautomation combines RPA with AI, machine learning, and advanced analytics to automate more complex, end-to-end processes, continuously learning and optimizing the workflow beyond traditional rule-based automation.

500

Which machine learning technique is used for dimensionality reduction to handle large datasets with many features?

Principal Component Analysis (PCA)

500

What is the difference between a hypervisor Type 1 and Type 2 in virtualization?

Type 1 runs directly on the hardware (bare metal), while Type 2 runs on top of a host operating system.

500

Explain the difference between a DDoS attack and a DoS attack.  

A Denial of Service (DoS) attack involves overwhelming a single system to make it unavailable, while a Distributed Denial of Service (DDoS) attack uses multiple systems (often a botnet) to flood a target, making it harder to defend.  

500

What is "cloud bursting," and how can it be used to optimize resource utilization?

Cloud bursting allows an application to "burst" into a public cloud to handle peak demand when on-premise resources are insufficient, optimizing cost and resource efficiency.

M
e
n
u