IT Questions and Answers :)

Friday, August 17, 2018

Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

  • [a-zA-Z0-9_]
  • [a-zA-Z]
  • [a-zA-Z0-9]
  • [a-zA-Z_] 

 
Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

EXPLANATION

The "word" meta-character \w in RegEx will match the full alpha-numeric range, basically the full alphabet as well as number characters, and includes underscores.

Note that it matches more alphabet characters than the standard a through z: pretty much any alphabet character, such as 'ñ', also match.

http://www.w3schools.com/jsref/jsref_regexp_wordchar.asp
Share:

Thursday, August 16, 2018

What is the primary difference between LED and an LCD monitor?

What is the primary difference between LED and an LCD monitor?

  • price
  • Backlighting source
  • Doesn't last as long as plasma displays
  • screen size 

 
What is the primary difference between LED and an LCD monitor?

EXPLANATION

LCD
LCD is the abbreviation of Liquid Crystal display. There are two layers of glass in this technology that are joined together with liquid crystals in between. These crystals help pass or block the light. However, crystals do not produce any light and it comes through fluorescent lamps (CCFL) situated at the back of the screen.
LED
The technology in LED TV’s is much the same with the difference being the source of light at the back of the screen. Whereas it is CCFL in the case of LCD, there is Light emitting Diodes (LED’s) in the case of LED TV’s.
http://www.differencebetween.com/difference-between-lcd-and-vs-led-monitor/
http://www.diffen.com/difference/LCD_TV_vs_LED_TV
Share:

Where does Cryptolocker execute from on a Windows OS?

Where does Cryptolocker execute from on a Windows OS?

  • Desktop
  • C:\Programfiles
  • C:\Windows\System32
  • C:\Users\*User*\AppData\Local 

Where does Cryptolocker execute from on a Windows OS?

EXPLANATION

Cryptolocker runs from App Data Local and starts locking each file from A to Z then works on mapped drives from A to Z.

SOURCE

https://malwaretips.com/blogs/remove-cryptolocker-virus/
Share:

Tuesday, August 14, 2018

What is the default port used by Postfix?

What is the default port used by Postfix?

  • 25
  • 45
  • 37
  • 20 

 
What is the default port used by Postfix?

EXPLANATION

Postfix is an open source mail transfer agent (MTA) that is used to route and deliver emails. Postfix is the alternate of widely
used Sendmail MTA. Postfix uses port number 25 (SMTP) by default.

Share:

Monday, August 13, 2018

What type of RAID is RAID 2?

What type of RAID is RAID 2?

  • Byte-level striping with dedicated parity.
  • A striped set from a series of mirrored drives.
  • Block-level striping with dedicated parity.
  • Bit-level striping with dedicated Hamming-code parity. 

EXPLANATION

RAID 2
RAID 2 consists of bit-level striping with dedicated Hamming-code parity. All disk spindle rotation is synchronized and data is striped such that each sequential bit is on a different drive. Hamming-code parity is calculated across corresponding bits and stored on at least one parity drive. This level is of historical significance only; although it was used on some early machines (for example, the Thinking Machines CM-2), as of 2014 it is not used by any commercially available system.
RAID 2

SOURCE

https://en.wikipedia.org/wiki/Standard_RAID_levels#RAID_2 
Share:

Friday, August 10, 2018

In Linux system, which command will print the output of log file in reverse ?

In Linux system, which command will print the output of log file in reverse ?

  • less
  • cat
  • tac
  • rcs 

 
In Linux system, which command will print the output of log file in reverse ?

EXPLANATION

Let's assume that we have a log file named "Letters" that contains: A B C D (in separate lines).
To view the content of the log file in Linux terminal, the command will be:
linux@machine:~$ sudo cat Letters
And we will get the output:
A
B
C
D

To view the content of the log file in reverse, the command will be:
linux@machine:~$ sudo tac Letters
And we will get the output:
D
C
B
A




SOURCE

https://www.tecmint.com/learn-linux-cat-command-and-tac-command/
Share:

Thursday, August 9, 2018

While working on an issue on a clients network you learn that you will be using the 1000BaseCX standard. What type of cable will you be using.

