IT Questions and Answers :)

Tuesday, June 19, 2018

Which of the following languages requires server-side interpretation?

Which of the following languages requires server-side interpretation?

  • CFML
  • XML
  • Java
  • CSS 

 
Which of the following languages requires server-side interpretation?

EXPLANATION

ColdFusion Markup Language (CFML) is a scripting language that augments standard HTML files with database commands, conditional operators, high-level formatting functions, and other elements to produce web applications. CFML also includes numerous other constructs, including ColdFusion Components (CFCs), CFML's version of objects, which allow for separation of business logic from presentation.
CFML can be written using either tags or CFScript, which is an ECMA script-style language.
The pages in a CFML application include the server-side CFML tags and functions in addition to HTML tags. Modern CFML applications also tend to have CFCs that are accessed by the CFML pages for executing business logic. When a web browser requests a page in a ColdFusion application, it is automatically pre-processed by the ColdFusion application server.
ability
CFML can also be used to generate other languages,such as XML, JavaScript, and CSS.
Source: https://en.wikipedia.org/wiki/ColdFusion_Markup_Language

Share:

Monday, June 18, 2018

Heaps and stacks are affected by which of the following attacks?

Heaps and stacks are affected by which of the following attacks?

  • Buffer overflows
  • Ping flood
  • SQL injection
  • Cross site scripting 

 
Heaps and stacks are affected by which of the following attacks?

EXPLANATION

Heaps and stacks are data structures that can be affected by buffer overflows. A buffer overflow vulnerability allows an attacker to corrupt the execution stack of an application by inserting data into adjacent memory locations. This can cause application or operating system instability or, in the hands of a skilled attacker, even allow arbitrary code execution.

SQL Injection is a vulnerability that allows an attacker to query or manipulate a database using user input fields.
Cross site scripting is a vulnerability that allows for an attacker to inject client site scripts into web pages that is intended to be executed by other users.

A ping flood is a method of performing denial of service (DoS or DDoS) against network devices.
Share:

Friday, June 15, 2018

The VHDX virtual hard disk format supports what maximum storage capacity?

The VHDX virtual hard disk format supports what maximum storage capacity?

  • 640GB
  • 6.4PB
  • 64TB
  • 6.4TB 

 
The VHDX virtual hard disk format supports what maximum storage capacity?

EXPLANATION

The VHDX disk format supports virtual hard disks as large as 64TB with power failure resiliency.


Share:

Thursday, June 14, 2018

Which of the following features of cloud computing matches resources to the current demand?

Which of the following features of cloud computing matches resources to the current demand?

  • Elasticity
  • Security
  • Redundancy
  • Availability 

Which of the following features of cloud computing matches resources to the current demand?

EXPLANATION

Elasticity refers to the ability of a cloud service to scale on demand. Resources such as storage, bandwidth, or memory can be provisioned in a matter of minutes and scaled down when no longer needed.
https://en.wikipedia.org/wiki/Elasticity_(cloud_computing)
Share:

Tuesday, June 12, 2018

What does a hop count of 16 mean in RIPv1?

What does a hop count of 16 mean in RIPv1?

  • The administrative distance is 16
  • The destination is an infinite distance away and unreachable
  • The device is 16 hops away
  • It established a 16 Mb connection to the device 
What does a hop count of 16 mean in RIPv1?

EXPLANATION




RIPv1 is a Classful routing protocol. Classful routing protocols support only the networks which are not subnetted. The maximum number of hops allowed for RIP is 15,
which limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and the route is considered unreachable.

Share:

In a Windows command script (cmd.exe), what does the string %~dp0 stand for?

In a Windows command script (cmd.exe), what does the string %~dp0 stand for?

