IT Questions and Answers :)

Tuesday, July 31, 2018

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

  • find /var -name "*.log"
  • mv "*.log"
  • ls -l *.log
  • find / | grep "*.log" 

 

EXPLANATION

The "find" command specifies the directory, "/var". The "-name" option tells the "find" command to show only files that have a ".log" extension.

SOURCE

https://quiz.techlanda.com/2017/11/in-unix-which-of-following-commands.html
Share:

Where is the iSCSI protocol typically used?

Where is the iSCSI protocol typically used?

  • File sharing
  •  SANs (Storage Area Networks)
  • Inter-site routing
  • Internal drive arrays 

 
Where is the iSCSI protocol typically used?

EXPLANATION

iSCSI (Internet Small Computer System Interface) works on top of TCP and allows SCSI
commands to be sent over a network to iSCSI storage devices. This allows for a low cost SAN infrastructure using standard network hardware.

Share:

Friday, July 27, 2018

What is the advantage of coaxial cable over STP or UTP?

What is the advantage of coaxial cable over STP or UTP?

  • It can run for a longer distance unboosted
  • It is easier to splice.
  • It is less expensive
  • It is easier to install because it is so flexible 

 
What is the advantage of coaxial cable over STP or UTP?

EXPLANATION

Coaxial cable conducts the electrical signal using an inner conductor (usually copper) surrounded by an insulating layer. The whole works are enclosed by a one to four layer shield. This makes coaxial cable thicker than STP or UTP, so harder to install and splice. It also makes it more expensive. But, it has the advantage of being able to carry large quantities of data over a longer distance unboosted.
Share:

Thursday, July 26, 2018

When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

  • Annual
  • KMS
  • Perpetual
  • MAK 

 
When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

EXPLANATION

Google allows a Google GSuite console to move licenses to a different Chrome device, but there are differences. There are a Annual and Perpetual. Perpetual licenses are a one time purchase for a single type of device. If that device breaks and is replaced with the same model, you can transfer the license to that device. If you would replace it with a different type and model of device, you would have to purchase an additional license.
An annual license is bought per term and in the case of this, you can transfer the license to any new devices, regardless of the model and type during the license term.
Also, different versions of GSuite support different licensing models. GSuite Enterprise supports Annual and Perpetual, whereas GSuite Education and GSuite Nonprofit only supports Perpetual.

SOURCE

https://support.google.com/chrome/a/answer/2717664?hl=en
Share:

Wednesday, July 25, 2018

Which of the following is NOT a fork of Nagios Core network monitoring system?

Which of the following is NOT a fork of Nagios Core network monitoring system?

  • Naemon
  • Shinken
  • Check MK
  • Icinga 

 
Which of the following is NOT a fork of Nagios Core network monitoring system?

EXPLANATION

Nagios Core is a free and open source computer-software application that monitors systems, networks and infrastructure, initially released in 1999.
Icinga is an open source computer system and network monitoring application. It was originally created as a fork of the Nagios system monitoring application in 2009.
Naemon is an open source computer system monitoring, network monitoring and infrastructure monitoring software application. Initial release 2015 and based on Nagios 4 core.
Shinken is an open source computer system and network monitoring software application. Released as a fork of Nagios in 2009.
Check_MK is an extension to the Nagios monitoring system that allows creating rule-based configuration using Python and offloading work from the Nagios core to make it scale better, allowing more systems to be monitored from a single Nagios server. Initial release 2008.

SOURCE

https://en.wikipedia.org/wiki/Nagios#See_also
Share:

Tuesday, July 24, 2018

Which of the following is the port used for POP3 SSL Traffic?

Which of the following is the port used for POP3 SSL Traffic?

  • 587
  • 995
  • 25
  • 110
Which of the following is the port used for POP3 SSL Traffic?

EXPLANATION

POP uses port 110, but SSL/TLS encrypted POP uses port 995.

SOURCE

https://www.fastmail.com/help/technical/ssltlsstarttls.html
Share:

Monday, July 23, 2018

In programming, which of the following is a mechanism by which an object acquires the properties of another object?

In programming, which of the following is a mechanism by which an object acquires the properties of another object?

  • Anamorphism
  • Inheritance
  • Encapsulation
  • Polymorphism 

 
In programming, which of the following is a mechanism by which an object acquires the properties of another object?

EXPLANATION

‘Inheritance’ is the mechanism provided by Object Oriented Language, which helps an object to acquire the properties of another object usually child object from parent object.

SOURCE

https://en.wikipedia.org/wiki/Inheritance_(object-oriented_programming)
Share:

Friday, July 20, 2018

What does the sender need in order to digitally sign an email?

What does the sender need in order to digitally sign an email?

  • The public key of the recipient
  • The public key of the sender
  • The private key of the recipient
  • The private key of the sender 

EXPLANATION

A digital signature is created by hashing a message and encrypting the hash with the sender's private key. The recipient can then decrypt the hash with the sender's public key. The recipient's keys are not used for a digital signature.

The sender's public key is NOT required to sign the message.
The sender's public key (in the possession of the recipient) is used verify signature.
The recipient's public key is meaningless in this scenario.
The recipient's private key is meaningless in this scenario.  

A general overview of this process can be found here https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq

SOURCE

https://en.wikipedia.org/wiki/Public-key_cryptography#Digital_signatures
Share:

Thursday, July 19, 2018

In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

  • NTFS
  • exFAT
  • HFS
  • REFS 

 
In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

EXPLANATION

Both Windows and Apple machines can read drives formatted in FAT32.  Apple can read NTFS but cannot write to it.

SOURCE

https://www.laptopmag.com/articles/format-drive-for-windows-and-mac
Share:

Tuesday, July 17, 2018

Which of these is an valid email address?

Which of these is an valid email address?

  • All of them
  • Michael.Scarn@[117.42.15.92]
  • "dogs@r.com"@catsrule.com
  • Security+@comptia.org 

 

EXPLANATION

Based on RFC 5322,
email address can have two "@" symbols as long as the first one is in quotation marks to identify the local name versus the domain name.  IP addresses can be used to identify the domain name.  The "+" symbol is valid in local names.


SOURCE

https://tools.ietf.org/html/rfc5322
Share:

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

  • DirectX
  • Hyper-threading
  • Hardware Enforced Data Execution Prevention (DEP)
  • MMX4 

 

EXPLANATION

Hyper-V virtualization technology requires specific hardware. You can identify systems that support x64-based architecture and Hyper-V by searching the Windows Server Catalog for Hyper-V: Windows Server catalog.
Hyper-V Server has hardware requirements that are similar to those for the Hyper-V role in other editions of Windows Server. Hardware-enforced Data Execution Prevention (DEP) must be available and enabled. Specifically, you must enable the Intel XD (“execute disable”) bit or the AMD NX (“no execute”) bit.


SOURCE

https://technet.microsoft.com/en-us/library/cc731898(v=ws.11).aspx
Share:

Friday, July 13, 2018

A standard rectangular male USB connector (for example, the connector on most mouse/ cables) is what type of connector?

A standard rectangular male USB connector (for example, the connector on most mouse/ cables) is what type of connector?

  • USB Type C
  • USB Type B
  • Micro USB 3.0
  • USB Type A 

A standard rectangular male USB connector (for example, the connector on most mouse/ cables) is what type of connector?

EXPLANATION

standard male USB
 connector for peripheral devices is known as a USB Type A Male connector.  Type B is the more squared or house shaped connector that is commonly used on printers or scanners to connect to a computer
Share:

Thursday, July 12, 2018

Which term from the past describes the sharing of mainframe computing resources?

Which term from the past describes the sharing of mainframe computing resources?

  • XaaS
  • Time-sharing
  • Time division multiplexing
  • Mainframe sharing 

 
Which term from the past describes the sharing of mainframe computing resources?

EXPLANATION

Time-sharing allowed groups of people to use expensive mainframe computing resources concurrently by working in isolated computing sessions.
Time division multiplexing is a signal transmission protocol.
Mainframe sharing is not an industry-accepted term.
XaaS refers to any web service delivered over the Internet (Anything as a Service) and thus is incorrect
Share:

Wednesday, July 11, 2018

In Linux, what's the difference between a hard link and a symbolic link?

In Linux, what's the difference between a hard link and a symbolic link?

  • A hard link does not depend on software libraries, a soft link does.
  • A hard link persists across OS reboots, a symbolic link does not.
  • Normal users can use only symbolic links, only the "root" user can use hard links.
  • A hard link points to a file's inode, a symbolic link is a pointer to the file. 

In Linux, what's the difference between a hard link and a symbolic link?

EXPLANATION

Symbolic links are much more common than hard links. They are aliases to an already existing file, and deleting the symbolic link will leave the existing file intact.
Renaming the file will break the link.  Hard links point to the very same filesystem inode used by the target file, so renaming the target file will have no effect on the hard link-- it will still point to the original file.  If for some reason the file targeted by a hard link is moved to a different spot in the filesystem, the hard link will no longer be valid.  Symbolic links are much more common than hard links.
Share:

Tuesday, July 10, 2018

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

  • Left Outer Join
  • Right Outer Join
  • Inner Join
  • Cross inner join 

In Crystal Reports, what type of Join statement lists values from all records of the right table and only records of the left table where the join fields match?

EXPLANATION

Right Outer Join lists all records from the right table and those in the left that match only.
Left Outer join lists all values from the left table and only those in the right table where the join fields match
Inner Join only shows values in the tables where the join fields match.
Cross Inner join is not a valid join type

SOURCE

http://us.flukecal.com/literature/technical-bulletins/metcal/application-note/setting-join-types-crystal-reports
Share:

Monday, July 9, 2018

Which of the following are Fax over IP Protocol(s)?

Which of the following are Fax over IP Protocol(s)?

  • t.38
  • H.323 and H.404
  • M.16 and M.204
  • k.30 and k.38 

 
Which of the following are Fax over IP Protocol(s)?

EXPLANATION

The T.38 fax relay standard was devised in 1998 as a way to permit faxes to be transported across IP networks between existing Group 3 (G3) fax terminals. T.4 and related fax standards were published by the ITU in 1980, before the rise of the Internet. In the late 1990s, VoIP, or Voice over IP, began to gain ground as an alternative to the conventional Public Switched Telephone Network. However, because most VoIP systems are optimized
(through their use of aggressive lossy bandwidth-saving compression) for voice rather than data calls, conventional fax machines worked poorly or not at all on them due to the network impairments such as delay, jitter, packet loss, and so on. Thus, some way of transmitting fax over IP was needed.

SOURCE

https://www.3cx.com/pbx/foip/
Share:

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

  • Randomly 15-60 minutes later
  • During windows updates
  • During their next reboot
  • During the user's next logon 

 
With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

EXPLANATION

You can assign a program distribution to users or computers. If you assign the program to a user, it is installed when the user logs on to the computer. When the user first runs the program, the installation is completed. If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. When a user first runs the program, the installation is completed.

SOURCE

https://technet.microsoft.com/en-us/library/cc753768(v=ws.11).aspx
Share:

Which is the correct method for defining a function in PHP

Which is the correct method for defining a function in PHP

  • function myFunction($arg_n) { return $retval; }
  • Function myFunction(p1) myFunction = (p1 - 32) End Function
  • int myFunction(int p1) { return p1; }
  • function myFunction(p1, p2) { return p1 * p2; } 

 
Which is the correct method for defining a function in PHP

EXPLANATION


Its very easy to create your own PHP function. Suppose you want to create a PHP function which will simply write a simple message on your browser when you will call it. Following example creates a function called writeMessage() and then calls it just after creating it.
Note that while creating a function its name should start with keyword function and all the PHP code should be put inside { and } braces as shown in the following example below −

<?php
    /* Defining a PHP Function */
    function writeMessage() {
    echo "You are really a nice person, Have a nice time!";
    }
         
    /* Calling a PHP Function */
    writeMessage();
?>

For more information check out: http://php.net/manual/en/functions.user-defined.phpThe other answers and their language is below:
function myFunction(p1, p2) { return p1 * p2; } is JavaScript
Function myFunction(p1) myFunction = (p1 - 32) End Function is VBScript
int myFunction(int p1) { return p1; } is C
Share:

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

  • Randomly 15-60 minutes later
  • During windows updates
  • During their next reboot
  • During the user's next logon 

 
With Windows assigned software packages distributed via Group Policy (to computers), when are packages installed on endpoints?

EXPLANATION

You can assign a program distribution to users or computers. If you assign the program to a user, it is installed when the user logs on to the computer. When the user first runs the program, the installation is completed. If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. When a user first runs the program, the installation is completed.

SOURCE

https://technet.microsoft.com/en-us/library/cc753768(v=ws.11).aspx
Share:

Which of the following is not a system role in vCenter?

Which of the following is not a system role in vCenter?

  • Administrator
  • Read Only
  • No Access
  • Virtual Machine User (Power User) 
Which of the following is not a system role in vCenter?

EXPLANATION

Virtual Machine User is a sample role on the vCenter system of permissions - No Access, Administrator and Read Only are the system roles which are not customizable.

SOURCE

https://pubs.vmware.com/vsphere-60/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-60-security-guide.pdf
Share:

What is the maximum number of USB devices a host controller can handle?