While working on an issue on a clients network you learn that you will be using the 1000BaseCX standard. What type of cable will you be using.

  • CoreXtended Fiber
  • Single-mode fiber
  • Multimode fiber
  • STP

While working on an issue on a clients network you learn that you will be using the 1000BaseCX standard. What type of cable will you be using.

EXPLANATION

The 1000BaseCX standard specifies Gigabit Ethernet over STP cabling.
  1. Multi-mode Fiber is incorrect because 1000BaseSX and 1000BaseLX specify Gigabit Ethernet over two types of Multi-mode fiber.
  2. Single-mode fiber is used with 100BaseFX standard.
  3. As far as CoreXtended Fiber, there anin't no such animal.

SOURCE

http://www.thenetworkencyclopedia.com/entry/1000basecx/
Share:

Which of the following retains the information it's storing when the system power is turned off?

Which of the following retains the information it's storing when the system power is turned off?

  • ROM
  • RAM
  • GPU
  • CPU 

 
Which of the following retains the information it's storing when the system power is turned off?

EXPLANATION

Read only memory (ROM) is nonvolatile, meaning that turning off the computer doesn't erase it. 

Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware (software that is closely tied to specific hardware, and unlikely to need frequent updates) or application software in plug-in cartridges.
Strictly, read-only memory refers to memory that is hard-wired, such as diode matrix and the later mask ROM (MROM), which cannot be changed after manufacture. Although discrete circuits can be altered in principle, integrated circuits (ICs) cannot, and are useless if the data is bad or requires an update. That such memory can never be changed is a disadvantage in many applications, as bugs and security issues cannot be fixed, and new features cannot be added.
More recently, ROM has come to include memory that is read-only in normal operation, but can still be reprogrammed in some way. Erasable programmable read-only memory (EPROM) and electrically erasable programmable read-only memory (EEPROM) can be erased and re-programmed, but usually this can only be done at relatively slow speeds, may require special equipment to achieve, and is typically only possible a certain number of times

Share:

Friday, August 3, 2018

In Windows Active Directory, what is the default time interval that the Knowledge Consistency Checker (KCC) uses for incremental syncs to review and update the Active Directory replication topology?

In Windows Active Directory, what is the default time interval that the Knowledge Consistency Checker (KCC) uses for incremental syncs to review and update the Active Directory replication topology?

  • 48 hours
  • 15 minutes
  • 60 minutes
  • 5 minutes 

 

EXPLANATION




By default, the knowledge consistency checker (KCC) reviews and makes modifications to the Active Directory replication topology every 15 minutes. The KCC ensures propagation of data, either directly or transitively, by creating and deleting connection objects as needed. The KCC recognizes changes that occur in the environment and ensures that domain controllers are not orphaned in the replication topology.

For more information on the KCC, see: https://technet.microsoft.com/en-us/library/cc961781.aspx
Share:

Thursday, August 2, 2018

Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

  • Social Engineering
  • Cross Site Scripting
  • ARP Poisoning
  • SQL Injection 

 
Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

EXPLANATION

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught-on among computer and information security professionals.

SOURCE

https://en.wikipedia.org/wiki/Social_engineering_(security)
Share:

What can be used to protect you from receiving email messages with a forged sender address?

What can be used to protect you from receiving email messages with a forged sender address?

  • Digital ID
  • IMAP
  • Secure SMTP
  • SPF

What can be used to protect you from receiving email messages with a forged sender address?

EXPLANATION

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators.[1] The list of authorized sending hosts for a domain is published in the Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. Email spam and phishing often use forged "from" addresses, so publishing and checking SPF records can be considered anti-spam techniques.
IETF publication RFC 7208 dated April 2014 defines Sender Policy Framework as "proposed standard".