  • The script's current working directory
  • The path, including drive, where the script resides
  • The user's home directory
  • The system's temp directory 

EXPLANATION


In the help for the FOR command, the %~ format for variable expansion is discussed.  This can be used outside of the FOR command as well.  The following options are relevant:
%~dI - expands %I to a drive letter only
%~pI - expands %I to a path only
The modifiers can be combined to get compound results, so
%~dp0 - expands %I to a drive letter and path only
Finally, %0 is the built-in variable reference to the path to the batch file that includes the file name (i.e. the 0th argument to the cmd.exe program).
The script's current working directory is returned using cd with no arguments.  It isn't necessarily the same as the script's parent directory, especially if the script is run from a non-system drive or UNC path.  In the latter case, the working directory can end up being set to the Windows directory.
The user's home directory is referenced by the "%HOMEDRIVE%\%HOMEPATH%" or %USERPROFILE% envars.
The system temp directory is referenced by the %TEMP% envar.

SOURCE

http://stackoverflow.com/questions/5034076/what-does-dp0-mean-and-how-does-it-work
Share:

Saturday, June 9, 2018

Which BASH internal variable holds the exit status of the previous command or function?

Which BASH internal variable holds the exit status of the previous command or function?

  • $?
  • $_
  • $@
  • $$ 

 
Which BASH internal variable holds the exit status of the previous command or function?

EXPLANATION

$? is a special variable that is internal to the BASH interpreter. It is used to hold the exit code of the previously executed command or function (or even the script itself).

Example:

#!/bin/bash

/bin/true
echo $? #prints 0

/bin/false
echo $? #prints 1

/bin/foobar
res=$?
if [ $res -ne 0 ]
then
  echo "Command foobar failed to execute or exited with a non-zero status: $res"
else
   echo "Command foobar exited successfully"
fi

Share:

Thursday, June 7, 2018

The intersection of a column and row in a spreadsheet is called a bon or a __?

The intersection of a column and row in a spreadsheet is called a bon or a __?

  • Cell
  • Box
  • Key
  • Field 
The intersection of a column and row in a spreadsheet is called a bon or a __?

 

EXPLANATION





The intersection of a vertical column and horizontal row is called a cell.The location, or address, of a specific cell is identified by using the headers of the column and row involved. For example, cell "F2" is located at the spot where column "F" and row "2" meet.

Share:

Wednesday, June 6, 2018

Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?

Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?

  • TCP Syn Scan
  • Mail bombing
  • Spam
  • Flood pings 

 
Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?

EXPLANATION




 A mail bomb attack sends massive amounts of email to a specific person or system.
A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and cause the server to stop functioning.

Share:

Tuesday, June 5, 2018

If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?

If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?

  • 1 TB
  • 4 TB
  • 2 TB
  • 1.5 TB 
If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?

 EXPLANATION

RAID 10 contains two sets of mirrored drives, and each mirrored set takes two 500 GB drives to store 500 GB of data.
The data will be striped across the two sets for a total of 1 TB usable storage.
Share:

In Windows Active Directory, what are Group Policy Objects?

In Windows Active Directory, what are Group Policy Objects?

  • Settings that define what a system should look like and how it will behave
  • They determine the hierarchy of a domain, which can fit the operational structure of an organization
  • A set of folder rules that determine where Outlook will save email messages
  • Affords the capability for secure extension of network operations to the Web 

 
In Windows Active Directory, what are Group Policy Objects?

EXPLANATION

Group Policy, in part, controls what users can and cannot do on a computer system: for example, to enforce a password complexity policy that prevents users from choosing an overly simple password, to allow or prevent unidentified users from remote computers to connect to a network share, to block access to the Windows Task Manager or to restrict access to certain folders. A set of such configurations is called a Group Policy Object (GPO)
See: http://searchwindowsserver.techtarget.com/definition/Group-Policy-Object

Share:

Friday, June 1, 2018

The Betamax was to VHS, as

The Betamax was to VHS, as

  • DASD is to SAN
  • Terminate and Stay Resident is to Internal OS Commands
  • Switching is to Routing
  • Token-Ring is to Ethernet 

The Betamax was to VHS, as

EXPLANATION

One one time in the 1980s Ethernet and Token-Ring were very competitive, vying for the same customers and networks, replacing Arcnet (similar to Token-Ring) an older network topology.  Speed and reliability of Ethernet versus Token-Ring was the difference maker, and eventually Token-Ring is no longer used nor supported.

SOURCE

http://www.eweek.com/networking/30-years-ago-networking-in-the-1980s-meant-ethernet-vs.-token-ring
Share:

Popular Posts