IT Questions and Answers :)

Wednesday, May 30, 2018

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

  • :q
  • :q!
  • :x
  • Ctrl + Z 

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

 EXPLANATION



:x - Exit, saving changes
:q - Exit as long as there have been no changes

:q! - Exit and ignore any changes
Ctrl + Z - Suspend editor
https://www.cs.colostate.edu/helpdocs/vi.html
http://www.lagmonster.org/docs/vi.html
http://www.rollanet.org/~mdoc/vi.htm
Share:

Tuesday, May 29, 2018

Which of the following is not a tool in Kali Linux?

Which of the following is not a tool in Kali Linux?

  • Sqlmap
  • MBSA
  • Armitage
  • Beef 

 

EXPLANATION

MBSA (Microsoft Baseline Security Analyzer) is a security
testing tool for Microsoft Windows Operating systems to identify vulnerabilities.
Share:

Which of the following is a software implementation of a telephone private branch exchange (PBX)?

Which of the following is a software implementation of a telephone private branch exchange (PBX)?

  • Snom
  • Digium
  • Asterisk
  • Polycom 

 
Which of the following is a software implementation of a telephone private branch exchange (PBX)?

EXPLANATION

Digium is the company and hardware (appliance) name where Asterisk is software name. Polycom and Snom provide VoIP equipment.

SOURCE

https://en.wikipedia.org/wiki/Asterisk_(PBX)
Share:

Saturday, May 26, 2018

Which of the following is the primary benefit of Platform as a Service (PaaS)?

Which of the following is the primary benefit of Platform as a Service (PaaS)?

  • High bandwidth
  • Replication
  • Low latency
  • Rapid application deployment 

Which of the following is the primary benefit of Platform as a Service (PaaS)?

EXPLANATION

PaaS provides rapid application deployment. Platform as a service (PaaS) is a category of cloud computing services that provides a platform allowing customers to develop,
run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
Share:

What is the minimum number of drives required for a non-degraded Raid 5 array?

What is the minimum number of drives required for a non-degraded Raid 5 array?

  • 2
  • 4
  • 5
  • 3
 
What is the minimum number of drives required for a non-degraded Raid 5 array?
 

EXPLANATION

RAID 5 requires 3 disks. It consists of block-level data striping with distributed parity. This means that data is striped across multiple disks with fault-tolerant parity data written to each disk. If one disk fails, the array can reconstruct the data from the parity information. 
Share:

Wednesday, May 23, 2018

In a computer device, which of the following types of memory has the fastest access time?

In a computer device, which of the following types of memory has the fastest access time?

  • PCIe based SSD memory
  • RAM
  • CPU register
  • CPU cache 

 
In a computer device, which of the following types of memory has the fastest access time?

EXPLANATION

The faster the memory is the more expensive. Also the closer to the CPU is the lesser the latency would be. In this regard one can reasonably suggest which is the fastest memory only be looking by it size and location in the system.

The fastest memory block in a computer is the CPU register but it is also the smallest. It is followed by various levels of CPU cache. More info can be found here:
http://www.moreprocess.com/devices/computer-memory-hierarchy-internal-register-cache-ram-hard-disk-m...
Share:

Tuesday, May 22, 2018

In computing security, which of the following describes a nonce?

In computing security, which of the following describes a nonce?

  • A hacking algorythm
  • No Other non-Critical Events
  • A value used once
  • A vector 

 
In computing security, which of the following describes a nonce?

EXPLANATION

Typically, a nonce is some value that varies with time, although a very large random number is sometimes used. A nonce can be a time stamp, a visit counter on a Web page, or a special marker intended to limit or prevent the unauthorized replay or reproduction of a file.

SOURCE

http://searchsecurity.techtarget.com/definition/nonce
Share:

Monday, May 21, 2018

What type of RAID is RAID-Z?

What type of RAID is RAID-Z?

  • Hardware RAID
  • Software RAID
  • not a RAID
  • Virtual RAID 

 
What type of RAID is RAID-Z?

EXPLANATION

RAID-Z is a software raid achieved by

data/parity distribution scheme like RAID-5, but uses dynamic stripe width: every block is its own RAID stripe. It is primarily used by ZFS file system.
https://en.wikipedia.org/wiki/ZFS#RAID-Z


SOURCE

https://en.wikipedia.org/wiki/ZFS#RAID-Z
Share:

Wednesday, May 16, 2018

In computing, what is an octet? Checkmark A byte that is 8 bits A group of 8x8 bits A byte that is 80 bits A short string of coding

In computing, what is an octet?

  • A byte that is 8 bits
  • A group of 8x8 bits
  • A byte that is 80 bits
  • A short string of coding

 
In computing, what is an octet?      Checkmark A byte that is 8 bits A group of 8x8 bits A byte that is 80 bits A short string of coding

EXPLANATION

An octet is a byte, that is eight bits. This unit of digital information is often used in computing and telecommunications when the term byte might be ambiguous,
since historically there was no standard definition for the size of the byte. The usage of the old term octad(e) for 8 bits is no longer common today. (wiki)
Share:

Tuesday, May 15, 2018

What is one of the primary weaknesses of symmetric cryptography?

What is one of the primary weaknesses of symmetric cryptography?

  • Hard disk storage
  • RAM memory requirement
  • CPU processing speed
  • Key Management 

What is one of the primary weaknesses of symmetric cryptography?

EXPLANATION

Symmetric cryptography is usually fast and easy to implement. This is because encryption and decryption with a private key requires less complex computation than other types of cryptography. The significant disadvantage of symmetric encryption relate to the difficulties of managing the private key.
 
