IT Questions and Answers :)

Wednesday, November 29, 2017

In PHP scripting, which expression will output $somestring to the browser, only if it contains a colon?

In PHP scripting, which expression will output $somestring to the browser, only if it contains a colon?


  • if (strpos($somestring,":")!==false) echo $somestring ;
  • if (strpos($somestring,":")==true) echo $somestring ;
  • if (strpos($somestring,":")!=false) echo $somestring ;
  • if (strpos($somestring,":")=true) echo $somestring ;             
In PHP scripting, which expression will output $somestring to the browser, only if it contains a colon?


EXPLANATION

The correct test is "!==false"
The strpos() function finds the position of the first occurrence of a string inside another string. In this example, it looks for the numeric position of the first occurrence of a colon if one is present, or a boolean false value if none is found.
PHP strings are zero-indexed, so a string starting with colon (:) will return a numeric zero from strpos(). However, as in most scripting languages, the variables are not strongly typed, zero and false being equivalent in logic tests.
Thus, a string starting with a colon would cause the zero output of strpos() to be interpreted as 'Not found' and nothing would be output to the browser.
The workaround is to use a literal boolean test, which is expressed with '===' or '!==' for equality or inequality as appropriate.
The '===' test cannot be used here, because a colon's presence is returned as an integer value, which is not literally a boolean value. Thus doing so would result in no output, ever. (False or an integer are never literally equal to true.)
The correct approach is therefore to ask, 'Is the value returned by strpos() NOT LITERALLY a BOOLEAN FALSE' -which yields true for colon present anywhere including first character, false for no colon. (Also false for a null string)
Incidentally, BASIC-like languages index strings from one, so the issue does not arise. Javascript indexes strings from zero, but search functions typically return -1 as the 'not found' response.
The lowdown:
if (strpos($somestring,":")!==false) echo $somestring ; // Yay! It worked. :)
if (strpos($somestring,":")=true) echo $somestring ;     // This is a syntax error.
if (strpos($somestring,":")===true) echo $somestring ; // Never outputs anything.
if (strpos($somestring,":")!=false) echo $somestring ;   // Fails if the colon is first char, otherwise works.
if (strpos($somestring,":")==true) echo $somestring ;   // Fails if the colon is first char, otherwise works.
Share:

In a Windows domain, using built in domain features, how can you easily stop malicious software/viruses/cryptolocker from running from the downloads folder, or temporary internet files?

In a Windows domain, using built in domain features, how can you easily stop malicious software/viruses/cryptolocker from running from the downloads folder, or temporary internet files?

  • Advanced Windows Firewall Settings
  • Fancy Antivirus Software
  • Train your users to be more careful
  • Apply a Software Restriction Policy GPO 
 
In a Windows domain, using built in domain features, how can you easily stop malicious software/viruses/cryptolocker from running from the downloads folder, or temporary internet files?

EXPLANATION

Using a software restriction Policy you can create a whitelist or blacklist policy of locations that software is allowed to launch from. This included applications, scripts and so on. You can easily block software from launching from anywhere within a users profile, including the downloads folder. If you want to get into the advanced settings, you can blacklist ALL software and provide a while list of hashes for applications on your domain. SRP is extremely powerful, and very user friendly to configure. It is a valuable tool to use in keeping your network safe.

SOURCE

https://technet.microsoft.com/en-us/library/cc786941(v=ws.10).aspx
Share:

Tuesday, November 28, 2017

How many channels are in a full T1 PRI trunk?

How many channels are in a full T1 PRI trunk?

  • 23
  • 6
  • 24
  • 32 

 

How many channels are in a full T1 PRI trunk?

 

EXPLANATION

T1 connections have 24 channels in total.

Typically, for T1 ISDN (CCS) protocols, 23 channels are used as B-channels and 1 channel is used as a D-channel. For this reason, the frame structure of a T1 PRI connection is said to be 23B+1D where the D-channel is located on timeslot 23 (channels numbered from 0 to 23) and the remaining channels are used as B-channels. Hence;
If you had an E1 PRI trunk, you would have 30 B channels and 2 D channels.

SOURCE

https://en.wikipedia.org/wiki/Primary_Rate_Interface
Share:

Friday, November 24, 2017

What is the minimum size of the IPv6 packet header?

What is the minimum size of the IPv6 packet header?