SOURCE

https://en.wikipedia.org/wiki/Sender_Policy_Framework 
Share:

Tuesday, July 31, 2018

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

  • find /var -name "*.log"
  • mv "*.log"
  • ls -l *.log
  • find / | grep "*.log" 

 

EXPLANATION

The "find" command specifies the directory, "/var". The "-name" option tells the "find" command to show only files that have a ".log" extension.

SOURCE

https://quiz.techlanda.com/2017/11/in-unix-which-of-following-commands.html
Share:

Where is the iSCSI protocol typically used?

Where is the iSCSI protocol typically used?

  • File sharing
  •  SANs (Storage Area Networks)
  • Inter-site routing
  • Internal drive arrays 

 
Where is the iSCSI protocol typically used?

EXPLANATION

iSCSI (Internet Small Computer System Interface) works on top of TCP and allows SCSI
commands to be sent over a network to iSCSI storage devices. This allows for a low cost SAN infrastructure using standard network hardware.

Share:

Friday, July 27, 2018

What is the advantage of coaxial cable over STP or UTP?

What is the advantage of coaxial cable over STP or UTP?

  • It can run for a longer distance unboosted
  • It is easier to splice.
  • It is less expensive
  • It is easier to install because it is so flexible 

 
What is the advantage of coaxial cable over STP or UTP?

EXPLANATION

Coaxial cable conducts the electrical signal using an inner conductor (usually copper) surrounded by an insulating layer. The whole works are enclosed by a one to four layer shield. This makes coaxial cable thicker than STP or UTP, so harder to install and splice. It also makes it more expensive. But, it has the advantage of being able to carry large quantities of data over a longer distance unboosted.
Share:

Thursday, July 26, 2018

When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

  • Annual
  • KMS
  • Perpetual
  • MAK 

 
When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

EXPLANATION

Google allows a Google GSuite console to move licenses to a different Chrome device, but there are differences. There are a Annual and Perpetual. Perpetual licenses are a one time purchase for a single type of device. If that device breaks and is replaced with the same model, you can transfer the license to that device. If you would replace it with a different type and model of device, you would have to purchase an additional license.
An annual license is bought per term and in the case of this, you can transfer the license to any new devices, regardless of the model and type during the license term.
Also, different versions of GSuite support different licensing models. GSuite Enterprise supports Annual and Perpetual, whereas GSuite Education and GSuite Nonprofit only supports Perpetual.

SOURCE

https://support.google.com/chrome/a/answer/2717664?hl=en
Share:

Wednesday, July 25, 2018

Which of the following is NOT a fork of Nagios Core network monitoring system?

Which of the following is NOT a fork of Nagios Core network monitoring system?

  • Naemon
  • Shinken
  • Check MK
  • Icinga 

 
Which of the following is NOT a fork of Nagios Core network monitoring system?

EXPLANATION

Nagios Core is a free and open source computer-software application that monitors systems, networks and infrastructure, initially released in 1999.
Icinga is an open source computer system and network monitoring application. It was originally created as a fork of the Nagios system monitoring application in 2009.
Naemon is an open source computer system monitoring, network monitoring and infrastructure monitoring software application. Initial release 2015 and based on Nagios 4 core.
Shinken is an open source computer system and network monitoring software application. Released as a fork of Nagios in 2009.
Check_MK is an extension to the Nagios monitoring system that allows creating rule-based configuration using Python and offloading work from the Nagios core to make it scale better, allowing more systems to be monitored from a single Nagios server. Initial release 2008.

SOURCE

https://en.wikipedia.org/wiki/Nagios#See_also
Share:

Tuesday, July 24, 2018

Monday, July 23, 2018

In programming, which of the following is a mechanism by which an object acquires the properties of another object?

In programming, which of the following is a mechanism by which an object acquires the properties of another object?

  • Anamorphism
  • Inheritance
  • Encapsulation
  • Polymorphism 

 
In programming, which of the following is a mechanism by which an object acquires the properties of another object?

EXPLANATION

‘Inheritance’ is the mechanism provided by Object Oriented Language, which helps an object to acquire the properties of another object usually child object from parent object.