Share:

Monday, May 14, 2018

Apple's Profile Manager is an example of what type of service?

Apple's Profile Manager is an example of what type of service?

  • MDM
  • ASM
  • APPL
  • DEP 

 
Apple's Profile Manager is an example of what type of service?

EXPLANATION

Apple's PRofile Manager is an example of a Mobile Device Management (MDM) service. Profile Manager can be used to control and distribute settings, apps and other content to Apple OSX and Apple iOS devices.

SOURCE

https://support.apple.com/profile-manager
Share:

Friday, May 11, 2018

Which of the following characters designates a class in CSS?

Which of the following characters designates a class in CSS?

  • #
  • !
  • .

 
 Which of the following characters designates a class in CSS?

EXPLANATION

The .class selector selects elements with a specific class attribute.  To select elements with a specific class, write a period (.) character, followed by the name of the class.

Definition and Usage

The .class selector selects elements with a specific class attribute.

To select elements with a specific class, write a period (.) character, followed by the name of the class.

You can also specify that only specific HTML elements should be affected by a class. To do this, start with the element name, then write the period (.) character, followed by the name of the class (look at Example 1 below).

HTML elements can also refer to more than one class (look at Example 2 below). 
Share:

In Windows, out of the following commands, which command line command will show you the last reboot time of your machine?

In Windows, out of the following commands, which command line command will show you the last reboot time of your machine?

  • net statistics workstation
  • netstat -a
  • get-uptime
  • uptime 

 
In Windows, out of the following commands, which command line command will show you the last reboot time of your machine?

EXPLANATION

The net statistics command displays the statistics log for the local Workstation or Server service, or the running services for which statistics are available. Used without parameters, net statistics lists the running services for which statistics are available.
The available parameters are:
workstation   : Displays statistics for the local Workstation service.
server   : Displays statistics for the local Server service.
net help   command   : Displays help for the specified net command.

https://technet.microsoft.com/en-us/library/bb490714.aspx

SOURCE

https://technet.microsoft.com/en-us/library/bb490714.aspx
Share:

Tuesday, May 8, 2018

Which type of backup site has the fastest recovery time?

Which type of backup site has the fastest recovery time?

  • Hot site
  • Cold site
  • Middle Site
  • Warm Site 

 
Which type of backup site has the fastest recovery time?

EXPLANATION

A hot backup site is a full duplicate of the source data center, so has the fastest recovery time but also the highest price tag. The warm site is a scaled-down hot site,
which includes basics like power, networking, and telecommunications that are active at all times. A cold site usually includes power and physical space when not in use, giving you the longest recovery window for the cheapest price.
Share:

Monday, May 7, 2018

In vSphere, what technology is used to perform a live migration of a VM to another host?

In vSphere, what technology is used to perform a live migration of a VM to another host?

  • Replication
  • VMotion
  • Cloning
  • Snapshots 

 
In vSphere, what technology is used to perform a live migration of a VM to another host?

EXPLANATION




VMware VMotion enables the live migration of running virtual machines from one physical server to another with no downtime, continuous service availability, and complete transaction integrity. It is transparent to users.



 www.mosaictec.com/tessera/what-is-vmotion.htm

Share:

Saturday, May 5, 2018

Which layer of the OSI model is responsible for managing and terminating the connections between the local and remote application?

Which layer of the OSI model is responsible for managing and terminating the connections between the local and remote application?

  • Application layer
  • Network layer
  • Data link layer
  • Session layer 

Which layer of the OSI model is responsible for managing and terminating the connections between the local and remote application?

EXPLANATION

The session layer controls the dialogues (connections) between computers.
It establishes, manages and terminates the connections between the local and remote application.
Share:

Thursday, May 3, 2018

In a Unix environment, what is a daemon?

In a Unix environment, what is a daemon?

  • A multicore processor type for Linux OS
  • A type of virus or malware
  • A different user interface or desktop
  • A program that runs as a background process

 
In a Unix environment, what is a daemon?

EXPLANATION

Wikipedia entry: A daemon is a computer program that runs as a background process,
rather than being under the direct control of an interactive user.
Share:

Cloud solutions that can tolerate failures yet still provide service are referred to as what?

Cloud solutions that can tolerate failures yet still provide service are referred to as what?

  • IaaS
  • Highly portable
  • PaaS
  • Highly available 

Cloud solutions that can tolerate failures yet still provide service are referred to as what?

EXPLANATION

High availability ensures that cloud solutions are always accessible.
This means eliminating single points of failure, such as storing data on a single hard disk or single network connections.
Share:

Tuesday, May 1, 2018

A user can receive email but cannot send any. Which protocol, responsible for sending email, is potentially not configured properly?

A user can receive email but cannot send any. Which protocol, responsible for sending email, is potentially not configured properly?

  • SNMP
  • FTP
  • POP3
  • SMTP

A user can receive email but cannot send any. Which protocol, responsible for sending email, is potentially not configured properly?

EXPLANATION

The simple mail transfer protocol (SMTP) is probably not configured properly.
When troubleshooting, you need to confirm the SMTP setting because it is responsible for sending mail. POP3 receives mail, so wouldn't be responsible for the send issue, unless you are using Outlook (where POP3 authentication is required before email can be sent over SMTP). FTP sends files to remote computers and SNMP is used to manage networks.
FTP and SNMP are not responsible for users sending or receiving email.

SOURCE

http://searchexchange.techtarget.com/definition/SMTP
Share:

Popular Posts