  • 40 octets
  • 36 octets
  • 32 octets
  • 48 octets             
What is the minimum size of the IPv6 packet header?

EXPLANATION

The IPv6 packet header has a minimum size of 40 octets. Options are implemented as extensions. This provides the opportunity to extend the protocol in the future without affecting the core packet structure.
RFC 2460; Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden (December 1998)
https://en.wikipedia.org/wiki/IPv6
Share:

Many mobile devices use what to measure the pitch, roll, and yaw of the device?

Many mobile devices use what to measure the pitch, roll, and yaw of the device?

  • Piezometer
  • Barometer
  • Transducer
  • Gyroscope
Many mobile devices use what to measure the pitch, roll, and yaw of the device?

EXPLANATION

Many mobile devices include a gyroscope to add an extra dimension to the information supplied by the accelerometer. The gyroscope tracks rotation or twist, measuring the angular rotational velocity. This helps your device orient itself in space.
Share:

Thursday, November 23, 2017

Which of the following domain trust types does not extend beyond the trusted and trusting domains?

Which of the following domain trust types does not extend beyond the trusted and trusting domains?


  • Shortcut
  • Forest
  • Internet
  • External             
Which of the following domain trust types does not extend beyond the trusted and trusting domains?

EXPLANATION

An external trust provides access to resources located on an NT4 domain or a domain in a non-trusted forest. It is not transitive.
Forest trusts provide access to resources in any domain in the forest. Forest trusts are transitive.
Shortcut trusts are used to improve user login times between two domain in a forest. These trusts are also transitive.
Internet trusts do not exist

SOURCE

https://technet.microsoft.com/en-us/library/cc730798(v=ws.11).aspx
Share:

A static virtual local area network (VLAN) assigns VLANs to which of the following?

A static virtual local area network (VLAN) assigns VLANs to which of the following?

  • Trunks
  • Physical ports
  • IP addresses
  • MAC addresses 

 
A static virtual local area network (VLAN) assigns VLANs to which of the following?

EXPLANATION

Static VLANs assign VLANs to physical ports. Assigning each port to a VLAN means that whatever computer plugs into that port, it will always be a member of that port's VLAN.
Dynamic VLANs assign VLANs based on MAC addresses

Share:

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

  • 500 feet
  • 200 meters
  • 100 meters
  • 100 feet 

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

EXPLANATION

The maximum length for a cable segment is 100 meters. If longer runs are required, the use of active hardware such as a repeater or network switch is necessary.
https://en.wikipedia.org/wiki/Category_5_cable
Share:

On Windows, what is the MMC.exe?

On Windows, what is the MMC.exe?

  • Microsoft Management Console
  • Microsoft Managed Console
  • Microsoft Management Control
  • Microsoft Managed Control 

 
On Windows, what is the MMC.exe?

EXPLANATION

MMC.exe is the Microsoft Management Console application and is used to display various management plug-ins accessed from the Control Panel, such as the Device Manager.

Share:

In MS Exchange, which of the following is NOT an Exchange Recipient type?

In MS Exchange, which of the following is NOT an Exchange Recipient type?

  • Distribution mailbox
  • Room mailbox
  • Legacy mailbox
  • User mailbox 
In MS Exchange, which of the following is NOT an Exchange Recipient type?

 

EXPLANATION

The following are all Exchange Recipient types in MS Exchange.
User mailbox: This mailbox is created for an individual user to store mails, calendar items, contacts, tasks, documents, and other business data.

Linked mailbox: This mailbox is created for an individual user in a separate, trusted forest. For example AD account is created in A.COM and Mailbox is created in B.COM Exchange Server.

Shared mailbox: This mailbox is not primarily associated with a single user and is generally configured to allow logon access for multiple users.

Legacy mailbox: This mailbox is resides on a server running Exchange Server 2003 or Exchange 2000 Server. See here: https://support.microsoft.com/en-us/help/931747/a-mailbox-that-is-located-on-an-exchange-server-2007...

Room mailbox: This mailbox is created for a meeting location, such as a meeting or conference room, auditorium, or training room. When we create this mailbox, by default a disabled user object account is created.

Equipment mailbox: A resource mailbox is created for a non-location specific resource, such as a portable computer projector, microphone, or a company car. When we create this mailbox, by default a disabled user object account is created. Equipment mailboxes provide a simple and efficient way for users to use resources in manageable way.