SOURCE

https://en.wikipedia.org/wiki/Inheritance_(object-oriented_programming)
Share:

Friday, July 20, 2018

What does the sender need in order to digitally sign an email?

What does the sender need in order to digitally sign an email?

  • The public key of the recipient
  • The public key of the sender
  • The private key of the recipient
  • The private key of the sender 

EXPLANATION

A digital signature is created by hashing a message and encrypting the hash with the sender's private key. The recipient can then decrypt the hash with the sender's public key. The recipient's keys are not used for a digital signature.
A general overview of this process can be found here https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq

SOURCE

https://en.wikipedia.org/wiki/Public-key_cryptography#Digital_signatures
Share:

Thursday, July 19, 2018

In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

  • NTFS
  • exFAT
  • HFS
  • REFS 

 
In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

EXPLANATION

Both Windows and Apple machines can read drives formatted in FAT32.  Apple can read NTFS but cannot write to it.

SOURCE

https://www.laptopmag.com/articles/format-drive-for-windows-and-mac
Share:

Tuesday, July 17, 2018

Which of these is an valid email address?

Which of these is an valid email address?

  • All of them
  • Michael.Scarn@[117.42.15.92]
  • "dogs@r.com"@catsrule.com
  • Security+@comptia.org 

 

EXPLANATION

Based on RFC 5322, email address can have two "@" symbols as long as the first one is in quotation marks to identify the local name versus the domain name.  IP addresses can be used to identify the domain name.  The "+" symbol is valid in local names.

SOURCE

https://tools.ietf.org/html/rfc5322
Share:

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

  • DirectX
  • Hyper-threading
  • Hardware Enforced Data Execution Prevention (DEP)
  • MMX4 

 

EXPLANATION

Hyper-V virtualization technology requires specific hardware. You can identify systems that support x64-based architecture and Hyper-V by searching the Windows Server Catalog for Hyper-V: Windows Server catalog.
Hyper-V Server has hardware requirements that are similar to those for the Hyper-V role in other editions of Windows Server. Hardware-enforced Data Execution Prevention (DEP) must be available and enabled. Specifically, you must enable the Intel XD (“execute disable”) bit or the AMD NX (“no execute”) bit.


SOURCE

https://technet.microsoft.com/en-us/library/cc731898(v=ws.11).aspx
Share:

Friday, July 13, 2018

A standard rectangular male USB connector (for example, the connector on most mouse/ cables) is what type of connector?

A standard rectangular male USB connector (for example, the connector on most mouse/ cables) is what type of connector?

  • USB Type C
  • USB Type B
  • Micro USB 3.0
  • USB Type A 

A standard rectangular male USB connector (for example, the connector on most mouse/ cables) is what type of connector?

EXPLANATION

standard male USB
 connector for peripheral devices is known as a USB Type A Male connector.  Type B is the more squared or house shaped connector that is commonly used on printers or scanners to connect to a computer
Share:

Thursday, July 12, 2018

Which term from the past describes the sharing of mainframe computing resources?

Which term from the past describes the sharing of mainframe computing resources?

  • XaaS
  • Time-sharing
  • Time division multiplexing
  • Mainframe sharing 

 
Which term from the past describes the sharing of mainframe computing resources?

EXPLANATION

Time-sharing allowed groups of people to use expensive mainframe computing resources concurrently by working in isolated computing sessions.
Time division multiplexing is a signal transmission protocol.
Mainframe sharing is not an industry-accepted term.
XaaS refers to any web service delivered over the Internet (Anything as a Service) and thus is incorrect
Share:

Wednesday, July 11, 2018

In Linux, what's the difference between a hard link and a symbolic link?

In Linux, what's the difference between a hard link and a symbolic link?

  • A hard link does not depend on software libraries, a soft link does.
  • A hard link persists across OS reboots, a symbolic link does not.
  • Normal users can use only symbolic links, only the "root" user can use hard links.
  • A hard link points to a file's inode, a symbolic link is a pointer to the file. 

