Friday, September 28, 2018
Thursday, September 27, 2018
What IEEE standard was Wired Equivalent Privacy first introduced?
What IEEE standard was Wired Equivalent Privacy first introduced?
EXPLANATION
IEEE introduced WEP in the 802.11 standard but updated it in the 802.1x.SOURCE
https://www.giac.org/paper/gsec/4214/wireless-security-ieee-80211-standards/106760Wednesday, September 26, 2018
An initialization vector should be which of the following?
An initialization vector should be which of the following?
- Repeatable and random
- Unique and predictable
- Unique and unpredicatable
- Repeatable and unique
EXPLANATION
An initialization vector (IV) should be unique and unpredictable. To prevent an attack,an IV must not be repeated with a given key and should appear random.
SOURCE
https://en.wikipedia.org/wiki/Initialization_vectorTuesday, September 25, 2018
Which type of RAID configuration requires minimum six drives?
Which type of RAID configuration requires minimum six drives?
- RAID 50 (RAID 5 + 0)
- RAID 100 (RAID 10+0)
- RAID 6
- RAID 60 (RAID 6 + 0)
EXPLANATION
RAID 50, also called RAID 5+0, combines the straight block-level striping of RAID 0 with the distributed parity of RAID 5.[3] As a RAID 0 array striped across RAID 5 elements, minimal RAID 50 configuration requires six drives.SOURCE
https://en.wikipedia.org/wiki/Nested_RAID_levelsIn sql, which of the following is applicable to the CHAR datatype?
In sql, which of the following is applicable to the CHAR datatype?
- CHAR stores alphanumeric characters of fixed size
- Stores alphanumeric characters of variable length
- to create scripts containing infinite characters
- Type as many characters as you want
EXPLANATION
The only difference between CHAR and VARCHAR2 is that CHAR stores fixed-length alphanumeric characters, between 1 and 2000 bytes or characters. If you are stored in the JUNIOR surname in a CHAR (50) column, a column will contain a JUNIOR string + 44 whitespaces that are automatically added to the total column volume.SOURCE
http://www.fabioprado.net/2011/08/qual-tipo-de-dado-devo-usar-char.htmlWhich of the following is NOT a computer programming language?
Which of the following is NOT a computer programming language?
- Lisp
- Occam
- SNOBOL
- Modal
EXPLANATION
MODAL isn't a programming language but is used in computer applications, especially within websites. It is a graphical window control element, subordinate to an application's main window.SNOBOL (StriNg Oriented and symBOlic Language), is a text-string-oriented language developed by AT&T Bell Labs in the 1960s.
LISP, developed in the 1950s, is one of the oldest high-level programming languages and is only pre-dated by the likes of FORTRAN.
OCCAM was one of the earliest Concurrent programming languages, developed by INMOS as the native programming language for their Transputer Microprocessors.
SOURCE
https://en.wikipedia.org/wiki/List_of_programming_languagesFriday, September 21, 2018
Access management is most affected by which of these aspects of cloud computing?
Access management is most affected by which of these aspects of cloud computing?
- Internet Service Provider
- Virtualization
- Federated Identity
- Cloud backup
EXPLANATION
Federated Identity allows you to use a central identity store both inside and outside of your organization. Cloud backup and Internet Service Provider have to do with IT service continuity management, not access management. Virtualization affects all IT processes, but not as much as identity federation.Tuesday, September 18, 2018
Which of the following events would you NOT expect to see in the Windows security log?
Which of the following events would you NOT expect to see in the Windows security log?
- Successful login attempts
- User account deleted
- Hardware driver failures
- Shutdown events
EXPLANATION
All of the above events will be logged in the Windows event log, however there are several different types of log that each contain relevant information.Application log - contains logging information of events generated by applications.
Security log - contains information related to logon attempts, password changes, group membership, etc.
System log - contains information related to Windows system components, such as driver failures. These logs are predetermined by Windows.
Setup log - contains events related to application setup
ForwardedEvents log - used to store events collected from remote computers
The above alerts appear in the Windows security log as:
Event ID 4624 - An account was successfully logged on
Event ID 4609 - Windows is shutting down
Event ID 4726 - User account was deleted
Hardware driver failures will appear in the system log
SOURCE
https://technet.microsoft.com/en-us/library/cc722404(v=ws.11).aspxMonday, September 17, 2018
Which layer of the OSI model does a packet exist on?
Which layer of the OSI model does a packet exist on?
- 3
- 1
- 2
- 4
EXPLANATION
Packets exist on the third, or Network, layer of the OSI model. The following are the counterparts for packets on the other layers: Layer 1 (Physical): bits; Layer 2 (Data Link): frames; Layer 4 (Transport): segments.
For additional discussion about this question please see https://community.spiceworks.com/topic/1867769-which-layer-of-the-osi-model-does-a-packet-exist-on-i...
SOURCE
https://en.wikipedia.org/wiki/OSI_model#Description_of_OSI_layersFriday, September 14, 2018
To send someone a secure e-mail message using PGP, you should use which of the following?