SOURCE

https://technet.microsoft.com/en-us/library/bb201680(v=exchg.150).aspx
Share:

What was the Java programming language originally named?

What was the Java programming language originally named?

  • Oak
  • Green
  • Mocha
  • Blue 
What was the Java programming language originally named?

 

EXPLANATION

"The language was initially called Oak after an oak tree that stood outside Gosling's office. Later the project went by the name Green and was finally renamed Java, from Java coffee."

Related: History of programming languages:

SOURCE

http://www.javaworld.com/article/2077265/core-java/so-why-did-they-decide-to-call-it-java-.html
Share:

Which of the following is not a primary biometric authentication?

Which of the following is not a primary biometric authentication?

  • Body scanner
  • Voice
  • Fingerprint
  • Iris pattern 
Which of the following is not a primary biometric authentication?

 

EXPLANATION

Body scanners are soft biometrics. Soft biometrics traits are physical, behavioral or human characteristics that have been derived from the way human beings normally distinguish their peers (such as height, gender, and hair color). They are used to complement the identity information provided by the primary biometric identifiers .
https://en.wikipedia.org/wiki/Biometrics#Soft_biometrics 

Share:

In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

  • Virtual LAN
  • Virtual Network
  • Virtual switch
  • Virtual PBX 
In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

 

EXPLANATION

Hypervisors come with virtual switching capabilities, which enable the VMs to communicate without going outside of the host system. Depending on your hypervisor, this virtual switch can do everything you'd expect from a typical managed Layer 2 switch.

SOURCE

http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/
Share:

Which of the following NoSQL databases is considered a document database?

Which of the following NoSQL databases is considered a document database?

  • Cassandra
  • Druid
  • MongoDB
  • HBase 

 
Which of the following NoSQL databases is considered a document database?

EXPLANATION

A NoSQL (originally referring to "non SQL" or "non relational") database provides a mechanism for storing and retrieving data which is modeled in means other than the tabular relations used in relational databases. MongoDB is document-oriented database, or document store, designed for storing, retrieving, and managing semi-structured data.. Cassandra, Druid, and HBase are column databases, a NoSQL object of the lowest level in a keyspace. It is a tuple consisting of three elements: unique name, value, and timestamp.

Share:

What is the decimal answer to the binary equation 10111110 + 01001101?

What is the decimal answer to the binary equation 10111110 + 01001101?

  • 247
  • 269
  • 198
  • 267 

 
What is the decimal answer to the binary equation 10111110 + 01001101?

EXPLANATION

190 + 77 = 267
For additional information on binary numbers: https://en.wikipedia.org/wiki/Binary_number
For how to convert binary numbers: http://www.wikihow.com/Convert-from-Decimal-to-Binary
 
Share:

What "bit" architecture did the Intel 8086 use?

What "bit" architecture did the Intel 8086 use?

  • 16
  • 32
  • 4

 
What "bit" architecture did the Intel 8086 use?

EXPLANATION

Intel 8086 microprocessor is a first member of x86 family of processors. Advertised as a "source-code compatible" with Intel 8080 and the Intel 8085 processors, the 8086 was not object code compatible with them. The 8086 has complete 16-bit architecture - 16-bit internal registers, 16-bit data bus, and 20-bit address bus (1 MB of physical memory). Because the processor has 16-bit index registers and memory pointers, it can effectively address only 64 KB of memory. To address memory beyond 64 KB the CPU uses segment registers - these registers specify memory locations for code, stack, data and extra data 64 KB segments. The segments can be positioned anywhere in memory, and, if necessary, user programs can change their position. This addressing method has one big advantage - it is very easy to write memory-independent code when the size of code, stack and data is smaller than 64 KB each. The complexity of the code and programming increases, sometimes significantly, when the size of stack, data and/code is larger than 64 KB. To support different variations of this awkward memory addressing scheme many 8086 compilers included 6 different memory models: tiny, small, compact, medium, large and huge. 64 KB direct addressing limitation was eliminated with the introduction of the 32-bit protected mode in intel 80386 Processor
Share:

You want to change your email from your current hosting provider to Google Apps. What should you do to ensure the change does not take more than an hour?

You want to change your email from your current hosting provider to Google Apps. What should you do to ensure the change does not take more than an hour?

