IT Questions and Answers :)

Wednesday, January 26, 2022

Which of the following is a text based e-mail client for Unix

Which of the following is a text based e-mail client for Unix

  • goat
  • moo
  • puss
  • mutt      
Which of the following is a text based e-mail client for Unix


EXPLANATION

Mutt is a text-based email client for Unix-like systems. It was originally written by Michael Elkins in 1995 and released under the GNU General Public License version 2 or any later version

The Mutt slogan is "All mail clients suck. This one just sucks less."

www.mutt.org 



SOURCE

http://www.mutt.org/         
Share:

Wednesday, October 6, 2021

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?

  • 180 days
  • 30 days
  • 6 months
  • 24 hours  

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?


EXPLANATION

Tombstone lifetime is the amount of time a deleted directory object remains in storage before it is permanently deleted.  This value is unique in the forest.

For new Active Directory forests, the default Tombstone Lifetime (TSL) is 180 days.

While some may point out that the default value can be 60 days, this only is true for existing forests whose original forest root Domain Controller was created while running Windows Server 2003 R2 SP1 or earlier operating systems.  Certainly, at the time of this writing, nobody would be creating a new forest using Windows Server 2003 R2 SP1.


SOURCE

Share:

Monday, September 27, 2021

When two systems first connect using SSH they exchange their....

When two systems first connect using SSH they exchange their....

  • Public key
  • Private key
  • Passphase
  • Password      

When two systems first connect using SSH they exchange their....


EXPLANATION

When two systems first connect using SSH they exchange their public keys with each other.

SOURCE

Share:

Friday, September 3, 2021

Which target attribute is used with links to force the web browser to open the link in a new tab or window?

Which target attribute is used with links to force the web browser to open the link in a new tab or window?

  • _new
  • _reload
  • _top
  • _blank               
Which target attribute is used with links to force the web browser to open the link in a new tab or window?


EXPLANATION

The target attribute specifies where the linked document will open when the link is clicked. The default is the current window. If target="_blank", the linked document will open in a new tab or (on older browsers) a new window.  

Share:

Thursday, August 12, 2021

In which layer of the OSI model does the ICA protocol from Citrix operate?

In which layer of the OSI model does the ICA protocol from Citrix operate?

  • Transport
  • Application
  • Presentation
  • Physical               

In which layer of the OSI model does the ICA protocol from Citrix operate?


EXPLANATION

 The Independent Computing Architecture (ICA) protocol operates at the presentation layer of the OSI model, that is, the 6th layer. ICA is a Windows presentation services protocol from Citrix that provides the foundation for turning any client device-thin or fat-into the ultimate thin client. In the case of the ICA protocol, the 6th layer or the presentation layer is responsible for making sure the data can be presented to the application layer, in other words, the presentation layer prepares/formats the data making it ready to be passed up to the application layer.

SOURCE

http://s3.amazonaws.com/legacy.icmp/additional/ica_acceleration_0709a.pdf
Share:

In a ISA type system, what DMA channel was always assigned to the system board?

In a ISA type system, what DMA channel was always assigned to the system board?

  • 3
  • 0
  • 7
  • 5               

In a ISA type system, what DMA channel was always assigned to the system board?



EXPLANATION

http://www.pchell.com/hardware/irqs.shtml

SOURCE

http://www.pchell.com/hardware/irqs.shtml
Share:

Friday, July 30, 2021

What international standard describes requirements for an information security management system (ISMS)?

What international standard describes requirements for an information security management system (ISMS)?

  • GDPR
  • ISO/IEC 27001
  • ISO/IEC 27000
  • ISO/IEC 27002  
What international standard describes requirements for an information security management system (ISMS)?



EXPLANATION

"Standards aren’t the same as regulations and following a standard doesn’t guarantee that you’re within the relevant laws."

GDPR is a data privacy law/regulation created by the European Union (EU). It has an "extra-territorial effect" to protect data belonging to EU citizens and residents. This not only applies to EU-based organizations but also that in another region, which target or collect data related to people from European Economic Area (EEA).

ISO 27000 has an overview of ISMS and it contains terms and definitions.
ISO 27002 has guidelines and it's optional. However, there are useful tips related to the implementation of controls and requirements, which are provided in ISO 27001.