To send someone a secure e-mail message using PGP, you should use which of the following?
- The recipient's private key
- Your public key
- Your private key
- The recipient's public key
EXPLANATION
Pretty good privacy (PGP) can be used to send messages confidentially. For this, PGP combines symmetric-key encryption and public-key encryption. The message is encrypted using a symmetricencryption algorithm, which requires a symmetric key. Each symmetric key is used only once and is also called a session key. The message and its session key are sent to the receiver. The session key must be sent to the receiver so they know how to decrypt the message, but to protect it during transmission, it is encrypted with the receiver's public key. Only the private key belonging to the receiver can decrypt the session key.
https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Wednesday, September 12, 2018
In SQL, which of the following is the generally preferred way to handle the case where a transaction in progress terminates abnormally?
In SQL, which of the following is the generally preferred way to handle the case where a transaction in progress terminates abnormally?
- Rollforward
- Rollback
- Switch to duplicate database
- Reprocess transactions
EXPLANATION
A transaction is a logical unit of work that contains one or more SQL statements. A transaction is an atomic unit. The effects of all the SQL statements in a transaction can be either all committed (which means that they applied to the database) or allrolled back (undone from the database). So, if a transaction terminates abnormally, perform a rollback.
Tuesday, September 11, 2018
What VMware vSphere feature allows guest VMs to restart on another host in the event that their host fails?
What VMware vSphere feature allows guest VMs to restart on another host in the event that their host fails?
- DRS
- High availability
- Storage DRS
- Fault tolerance
EXPLANATION
VMware's High Availability (known to us lazy people as HA) allows guest VMs to restart on another host in the event of host failure. For example, if you have two hosts, both with VMs, and the first host has a hardware failure and becomes unresponsive, the VMs that were running on the failed host restart on the other host (provided it has the capacity to run them).Read more here: https://www.vmware.com/products/vsphere/features/high-availability
Thursday, September 6, 2018
Which of the following is NOT a Linux distro?
Which of the following is NOT a Linux distro?
- BSD
- Ubuntu
- Mint
- Red Hat
EXPLANATION
Berkeley Software Distribution (BSD) is a Unix operating system derivative developed and distributed by the Computer Systems Research Group(CSRG) of the University of California, Berkeley, from 1977 to 1995. Today the term "BSD" is often used non-specifically to refer to any of the BSD descendants which together form a branch of the family ofUnix-like operating systems. Operating systems derived from the original BSD code remain actively developed and widely used.
Wednesday, September 5, 2018
By default, what is the lowest permission needed to join computers to an Active Directory domain?
By default, what is the lowest permission needed to join computers to an Active Directory domain?
- Schema Admin
- Domain Admins
- Authenticated Users
- Enterprise Admins
EXPLANATION
By default any Authenticated User can add up to 10 computers to a domain. The risk with this could be that a user sets up a new workstation and give themselves an admin account on the computer, then add it to the domain using their domain account.With these elevated permissions they could do many things. Most notably, but not limited to, the higher chance of getting a virus on the system to an inexperienced user.
SOURCE
https://technet.microsoft.com/en-us/library/cc976452.aspxTuesday, September 4, 2018
In Unix systems, what are semaphores?
In Unix systems, what are semaphores?
- A technique for pipeline deletion inside processes
- A technique for coordinating or synchronizing activities
- A technique for pipeline creation inside threads
- A technique for Traffic lights management inside an operating system
EXPLANATION
In programming, especially in Unix systems, semaphores are a technique for coordinating or synchronizing activities in which multiple processes compete for the same operating system resources.A semaphore is a value in a designated place in operating system (or kernel) storage that each process can check and then change. Depending on the value that is found, the process can use the resource or will find that it is already in use and must wait for some period before trying again. Semaphores can be binary (0 or 1) or can have additional values. Typically, a process using semaphores checks the value and then, if it using the resource, changes the value to reflect this so that subsequent semaphore users will know to wait.
Semaphores are commonly use for two purposes: to share a common memory space and to share access to files. Semaphores are one of the techniques for interprocess communication (IPC). The C programming language provides a set of interfaces or "functions" for managing semaphores.
SOURCE
https://whatis.techtarget.com/definition/semaphoreMonday, September 3, 2018
With regards to DNS, what is the difference between an A record and an AAAA record?
With regards to DNS, what is the difference between an A record and an AAAA record?
- A record holds one IP for one host and AAAA record can hold up to four IPs for one host
- A record replies to one ping and AAAA record replies to four pings.
- A record is for the A-team and AAAA record is for a squad of A-teams.
- A record holds the IPv4 address and AAAA record holds the IPv6 address
EXPLANATION
An A and AAAA record are both primary DNS records. They associate a host name with a specific IP address, so that when a user types in a web address, their browser knows where to go for the actual website. An A record holds the IPv4 address and an AAAA record holds the IPv6 address.More info here - https://en.wikipedia.org/wiki/List_of_DNS_record_types