  • Change the MX record to the ones provided by Google
  • Change your NS records to Google IP address
  • Create a new A record
  • Check and lower the TTL 

 
You want to change your email from your current hosting provider to Google Apps. What should you do to ensure the change does not take more than an hour?

EXPLANATION

It's always a very good idea to check and lower the Time-To-Live (TTL) for a domain to ensure that any changes made are propagated in a short time frame and your customers and boss remain happy. NOTE: TTL is normally specified in seconds, you need to divide by 60 to get minutes.
https://mediatemple.net/community/products/dv/204644120/understanding-ttl-(time-to-live)
In the end you will need to change the MX record, but changing the MX record does not change how quickly the change will happen.

 
Share:

When it comes to email, what is Postfix?

When it comes to email, what is Postfix?

  • A mail user agent
  • Paid software
  • A mail submission agent
  • A mail transfer agent 
When it comes to email, what is Postfix?

 

EXPLANATION

Postfix is a mail transfer agent (MTA), which handle the long-haul delivery of the mail to other MTAs. Postfix supports LDAP, SMTP AUTH (SASL), TLS, and running in a chroot environment.
 
Share:

Grandfather-Father-Son (GFS) is a(n):

Grandfather-Father-Son (GFS) is a(n):

  • Hierarchical UML design pattern
  • Common backup media rotation strategy
  • Inheritance design standard in object-oriented programming
  • Layered SDN (software defined networking) design standard 

 
Grandfather-Father-Son (GFS) is a(n):

EXPLANATION

Grandfather-Father-Son is a common backup media rotation strategy. It employs a daily-weekly-monthly approach that addresses near-term and long-term (archival) backup concerns.
https://www.sans.org/reading-room/whitepapers/sysadmin/backup-rotations-final-defense-305
Share:

If you’re looking to display all files in a given directory and all its sub-directories, including hidden files, which of the following Linux command would you use?

If you’re looking to display all files in a given directory and all its sub-directories, including hidden files, which of the following Linux command would you use?

  • ls -aR
  • ls -l
  • ls-a
  • ls -R 

 
If you’re looking to display all files in a given directory and all its sub-directories, including hidden files, which of the following Linux command would you use?

EXPLANATION

The Bash command "ls" lists all information about a given file. In this case, it’s modified by "-aR" to maintain groups of files as a single archive file, which displays everything in a given file. By itself, this command will show you everything on your hard disk (and we mean everything).

SOURCE

http://linuxcommand.org/lc3_man_pages/ls1.html
Share:

Which of the following is an IPV6 automatic tunneling protocol used by Windows on systems located behind a NAT router?

Which of the following is an IPV6 automatic tunneling protocol used by Windows on systems located behind a NAT router?

  • APIPA
  • ISATAP
  • 6to4
  • Teredo
 
Which of the following is an IPV6 automatic tunneling protocol used by Windows on systems located behind a NAT router?

EXPLANATION

Teredo is a mechanism that enables devices behind non-IPv6 NAT routers to function as tunnel endpoints.
For more information on Teredo, see: https://en.wikipedia.org/wiki/Teredo_tunneling
 
Share:

Which of the following is FALSE about DDR2 and DDR3 RAM?

Which of the following is FALSE about DDR2 and DDR3 RAM?

  • DDR3 uses less power than DDR2
  • DDR3 has fewer pins than DDR2
  • DDR3 is not backwards compatible with DDR2
  • DDR3 is faster than DDR2 

 
Which of the following is FALSE about DDR2 and DDR3 RAM?

EXPLANATION

DDR3 is the successor to DDR2 memory technology. There are several differences between them. DDR3 is not backwards compatible with DDR2. While both types of modules have the same numbers of pins, the notches in the PCB are in different locations. In other words, a DDR3 module cannot be placed in a DDR2 memory socket, and vice-versa.
DDR3 modules run on 1.5V compared to the 1.8V that DDR2 modules require. The DDR3 decrease in voltage results in less power consumption and greater energy-efficiency at comparable speeds.
DDR3 is faster. DDR2 "JEDEC standard" memory typically stops at around 800MHz whereas the introductory speeds of DDR3 when it was released in 2007 started at 800MHz and is far faster than that now.

Share:

What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

  • Protocol manipulation
  • Cross-site scripting
  • Sniffing
  • Spoofing 
What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

 EXPLANATION

A cross-site scripting attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party.