In Linux, what's the difference between a hard link and a symbolic link?

EXPLANATION

Symbolic links are much more common than hard links. They are aliases to an already existing file, and deleting the symbolic link will leave the existing file intact.
Renaming the file will break the link.  Hard links point to the very same filesystem inode used by the target file, so renaming the target file will have no effect on the hard link-- it will still point to the original file.  If for some reason the file targeted by a hard link is moved to a different spot in the filesystem, the hard link will no longer be valid.  Symbolic links are much more common than hard links.
Share:

Tuesday, July 10, 2018

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

  • Left Outer Join
  • Right Outer Join
  • Inner Join
  • Cross inner join 

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

EXPLANATION

Right Outer Join lists all records from the right table and those in the left that match only.
Left Outer join lists all values from the left table and only those in the right table where the join fields match
Inner Join only shows values in the tables where the join fields match.
Cross Inner join is not a valid join type

SOURCE

http://us.flukecal.com/literature/technical-bulletins/metcal/application-note/setting-join-types-crystal-reports
Share:

Monday, July 9, 2018

Which of the following are Fax over IP Protocol(s)?

Which of the following are Fax over IP Protocol(s)?

  • t.38
  • H.323 and H.404
  • M.16 and M.204
  • k.30 and k.38 

 
Which of the following are Fax over IP Protocol(s)?

EXPLANATION

The T.38 fax relay standard was devised in 1998 as a way to permit faxes to be transported across IP networks between existing Group 3 (G3) fax terminals. T.4 and related fax standards were published by the ITU in 1980, before the rise of the Internet. In the late 1990s, VoIP, or Voice over IP, began to gain ground as an alternative to the conventional Public Switched Telephone Network. However, because most VoIP systems are optimized
(through their use of aggressive lossy bandwidth-saving compression) for voice rather than data calls, conventional fax machines worked poorly or not at all on them due to the network impairments such as delay, jitter, packet loss, and so on. Thus, some way of transmitting fax over IP was needed.

SOURCE

https://www.3cx.com/pbx/foip/
Share:

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

  • Randomly 15-60 minutes later
  • During windows updates
  • During their next reboot
  • During the user's next logon 

 
With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

EXPLANATION

You can assign a program distribution to users or computers. If you assign the program to a user, it is installed when the user logs on to the computer. When the user first runs the program, the installation is completed. If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. When a user first runs the program, the installation is completed.

SOURCE

https://technet.microsoft.com/en-us/library/cc753768(v=ws.11).aspx
Share:

Which is the correct method for defining a function in PHP

Which is the correct method for defining a function in PHP

  • function myFunction($arg_n) { return $retval; }
  • Function myFunction(p1) myFunction = (p1 - 32) End Function
  • int myFunction(int p1) { return p1; }
  • function myFunction(p1, p2) { return p1 * p2; } 

 
Which is the correct method for defining a function in PHP

EXPLANATION


Its very easy to create your own PHP function. Suppose you want to create a PHP function which will simply write a simple message on your browser when you will call it. Following example creates a function called writeMessage() and then calls it just after creating it.
Note that while creating a function its name should start with keyword function and all the PHP code should be put inside { and } braces as shown in the following example below −

<?php
    /* Defining a PHP Function */
    function writeMessage() {
    echo "You are really a nice person, Have a nice time!";
    }
         
    /* Calling a PHP Function */
    writeMessage();
?>

For more information check out: http://php.net/manual/en/functions.user-defined.phpThe other answers and their language is below:
function myFunction(p1, p2) { return p1 * p2; } is JavaScript
Function myFunction(p1) myFunction = (p1 - 32) End Function is VBScript
int myFunction(int p1) { return p1; } is C
Share:

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

  • Randomly 15-60 minutes later
  • During windows updates
  • During their next reboot
  • During the user's next logon 

 
With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

EXPLANATION

You can assign a program distribution to users or computers. If you assign the program to a user, it is installed when the user logs on to the computer. When the user first runs the program, the installation is completed. If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. When a user first runs the program, the installation is completed.