What is the maximum number of USB devices a host controller can handle?

  • 128
  • 155
  • 64
  • 127 

 
What is the maximum number of USB devices a host controller can handle?

EXPLANATION

At 7 bits long, a single USB Host Controller can allow up to 127 (2^7 – 1 Host Controller) connected devices.

USB hubs can be cascaded up to seven times, the maximum number of user devices is reduced by number of hubs. So, with 19 hubs attached, the maximum number of available devices is reduced 127 − 19 = 108.

SOURCE

https://en.wikipedia.org/wiki/USB_hub (Physical Layout section)
Share:

What type of DNS record is used by the Sender Policy Framework (SPF)?

What type of DNS record is used by the Sender Policy Framework (SPF)?

  • TXT
  • MX
  • A
  • CNAME 

 
What type of DNS record is used by the Sender Policy Framework (SPF)?

EXPLANATION







Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing. The SPF is an open standard specifying a technical method to prevent sender-address forgery. SPF allows administrators to specify which hosts are allowed to send mail on behalf of a given domain by creating a specific SPF record (or TXT record) in the Domain Name System (DNS). Mail exchangers use DNS records to check that mail from a given domain is being sent by a host sanctioned by that domain's administrators.

Share:

What's a network segment for public-facing servers that's separated from a private, trusted network by a firewall?

What's a network segment for public-facing servers that's separated from a private, trusted network by a firewall?

  • DMZ
  • NSA
  • VPN
  • ATA 

What's a network segment for public-facing servers that's separated from a private, trusted network by a firewall?

EXPLANATION

A DMZ, or demilitarized zone, is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN).

SOURCE

http://www.ciscopress.com/articles/article.asp?p=1823359
Share:

To avoid data corruption, which of the following should you do before performing fsck on a file system?

To avoid data corruption, which of the following should you do before performing fsck on a file system?

  • Reboot the machine
  • Create a new data partition
  • Unmount the file system
  • Ensure the file system is mounted 

 
To avoid data corruption, which of the following should you do before performing fsck on a file system?

EXPLANATION

The fsck command is used to check and repair one or more Linux file systems. Running fsck on a mounted file system can cause data or disk corruption. Instead, you can do one of the following:
(a) Take down system to single user mode and unmount the system
(b) Boot from the installation CD

Share:

On systems running MS Windows, which OS service manages the print queue?

On systems running MS Windows, which OS service manages the print queue?

  • Spooler
  • LPD
  • RAW daemon
  • Print manager 

 
On systems running MS Windows, which OS service manages the print queue?

EXPLANATION

The spooler service manages print jobs on Windows OS PCs.  Sometimes this service can get "stuck" and otherwise interrupt printing.  A quick and effective troubleshooting idea is to simply stop and restart the service.  This is done through an elevated command prompt:

net stop spooler

Then restart using the following:
net start spooler
Share:

Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

  • Add-MailboxFolderPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Set-MailboxFolderPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Set-MailboxPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner
  • Add-MailboxPermission -Identity User1@contoso.com:\Calendar -User User2 -AccessRights Owner 

 
Which of the following Powershell commands would give User2 access to User1's calendar? User2 does not currently have access to anything of User1's

EXPLANATION

There are two things to notice.  First is that you're trying to give new permissions to User2 and not change current permissions of User2 within User1's mailbox.  So we'll want to use Add instead of Set.  Set is used to change permissions if a user already has some sort of permissions within the mailbox.
The second thing is that the calendar is a folder within the mailbox.  We don't want User2 to be able to read User1's emails, so we'll do Add-MailboxFolderPermission instead of Add-MailboxPermission.

SOURCE

https://technet.microsoft.com/en-us/library/dd298062(v=exchg.160).aspx
Share:

In Windows, If you close a tab in Firefox/Chrome/IE, what key command will re-open it for you?

In Windows, If you close a tab in Firefox/Chrome/IE, what key command will re-open it for you?

  • Ctrl-Shift-T
  • Ctrl-T-O
  • Ctrl-Alt-T
  • Ctrl-Alt-O-T 

 
In Windows, If you close a tab in Firefox/Chrome/IE, what key command will re-open it for you?

EXPLANATION

When you realize you just closed that browser tab that you have kept open for the last 4 days... just in case. You can easily now just  type "Ctl - Shift - T" to get it back.

SOURCE

http://www.slate.com/blogs/future_tense/2013/08/22/keyboard_shortcut_helps_recover_lost_browser_tabs.html
Share:

Popular Posts