SOURCE

Share:

Thursday, July 29, 2021

On an RPM based Linux server what command would you use to update software from the command line

On an RPM based Linux server what command would you use to update software from the command line

  • apt
  • nano
  • sup
  • yum              

On an RPM based Linux server what command would you use to update software from the command line


EXPLANATION

YUM allows automatic updates, package and dependency management, on RPM-based distributions. Like the Advanced Package Tool (APT) from Debian, YUM works with software repositories (collections of packages), which can be accessed locally[4] or over a network connection.

SOURCE

Share:

What is commonly used to convert DHCP broadcast messages to unicast messages and forward them to DHCP servers on a separate subnet?

What is commonly used to convert DHCP broadcast messages to unicast messages and forward them to DHCP servers on a separate subnet?

  • DHCP Relay Agent
  • DHCP Reservation
  • DHCP Filter
  • DHCP Forwarder         

What is commonly used to convert DHCP broadcast messages to unicast messages and forward them to DHCP servers on a separate subnet?


EXPLANATION

Generally, DHCP messages are broadcasted. So, in order for the messages to be exchanged between a DHCP client (PC) and DHCP server, both the client and server have to reside on the same subnet. That is because routers do not forward any broadcast IP packet (i.e. one with a destination MAC address of FF:FF:FF:FF:FF:FF and a destination IP address of 255.255.255.255) to other interfaces. Thus, a broadcast DHCP packet sent by a DHCP client cannot be delivered to DHCP server(s) on different subnet(s) through a router.

To address this problem, the concept of a DHCP relay agent has long been adopted.  The core function of this DHCP relay agent is to convert broadcast DHCP packets into unicast messages and then forward them to DHCP servers


SOURCE

Share:

Tuesday, July 27, 2021

Which version of Windows introduced the Metro user interface, which can be used on desktops, laptops, mobile phones, and tablets?

Which version of Windows introduced the Metro user interface, which can be used on desktops, laptops, mobile phones, and tablets?

  • Windows XP
  • Windows 8
  • Windows 7
  • Windows Vista           
Which version of Windows introduced the Metro user interface, which can be used on desktops, laptops, mobile phones, and tablets?


EXPLANATION

Metro is a new “design language” of Microsoft. A new concept aimed at changing the logic of construction and work of the operating system and applications, as well as the scheme of interaction between the user and the electronic device.

The basic principles of construction and appearance were largely borrowed from the information systems of transport nodes. The inscriptions and graphical elements in these systems are subject to quite specific requirements: very high readability and visual perceptibility of information, absence of unnecessary distractions, clean and clear view of all external elements.


SOURCE

https://designmodo.com/metro-ui/
    
Share:

Which category cabling is theoretically the fastest and recommended for use in VOIP where throughput of greater than 100Mbps is desired?

Which category cabling is theoretically the fastest and recommended for use in VOIP where throughput of greater than 100Mbps is desired?

  • CAT-5
  • CAT-3
  • CAT-5a
  • CAT-6              

Which category cabling is theoretically the fastest and recommended for use in VOIP where throughput of greater than 100Mbps is desired?


EXPLANATION

CAT-6 cabling should be used where throughput of greater than 100Mbps is desired.

SOURCE

Share:

Which of the following is the default port used for POP3 SSL Traffic?

Which of the following is the default port used for POP3 SSL Traffic?

  • 110
  • 25
  • 995
  • 587          
Which of the following is the default port used for POP3 SSL Traffic?


EXPLANATION

POP uses port 110, but SSL/TLS encrypted POP uses port 995.

SOURCE

https://www.fastmail.com/help/technical/ssltlsstarttls.html 
     
Share:

A 17xx POST error code indicates a problem with the which of the following?

A 17xx POST error code indicates a problem with the which of the following?

  • System Board
  • Video
  • RAM or ROM
  • Hard Drive       

A 17xx POST error code indicates a problem with the which of the following?


EXPLANATION

Hard Drive or Controller Explanation Error codes beginning with 17 (17xx) relates to issues of the HDC.  

SOURCE

Share:

Friday, July 23, 2021

In Linux, which of these is the final step for installing software from a source file using the terminal?

In Linux, which of these is the final step for installing software from a source file using the terminal?

  • install pkg
  • sudo install <path>
  • make install
  • ./configure          

In Linux, which of these is the final step for installing software from a source file using the terminal?


EXPLANATION

Steps are as follows:

1. Unzip file

2. Navigate to it within the terminal using cd

3. Type './configure'

4. Type 'make'

5. Type 'make install'


SOURCE

Share:

Which of the following protocols is not supported natively in Windows?

Which of the following protocols is not supported natively in Windows?

  • SMB
  • FTP
  • NFS
  • AFP 

Which of the following protocols is not supported natively in Windows?


EXPLANATION

So, assuming that your PC and Mac are both sitting comfortably on your network, wirelessly or otherwise (if you haven't gotten that far, you need more help than I'll be providing right here), there are a couple of different ways for the various machines on your network to talk to each other and share files. Think of 'em sorta like languages.

SOURCE

Share:

Friday, July 16, 2021

In computer graphics, what is alpha compositing?

In computer graphics, what is alpha compositing?

  • Removing unused image information from a layer and use it to enhance another one (8bit to 16bit)
  • Combining an image with a background to create the appearance of partial or full transparency
  • Combining images to achieve pseudo 3D look
  • Removing a range of colors in RGB from an image for a stylized look

In computer graphics, what is alpha compositing?


EXPLANATION

Alpha compositing is the process of combining an image with a background to create the appearance of partial or full transparency. 

It is often useful to render image elements in separate passes, and then combine the resulting multiple 2D images into a single, final image called the composite.

 For example, compositing is used extensively when combining computer-rendered image elements with live footage.               
Share:

Wednesday, July 14, 2021

How many usable networks and hosts can be created using a 192.168.2.1/26 subnet?

 How many usable networks and hosts can be created using a 192.168.2.1/26 subnet?

  • 4 Networks and 62 hosts
  • 4 Networks and 64 Hosts
  • 4 Hosts and 64 Networks
  • 4 Networks and 192 Hosts      

How many usable networks and hosts can be created using a 192.168.2.1/26 subnet?


EXPLANATION

a /26 CIDR in a class C network will provide 4 Networks and 62 usable hosts. This is calculated by the number of bits borrowed to create the network, in this case its 2 bits borrowed to create the Networks multiplied by the power of 2, 2^2=4 and the number of bits remaining for the hosts,  in the last octet 2^6 =64. 

Since you need to subtract 2 for the network and broad cast, it would be 64-2=62

2^(h-2) 

The Subnet mask would be 255.255.255.192 

In binary it would be , note that there are 8 bits in each Octet and borrowed 2bits, 8+8+8+2= 192

11111111.11111111.11111111.11000000

SinceSince

SOURCE

Share:

Tuesday, July 13, 2021

In Windows Server 2012 and later, which PowerShell cmdlet creates a new NIC team?

 In Windows Server 2012 and later, which PowerShell cmdlet creates a new NIC team?

  • Add-NetLbfoTeam
  • New-NetLbfoTeam
  • Set-NewNICTeam
  • New-LbfoTeam               

In Windows Server 2012 and later, which PowerShell cmdlet creates a new NIC team?


EXPLANATION

The New-NetLbfoTeam cmdlet creates a new NIC team that consists of one or more network adapters.


SOURCE

https://technet.microsoft.com/en-us/library/jj130847(v=wps.630).aspx
Share:

Monday, July 12, 2021

What is the maximum user mailbox size for an Office 365 E3 license?

What is the maximum user mailbox size for an Office 365 E3 license?

  • 50 GB
  • 100 GB
  • 1 TB
  • Unlimited 

What is the maximum user mailbox size for an Office 365 E3 license?


EXPLANATION

Simple question, something I learned recently as I was solving an issue with a user's mailbox.

User mailbox storage limit for an E3 license is 100 GB, it's archive limit is unlimited and its address list limit is 1000.

SOURCE

https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits
Share:

What is the minimum PowerShell version that supports Desired State Configuration?

What is the minimum PowerShell version that supports Desired State Configuration?

  • 2.0
  • 4.0
  • 5.0
  • 3.0       

What is the minimum PowerShell version that supports Desired State Configuration?


EXPLANATION

Desired State Configuration (DSC) was first included in Powershell Version 4 (a part of Windows Management Framework (WMF) 4.0) and further improved in later versions. 

DSC enables you to declare your computer configuration in scripts and then apply that configuration to computers programmatically. The computers are configured to the desired state and remain in the desired state. 

The configuration can be applied to one or many computers, making sure they're always compliant with your requirements.

Share:

Popular Posts