SOURCE

https://technet.microsoft.com/en-us/library/cc753768(v=ws.11).aspx
Share:

Which of the following is not a system role in vCenter?

Which of the following is not a system role in vCenter?

  • Administrator
  • Read Only
  • No Access
  • Virtual Machine User (Power User) 
Which of the following is not a system role in vCenter?

EXPLANATION

Virtual Machine User is a sample role on the vCenter system of permissions - No Access, Administrator and Read Only are the system roles which are not customizable.

SOURCE

https://pubs.vmware.com/vsphere-60/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-60-security-guide.pdf
Share:

What is the maximum number of USB devices a host controller can handle?

What is the maximum number of USB devices a host controller can handle?

  • 128
  • 155
  • 64
  • 127 

 
What is the maximum number of USB devices a host controller can handle?

EXPLANATION

At 7 bits long, a single USB Host Controller can allow up to 127 (2^7 – 1 Host Controller) connected devices.

USB hubs can be cascaded up to seven times, the maximum number of user devices is reduced by number of hubs. So, with 19 hubs attached, the maximum number of available devices is reduced 127 − 19 = 108.

SOURCE

https://en.wikipedia.org/wiki/USB_hub (Physical Layout section)
Share:

What type of DNS record is used by the Sender Policy Framework (SPF)?

What type of DNS record is used by the Sender Policy Framework (SPF)?

  • TXT
  • MX
  • A
  • CNAME 

 
What type of DNS record is used by the Sender Policy Framework (SPF)?

EXPLANATION







Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing. The SPF is an open standard specifying a technical method to prevent sender-address forgery. SPF allows administrators to specify which hosts are allowed to send mail on behalf of a given domain by creating a specific SPF record (or TXT record) in the Domain Name System (DNS). Mail exchangers use DNS records to check that mail from a given domain is being sent by a host sanctioned by that domain's administrators.

Share:

What's a network segment for public-facing servers that's separated from a private, trusted network by a firewall?

What's a network segment for public-facing servers that's separated from a private, trusted network by a firewall?

  • DMZ
  • NSA
  • VPN
  • ATA 

What's a network segment for public-facing servers that's separated from a private, trusted network by a firewall?

EXPLANATION

A DMZ, or demilitarized zone, is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN).

SOURCE

http://www.ciscopress.com/articles/article.asp?p=1823359
Share:

To avoid data corruption, which of the following should you do before performing fsck on a file system?

To avoid data corruption, which of the following should you do before performing fsck on a file system?

  • Reboot the machine
  • Create a new data partition
  • Unmount the file system
  • Ensure the file system is mounted 

 
To avoid data corruption, which of the following should you do before performing fsck on a file system?

EXPLANATION

The fsck command is used to check and repair one or more Linux file systems. Running fsck on a mounted file system can cause data or disk corruption. Instead, you can do one of the following:
(a) Take down system to single user mode and unmount the system
(b) Boot from the installation CD

Share:

On systems running MS Windows, which OS service manages the print queue?

On systems running MS Windows, which OS service manages the print queue?

  • Spooler
  • LPD
  • RAW daemon
  • Print manager 

 
On systems running MS Windows, which OS service manages the print queue?

EXPLANATION

The spooler service manages print jobs on Windows OS PCs.  Sometimes this service can get "stuck" and otherwise interrupt printing.  A quick and effective troubleshooting idea is to simply stop and restart the service.  This is done through an elevated command prompt:

net stop spooler

Then restart using the following:
net start spooler
Share:

Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

  • Add-MailboxFolderPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Set-MailboxFolderPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Set-MailboxPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Add-MailboxPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner 

 
Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

EXPLANATION

There are two things to notice.  First is that you're trying to give new permissions to User2 and not change current permissions of User2 within User1's mailbox.  So we'll want to use Add instead of Set.  Set is used to change permissions if a user already has some sort of permissions within the mailbox.
The second thing is that the calendar is a folder within the mailbox.  We don't want User2 to be able to read User1's emails, so we'll do Add-MailboxFolderPermission instead of Add-MailboxPermission.