SOURCE

https://en.wikipedia.org/wiki/Cross-site_scripting
Share:

Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

  • Up to 25.5 W
  • Up to 31.41592 W
  • > 9000 mW
  • 1.21 GW 

 
Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

EXPLANATION

The updated IEEE 802.3at-2009[7] PoE standard also known as PoE+ or PoE plus, provides up to 25.5 W of power.
https://en.wikipedia.org/wiki/Power_over_Ethernet
Share:

Which of the following is not a part of 3-2-1 backup strategy?

Which of the following is not a part of 3-2-1 backup strategy?

  • Different vendor
  • Different copy
  • Different location
  • Different media 

 

EXPLANATION

The 3-2-1 backup strategy, also known as the Rule of Three, says that you should have at least 3 different copies of the data on at least 2 different types of media in at least 1 different location.

Share:

In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

  • msAssistantExch
  • msExchAssistantName
  • msExchAssistant
  • ExchAssistantName 

 
In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

EXPLANATION

This attribute in Active Directory is usually set using ADSIEdit. There are ways to set this programmatically using C# and PowerShell. This attribute sets the assistant's name in the GAL which allows for identifying a PA / Secretary for a (usually) senior member of staff in an organisation

See: https://msdn.microsoft.com/en-us/library/ms677841(v=vs.85).aspx

Share:

Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

  • [a-zA-Z]
  • [a-zA-Z0-9]
  • [a-zA-Z_]
  • [a-zA-Z0-9_] 

 
Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

EXPLANATION

The "word" meta-character \w in RegEx will match the full alpha-numeric range, basically the full alphabet as well as number characters, and includes underscores.

Note that it matches more alphabet characters than the standard a through z: pretty much any alphabet character, such as 'ñ', also match.

http://www.w3schools.com/jsref/jsref_regexp_wordchar.asp 
Share:

In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

  • 10
  • 3
  • 2

 
In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

EXPLANATION

The correct answer is 2. While Event ID 4624 shows a successful logon, you need to look at the event code to see the specific nature of that logon. You’ll see type 2 logons when a user attempts to log on at the local keyboard and screen, whether with a domain account or a local account from the computer’s local SAM.  Code 10 is for remote access, code 3 is from the network (for things such as accessing shares), and code 5 is used when a service starts up. For more information, See the source

SOURCE

http://www.windowsecurity.com/articles-tutorials/misc_network_security/Logon-Types.html
Share:

Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

  • Admission tolerance control
  • Admission control
  • Fault tolerance
  • Startup control 

 
Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

EXPLANATION




vCenter Server uses Admission Control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. It can be set at the Host, Resource Pool, or Cluster Level (known as vSphere HA Admission Control). 
Read more here: https://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.vsphere.avail.doc_50%2FGUID-53F6938...

Share:

What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

  • 8GB
  • 16GB
  • 4GB
  • 32GB 

 What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

EXPLANATION

The maximum possible size for a file on a FAT32 volume is 4 GB minus 1 byte or 4,294,967,295 (232 − 1) bytes. This limit is a consequence of the file length entry in the directory table and would also affect huge FAT16 partitions with a sufficient sector size.[1] Large video files, DVD images and databases easily exceed this limit.
https://en.wikipedia.org/wiki/File_Allocation_Table
Share:

With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

  • MPLS
  • ICMP
  • PPP
  • LACP 

 
With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

EXPLANATION

MPLS is a scalable, protocol-independent transport. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol. The primary benefit is to eliminate dependence on a particular OSI model data link layer (layer 2) technology, such as Asynchronous Transfer Mode (ATM), Frame Relay, Synchronous Optical Networking (SONET) or Ethernet, and eliminate the need for multiple layer-2 networks to satisfy different types of traffic. MPLS belongs to the family of packet-switched networks.
MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.

SOURCE

http://it.toolbox.com/blogs/intruder-detection/mpls-and-the-osi-reference-model-where-does-mpls-fit-in-50920
Share:

What voltages should the two hot wires on a Molex connector read?

What voltages should the two hot wires on a Molex connector read?

  • Red = 5 V; Yellow = 3.3 V
  • Red = 5 V; Yellow = 12 V
  • Red - 12 V; Yellow = 5 V
  • Red = 3.3 V; Yellow = 5 V 

 
What voltages should the two hot wires on a Molex connector read?

