# Quiz

## What TCP port is SFTP or Secure File Transfer Protocol commonly used on?

### What TCP port is SFTP or Secure File Transfer Protocol commonly used on?

• 22
• 21
• 7777
• 69

#### EXPLANATION

Secure File Transfer Protocol is commonly placed on 22 as it is also known as File Transfer Protocol on SSH. Not to be confused with File Transfer Protocol over TLS/SSL or FTPS, as there are no answers for ports 989 or 990.
https://support.apple.com/en-us/HT202944
https://www.infobyip.com/tcpportchecker.php
Share:

## What TCP port is SFTP or Secure File Transfer Protocol commonly used on?

### What TCP port is SFTP or Secure File Transfer Protocol commonly used on?

• 7777
• 69
• 22
• 21

#### EXPLANATION

Secure File Transfer Protocol is commonly placed on 22 as it is also known as File Transfer Protocol on SSH. Not to be confused with File Transfer Protocol over TLS/SSL or FTPS, as there are no answers for ports 989 or 990.
https://support.apple.com/en-us/HT202944
https://www.infobyip.com/tcpportchecker.php
Share:

## Convert 101101 from binary to decimal!

### Convert 101101 from binary to decimal!

• 44
• 61
• 45
• 41

#### EXPLANATION

Each 1 represents a power of 2, so this is equivalent to 2^5 + 2^3 + 2^2 + 2^0, or 32 + 8 + 4 + 1 = 45.

1 x 1 = 1
0 x 2 = 0
1 x 4 = 4
1 x 8 = 8
0 x 16 = 0
1 x 32 = 32

1 + 4 + 8 + 32 = 45
Share:

## What date/time is UNIX time calculated based off of?

### What date/time is UNIX time calculated based off of?

• 00:00:00 31 December 1967
• 00:00:00 1 January 0000
• 00:00:00 1 January, 1900
• 00:00:00 1 January 1970

#### EXPLANATION

Epoch time, also known as Unix time, is defined as the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970 (not counting leap seconds).
Share:

## What range of values does Hexadecimal use?

### What range of values does Hexadecimal use?

• 0-9 and A-F
• 1-17
• 0-16
• 1-10 and A-E

#### EXPLANATION

In mathematics and computing, hexadecimal (also base 16, or hex) is a positional numeral system with a radix, or base, of 16. It uses sixteen distinct symbols, most often the symbols 0–9 to represent values zero to nine, and A, B, C, D, E, F(or alternatively a, b, c, d, e, f) to represent values ten to fifteen.

Share:

## The 'CAT' (Category) rating on a multimeter relates to its capability to

### The 'CAT' (Category) rating on a multimeter relates to its capability to:

• Survive in tough environments
• Reduce user hazards
• Maintain high accuracy
• Provide extended battery life

#### EXPLANATION

The Category rating, typically CAT I, II, III, IV etc, relates to the ability of the meter to avoid creating a safety hazard when subjected to a massive overload, as for example when inadvertently connected directly across a supply when on a current range. It does not necessarily imply that the meter will survive the abuse. Rather, that the result should not include user injury due to fire, insulation failure, arcing or bursting open of the case.

Budget meters sold for use on small electronic projects do not typically have the protection devices (Especially, high breaking-current fuses) fitted to meters intended for measurements on distribution boards, etc. Therefore anyone intending such work should choose a meter with a suitable CAT rating.

Share:

## When a user computer or device (like a cell phone, tablet, or printer) is having general, odd software problems, what is the most common easy fix?

### When a user computer or device (like a cell phone, tablet, or printer) is having general, odd software problems, what is the most common easy fix?

• Turn it off and on again
• Update the drivers
• Attach a debugger to the port
• Replace the flash memory

#### EXPLANATION

Computerized devices have become extremely complex in software and hardware interactions.
The highly interwoven tangle of software dependencies will frequently cause small memory leaks, resource contentions, and other unexpected results, cascading over time. Just like a deep cleaning in the kitchen is great for a chef to maintain food quality, a reboot is oftentimes the quickest and easiest way to get a misbehaving system to clear its slate and get back into an operating state.
Sadly, since the concept is so simple and seems inane, many users will not do it when instructed. Performing this quick and basic step first thing will often correct the original issue and if it doesn't (and the user complains they did it already), it still provides the benefit of starting troubleshooting with the knowledge that you're starting from a basic system state.
Share:

## According to ITIL, which of the following should IT services provide to customers?

### According to ITIL, which of the following should IT services provide to customers?

• Skills
• Risk
• Value
• Costs

#### EXPLANATION

From the customer's point of view the value of a service consists of two basic elements:

Utility: The functionality offered by a product or service to meet a particular need. Utility can be summarized as ‘what the service does’, and can be used to determine whether a service is able to meet its required outcomes, or is ‘fit for purpose’. The business value of an IT service is created by the combination of utility and warranty.

Warrancy: Assurance that a product or service will meet agreed requirements. This may be a formal agreement such as a service level agreement or contract, or it may be a marketing message or brand image. Warranty refers to the ability of a service to be available when needed, to provide the required capacity, and to provide the required reliability in terms of continuity and security. Warranty can be summarized as ‘how the service is delivered’, and can be used to determine whether a service is ‘fit for use’. The business value of an IT service is created by the combination of utility and warranty.

#### SOURCE

https://www.axelos.com/Corporate/media/Files/Glossaries/ITIL_2011_Glossary_GB-v1-0.pdf
Share:

## In IT, the term kilobyte (KB) is traditionally used to connote which of the following?

### In IT, the term kilobyte (KB) is traditionally used to connote which of the following?

• 10000 bytes
• 1024 bytes
• 512 bytes
• 2048 bytes

#### EXPLANATION

Because computers are binary (base 2) instead of decimal (base 10), 1KB would be 2 to the 10th bytes, or 1024.

In fact, the definition of KB (kilobytes) was changed in 1998 to match up with SI units, the current term for 1024 bytes is Kibibyte (https://en.wikipedia.org/wiki/Kibibyte). That said, most IT pros still prefer the traditional definition of KB as 1024 bytes, since it's the most common way to refer to computing capacity.

For further information about these terms, see http://www.iec.ch/si/binary.htm andhttp://physics.nist.gov/cuu/Units/binary.html
Share: