IT Questions and Answers :)

Friday, December 8, 2017

What can be used to protect you from receiving email messages with a forged sender address?

What can be used to protect you from receiving email messages with a forged sender address?

  • SPF
  • Secure SMTP
  • Digital ID
  • IMAP 

 
What can be used to protect you from receiving email messages with a forged sender address?

EXPLANATION

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators.[1] The list of authorized sending hosts for a domain is published in the Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. Email spam and phishing often use forged "from" addresses, so publishing and checking SPF records can be considered anti-spam techniques.
IETF publication RFC 7208 dated April 2014 defines Sender Policy Framework as "proposed standard".

SOURCE

https://en.wikipedia.org/wiki/Sender_Policy_Framework
Share:

Thursday, December 7, 2017

What is the command to force Knowledge Consistency Checker (KCC) on targeted domain controllers to immediately recalculate the inbound replication topology.

What is the command to force Knowledge Consistency Checker (KCC) on targeted domain controllers to immediately recalculate the inbound replication topology.

  • Repadmin -replicate
  • Repadmin -prp
  • Repadmin -showutdvec
  • Repadmin -kcc 
 
What is the command to force Knowledge Consistency Checker (KCC) on targeted domain controllers to immediately recalculate the inbound replication topology.

EXPLANATION

This command helps repair broken connections between domain controllers by rebuilding the active connection.

SOURCE

https://technet.microsoft.com/en-us/library/cc770963(v=ws.11).aspx



Share:

Wednesday, December 6, 2017

What is the difference between TACACS+ and RADIUS?

What is the difference between TACACS+ and RADIUS?

  •  TACACS+ encrypts the entire packet and RADIUS does not.
  • TACACS+ uses UDP transport protocol and RADIUS uses TCP.
  • RADIUS is defined by Cisco and TACACS+ is RFC 2865.
  • RADIUS encrypts the entire packet and TACACS+ does not. 
What is the difference between TACACS+ and RADIUS?

 

EXPLANATION


TACACS+ uses Transmission Control Protocol (TCP) port 49 to communicate between the TACACS+ client and the TACACS+ server. An example is a Cisco switch authenticating and authorizing administrative access to the switch’s IOS CLI. The switch is the TACACS+ client, and Cisco Secure ACS is the server.
One of the key differentiators of TACACS+ is its ability to separate authentication, authorization and accounting as separate and independent functions. This is why TACACS+ is so commonly used for device administration, even though RADIUS is still certainly capable of providing device administration AAA.
Device administration can be very interactive in nature, with the need to authenticate once, but authorize many times during a single administrative session in the command-line of a device. A router or switch may need to authorize a user’s activity on a per-command basis. TACACS+ is designed to accommodate that type of authorization need.   As the name describes, TACACS+ was designed for device administration AAA, to authenticate and authorize users into mainframe and Unix terminals, and other terminals or consoles.
TACACS+ communication between the client and server uses different message types depending on the function. In other words, different messages may be used for authentication than are used for authorization and accounting. Another very interesting point to know is that TACACS+ communication will encrypt the entire packet.

SOURCE

http://www.networkworld.com/article/2838882/radius-versus-tacacs.html
Share:

Tuesday, December 5, 2017

By default, which of the following is NOT a legitimate Linux run level?

By default, which of the following is NOT a legitimate Linux run level?

  • 6: Reboot system
  • 1: Single-user mode
  • 4: Normal mode
  • 3: Multi-user mode with networking 

By default, which of the following is NOT a legitimate Linux run level?

EXPLANATION

A Linux run level defines the state of the system after boot. Conventionally, seven run levels exist, numbered from zero to six. They include:
0: Halt system
1: Single-user mode
2: Basic multi-user mode without NFS
3: Multi-user mode with networking
4: Unused
5: Multi-user mode with GUI

6: Reboot system

Share:

Monday, December 4, 2017

Which of the following would provide secure communications if your organization uses an application that authenticates with Active Directory Domain Services (AD DS) through simple BIND?

Which of the following would provide secure communications if your organization uses an application that authenticates with Active Directory Domain Services (AD DS) through simple BIND?

  • SAML
  • XTACACS
  • TACACS+
  • Secure LDAP 

Which of the following would provide secure communications if your organization uses an application that authenticates with Active Directory Domain Services (AD DS) through simple BIND?

EXPLANATION

Secure LDAP, or LDAPS, protects authentication sessions when an application authenticates with AD DS through simple BIND.
Share:

Popular Posts