EXPLANATION

A Molex connector's red wire should be at 5 volts. The yellow wire should be at 12 volts.

Share:

What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

  • Sh u
  • Tell router update config
  • Sh Tasks
  • fixup -t 

 
What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

EXPLANATION

The above console command allows on the fly restart of all services and processes in Lotus domino. Negating the requirement to even restart the hardware box.

Share:

Using VIM, what is the find\replace function for replacing the word 'hot' with 'cold' in an entire document?

Using VIM, what is the find\replace function for replacing the word 'hot' with 'cold' in an entire document?

  • :s/hot/cold/g
  • :%s/hot/cold/g
  • :qw! hot\cold
  • :w!/hot/cold%s 
Using VIM, what is the find\replace function for replacing the word 'hot' with 'cold' in an entire document?

 EXPLANATION

Vim provides the :s (substitute) command for search and replace.  The :substitute command searches for a text pattern, and replaces it with a text string. There are many options, but these are what you probably want:
:%s/foo/bar/g
Find each occurrence of 'foo' (in all lines), and replace it with 'bar'.
:s/foo/bar/g
Find each occurrence of 'foo' (in the current line only), and replace it with 'bar'.
:%s/foo/bar/gc
Change each 'foo' to 'bar', but ask for confirmation first.
:%s/\<foo\>/bar/gc
Change only whole words exactly matching 'foo' to 'bar'; ask for confirmation.

SOURCE

http://vim.wikia.com/wiki/Search_and_replace
Share:

In the Information Security Management Maturity Model (ISM3) what Specific Practice: Operational Management is OSP-17?

In the Information Security Management Maturity Model (ISM3) what Specific Practice: Operational Management is OSP-17?

  • Environment Hardening
  • Access Control
  • User Registration
  • Malware Protection Management 
In the Information Security Management Maturity Model (ISM3) what Specific Practice: Operational Management is OSP-17?

 

EXPLANATION

The Information Security Management Maturity Model (ISM3, or ISM-cubed) extends ISO9001 quality management principles to information security management (ISM) systems. Rather than focusing on controls, it focuses on the common processes of information security, which are shared to some extent by all organisations. (http://isms-guide.blogspot.com/2007/07/what-is-ism3.html)
OSP-17 is the Specific Practice: Operational Management (Specific Practices are the breakdown of the ISM3 systems) So this refers to the 17th Operational Management system.
Operational Management 17 - This is a set of security measures to provide protection against technical threats such as viruses, spyware, trojans, backdoors, keyloggers, rootkits and other unauthorized services.
Incidents relating to the infection of internal assets with Malware can be prevented and mitigated by an appropriate Malware protection process.

SOURCE

https://www.lean.org/FuseTalk/Forum/Attachments/ISM3_v2.00-HandBook.pdf
Share:

In Active Directory, you CANNOT link a group policy object (GPO) to which of the following?

In Active Directory, you CANNOT link a group policy object (GPO) to which of the following?

  • Site
  • Default container
  • OU
  • Domain 
In Active Directory, you CANNOT link a group policy object (GPO) to which of the following?

 

EXPLANATION

A Group Policy Object (GPO) is a collection of settings that define what a system will look like and how it will behave for a defined group of users. You can use the Group Policy Microsoft Management Console (MMC) to configure them. In the Group Policy Management Console (GPMC) console tree, you can link a GPO with the site, domain, or organizational unit (OU). You cannot link them to the default container.
Share:

Which of the following could you use while executing a PowerShell cmdlet to ignore errors?

Which of the following could you use while executing a PowerShell cmdlet to ignore errors?

  • -Action Errorignore
  • -ErrorAction Silentlycontinue
  • -Action Errorskip
  • -ErrorAction Stop 

 
Which of the following could you use while executing a PowerShell cmdlet to ignore errors?

EXPLANATION

If you want to ignore errors while executing a Powershell script, use -ErrorAction Silentlycontinue.
For more information please see the " ErrorAction parameter" section of: https://blogs.technet.microsoft.com/heyscriptingguy/2014/07/09/handling-errors-the-powershell-way/

Share:

Which of the following is NOT a daemon in Postfix?

Which of the following is NOT a daemon in Postfix?

  • smtpd
  • master
  • qmgr   
  • crond 

 
Which of the following is NOT a daemon in Postfix?

EXPLANATION

The crond daemon is a Linux daemon, not a Postfix daemon.
The master daemon is the brain of the Postfix mail system. It spawns all other daemons. The smtpd daemon (server) handles incoming connections. The qmgr daemon is the heart of the Postfix mail system. It processes and controls all messages in the mail queues.

Share:

Which of the following is NOT a Linux distro?

Which of the following is NOT a Linux distro?

  • Ubuntu
  • Red Hat
  • Mint
  • BSD
 
Which of the following is NOT a Linux distro?

EXPLANATION

Berkeley Software Distribution (BSD) is a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995. Today the term "BSD" is often used non-specifically to refer to any of the BSD descendants which together form a branch of the family ofUnix-like operating systems. Operating systems derived from the original BSD code remain actively developed and widely used.  
Share:

VMware Workstation replaces CTRL-ALT-DELETE with which of the following?

VMware Workstation replaces CTRL-ALT-DELETE with which of the following?

  • CTRL-ALT-INSERT
  • A mouse click
  • CTRL-ALT-SHIFT
  • CTRL-ALT-TAB 

 
VMware Workstation replaces CTRL-ALT-DELETE with which of the following?

EXPLANATION

When you are working in a Windows virtual machine, VMware uses CTRL-ALT-INSERT instead of CTRL-ALT-DELETE. .

SOURCE

https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1011705
Share:

In PowerShell, all of the following are valid ways to create an array, except:

In PowerShell, all of the following are valid ways to create an array, except:

  • $array = %('this, 'that')
  • $array = @('this', 'that')
  • $array = ('this', 'that')
  • $array = [array]('this', 'that') 

In PowerShell, all of the following are valid ways to create an array, except:

EXPLANATION

In programming, arrays are collections of items.  In PowerShell, these items are always objects, and a single array can contain different, unrelated object types.
Typically, simply putting a comma between different items causes them to be treated together like an array.  You can also explicitly declare an array with the [array] type marker, or with the shorthand "@" symbol.
In PowerShell, the "%" symbol is an alias for "Foreach-Object", and the example above will throw an error.
Fun fact: in Perl, the "%" is used to declare a variable as a hashtable, which is similar to an array, but uses a named key index instead of an automatic number index; unlike in PowerShell, the variable prefix in Perl actually changes depending on use, so a hashtable variable would look like "%variable" instead of "$variable".
Share:

Which of the following is NOT a feature of the Microsoft Exchange 2016 Transport Pipeline?

Which of the following is NOT a feature of the Microsoft Exchange 2016 Transport Pipeline?

  • Transport service
  • Mailbox transport
  • Back end transport service
  • Front end transport service 

 
Which of the following is NOT a feature of the Microsoft Exchange 2016 Transport Pipeline?

EXPLANATION

The Microsoft Exchange Transport Pipeline uses the following services:
  • Front end transport service, which does basic message filtering based on domains, connectors, senders and recipients. It only connects with the transport service on a mailbox server and does not backlog any messages locally
  • Transport service, which runs on all mailbox servers, and handles SMTP mail flow. It helps in message categorization and content inspection. The transport services routes messages between the Mailbox Transport service, the Transport Service and Front End Transport service.  This service does not queue messages locally
  • Mailbox Transport, which handles receiving and sending SMTP to the transport service from the mailbox using remote procedures calls (RPCs).

SOURCE

https://technet.microsoft.com/en-us/library/aa996349(v=exchg.160).aspx
Share:

On a Windows Domain Controller, which of the following does the SYSVOL share contain?

On a Windows Domain Controller, which of the following does the SYSVOL share contain?

  • The Active Directory replication queue
  • The primary Active Directory database
  • Group policy object files and network logon scripts
  • System Volume partition information 

 
On a Windows Domain Controller, which of the following does the SYSVOL share contain?

EXPLANATION

SYSVOL provides a standard location to store important elements of Group Policy objects (GPOs) and scripts that need to be read and synchronized by all domain members.
https://social.technet.microsoft.com/wiki/contents/articles/24160.active-directory-back-to-basics-sy...

SOURCE

https://social.technet.microsoft.com/wiki/contents/articles/24160.active-directory-back-to-basics-sysvol.aspx
Share:

What is a WIFI pineapple?