SOURCE

https://technet.microsoft.com/en-us/library/dd298062(v=exchg.160).aspx
Share:

In Windows, If you close a tab in Firefox/Chrome/IE, what key command will re-open it for you?

In Windows, If you close a tab in Firefox/Chrome/IE, what key command will re-open it for you?

  • Ctrl-Shift-T
  • Ctrl-T-O
  • Ctrl-Alt-T
  • Ctrl-Alt-O-T 

 
In Windows, If you close a tab in Firefox/Chrome/IE, what key command will re-open it for you?

EXPLANATION

When you realize you just closed that browser tab that you have kept open for the last 4 days... just in case. You can easily now just  type "Ctl - Shift - T" to get it back.

SOURCE

http://www.slate.com/blogs/future_tense/2013/08/22/keyboard_shortcut_helps_recover_lost_browser_tabs.html
Share:

Tuesday, June 19, 2018

Which of the following languages requires server-side interpretation?

Which of the following languages requires server-side interpretation?

  • CFML
  • XML
  • Java
  • CSS 

 
Which of the following languages requires server-side interpretation?

EXPLANATION

ColdFusion Markup Language (CFML) is a scripting language that augments standard HTML files with database commands, conditional operators, high-level formatting functions, and other elements to produce web applications. CFML also includes numerous other constructs, including ColdFusion Components (CFCs), CFML's version of objects, which allow for separation of business logic from presentation.
CFML can be written using either tags or CFScript, which is an ECMA script-style language.
The pages in a CFML application include the server-side CFML tags and functions in addition to HTML tags. Modern CFML applications also tend to have CFCs that are accessed by the CFML pages for executing business logic. When a web browser requests a page in a ColdFusion application, it is automatically pre-processed by the ColdFusion application server.
ability
CFML can also be used to generate other languages,such as XML, JavaScript, and CSS.
Source: https://en.wikipedia.org/wiki/ColdFusion_Markup_Language

Share:

Monday, June 18, 2018

Heaps and stacks are affected by which of the following attacks?

Heaps and stacks are affected by which of the following attacks?

  • Buffer overflows
  • Ping flood
  • SQL injection
  • Cross site scripting 

 
Heaps and stacks are affected by which of the following attacks?

EXPLANATION

Heaps and stacks are data structures that can be affected by buffer overflows. A buffer overflow vulnerability allows an attacker to corrupt the execution stack of an application by inserting data into adjacent memory locations. This can cause application or operating system instability or, in the hands of a skilled attacker, even allow arbitrary code execution.

SQL Injection is a vulnerability that allows an attacker to query or manipulate a database using user input fields.
Cross site scripting is a vulnerability that allows for an attacker to inject client site scripts into web pages that is intended to be executed by other users.

A ping flood is a method of performing denial of service (DoS or DDoS) against network devices.
Share:

Friday, June 15, 2018

The VHDX virtual hard disk format supports what maximum storage capacity?

The VHDX virtual hard disk format supports what maximum storage capacity?

  • 640GB
  • 6.4PB
  • 64TB
  • 6.4TB 

 
The VHDX virtual hard disk format supports what maximum storage capacity?

EXPLANATION

The VHDX disk format supports virtual hard disks as large as 64TB with power failure resiliency.


Share:

Thursday, June 14, 2018

Which of the following features of cloud computing matches resources to the current demand?

Which of the following features of cloud computing matches resources to the current demand?

  • Elasticity
  • Security
  • Redundancy
  • Availability 

Which of the following features of cloud computing matches resources to the current demand?

EXPLANATION

Elasticity refers to the ability of a cloud service to scale on demand. Resources such as storage, bandwidth, or memory can be provisioned in a matter of minutes and scaled down when no longer needed.
https://en.wikipedia.org/wiki/Elasticity_(cloud_computing)
Share:

Followers

Popular Posts

Blog Archive