What is a WIFI pineapple?

  • A access point that looks like a pineapple
  • It is a hacking / security testing device.
  • A pineapple with the top cut off
  • A network connected pineapple 
What is a WIFI pineapple?

 

EXPLANATION

The WIFI pineapple is a device that will allow security testers to preform WIFI man-in-the-middle/ rogue AP testing.

SOURCE

https://hakshop.com/products/wifi-pineapple?variant=11303862021
Share:

Which of the following best describes a network-based intruder prevention system (NIPS)?

Which of the following best describes a network-based intruder prevention system (NIPS)?

  • Detects and takes actions against threats
  • Provides a sweet diversion from life's little irri
  • Identifies zero-day vulnerabilities
  • Detects and eliminates threats 

 
Which of the following best describes a network-based intruder prevention system (NIPS)?

EXPLANATION

A network-based intruder prevention system attempts to detect and mitigate threats by taking action to block them. While it may be able to identify a zero-day vulnerability using anomaly-based signatures, this is not its primary function.

Share:

What is the disk fault tolerance in a minimally sized RAID 50 array?

What is the disk fault tolerance in a minimally sized RAID 50 array?

  • 1 MAX
  • 3 MAX
  • NONE
  • 2 MAX 
What is the disk fault tolerance in a minimally sized RAID 50 array?

EXPLANATION

RAID 50, also called RAID 5+0, combines the straight block-level striping of RAID 0 with the distributed parity of RAID 5. As a RAID 0 array striped across RAID 5 elements, maximum fault tolerance is 1 in each RAID 5. Then the maximum fault tolerance is 2.

SOURCE

https://en.wikipedia.org/wiki/Nested_RAID_levels
Share:

Windows 10 offers four (4) different update branches that describe every update parameter; from the applicable edition of Win. 10 to the length of support for the update, (5-yrs, 10-yrs, etc). Which of the following is NOT one of these branches?

Windows 10 offers four (4) different update branches that describe every update parameter; from the applicable edition of Win. 10 to the length of support for the update, (5-yrs, 10-yrs, etc). Which of the following is NOT one of these branches?

  • Current Branch for Business
  • Long Term Servicing Branch
  • Windows Insider Preview Branch
  • Open grade 

 
Windows 10 offers four (4) different update branches that describe every update parameter; from the applicable edition of Win. 10 to the length of support for the update, (5-yrs, 10-yrs, etc). Which of the following is NOT one of these branches?

EXPLANATION


Upgraded builds of Windows 10, known as feature updates,[199] are occasionally released, containing new features and other changes; in April 2017, Microsoft stated that in the future, these updates would be released semi-annually every March and September.[200]
The pace at which feature updates are received by devices is dependent on which release channel is used; the default branch for all users of Windows 10 Home and Pro is "Current Branch", (CB) which receives stable builds after they are publicly released by Microsoft. A 60-day grace period is provided for each CB build to be rolled out to users before Microsoft ends support and updates for the previous version.[199] Windows Insider branches receive unstable builds as they are released, at either a "Fast" pace (immediately after release) or "Slow" pace (slightly delayed from their "Fast" release). The Pro and Enterprise editions may optionally use the "Current Branch for Business" release channel (CBB), which receives the stable builds on a roughly four-month delay from their CB release to allow for additional testing.[199][191][201] CBB may defer build upgrades for up to eight months, after which the new build must be installed in order to maintain support and access to security updates.[197] Administrators can also use the "Windows Update for Business" system to organize structured deployments of updates and build upgrades across their networks.[191]
Enterprise licensees may use the Windows 10 Enterprise Long-term Servicing Branch (LTSB) edition.[199][201] LTSB milestones of Windows 10 are designed for long-term deployments in specialized environments, and only receive quality of life updates (i.e. security patches). Each LTSB milestone is given a full, 10-year support lifecycle. Due to Microsoft's intended use cases for LTSB builds, certain features, including most Cortana functionality, Windows Store, and bundled apps, are excluded from LTSB.[199][175][202][203]Microsoft director Stella Chernyak explained that "we have businesses [that] may have mission-critical environments where we respect the fact they want to test and stabilize the environment for a long time."[204]

SOURCE

https://en.wikipedia.org/wiki/Windows_10#Storage_requirements
Share:

Popular Posts

Blog Archive