IT Questions and Answers :)

Friday, January 4, 2019

In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

  • Hub Transport Server role
  • Unified Messaging Server role
  • Edge Transport Server role
  • Mailbox Server role 
In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

EXPLANATION

Deployed in a perimiter network, the Edge Transport Server role provides message protection and security. This protection is handled by various agents running on the Edge Transport
Server and act on email messages as they are processed.

Edge Transport Server Role – Edge Transport Server Roles sits at the edge of the network and it has to be installed on a standalone server. It performs a number of functions including Anti-spam and Anti-virus protection. The Edge Transport uses connection filtering, content filtering, recipient filtering, SenderID, sender and IP reputation to reduce the amount of Spam delivered to the end users inbox

SOURCE

https://technet.microsoft.com/en-us/library/mt616515(v=exchg.150).aspx
Share:

Monday, December 31, 2018

AES Encryption uses which cipher?

AES Encryption uses which cipher?

  • RC6
  • Serpent
  • Rijndael
  • Twofish 

 
AES Encryption uses which cipher?

EXPLANATION

AES (Advanced Encryption Standard) is a NIST standard for encryption using the Rijndael cipher.
The cipher selected for AES was determined through an open call for new algorithms in 1997. The finalists for selection were Rijndael, Serpent, Twofish, RC6, and MARS, with Rijndael being the winning algorithm.
Share:

Friday, December 14, 2018

What command would you use to create a row in SQL?

What command would you use to create a row in SQL?

  • INSERT
  • MAKE
  • ADD
  • CREATE 

 
What command would you use to create a row in SQL?

EXPLANATION

To create a row in a SQL database, you use the command INSERT.

If we want to insert a single row in a table emp.

Query:
insert into emp values(101,’hari’);

It will add a new row has employee id 101 and employee name ‘hari’ into th emp table.

Share:

In Windows, what do you get if you change the extension of an (unprotected) Excel file from .xlsx to .zip?

In Windows, what do you get if you change the extension of an (unprotected) Excel file from .xlsx to .zip?

  • A file that MS EXCEL cannot open
  • Nothing useful at all
  • A corrupt ZIP file
  • The original spreadsheet as a set of XML files within the ZIP 

In Windows, what do you get if you change the extension of an (unprotected) Excel file from .xlsx to .zip?

EXPLANATION

Since Office 2007 Microsoft has used Open XML to store non-password protected documents.  These are then combined into a single compressed file using
the  docx, xlsx, pptx, etc. extensions.   Even though the XML files are quite large, they compress very well.
Share:

Thursday, December 13, 2018

Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier environment?

Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier environment?

  • NoSQL databases are not vulnerable to SQL injection attacks.
  • NoSQL databases perform faster than SQL databases on the same hardware.
  • NoSQL databases encrypt sensitive information by default.
  • NoSQL databases are not vulnerable to XSRF attacks from the application server 

 
Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier environment?

EXPLANATION

A NoSQL (originally referring to "non SQL" or "non relational")[1] database provides a mechanism for storage and retrieval 
of data that is modeled in means other than the tabular relations used in relational databases. Such databases have existed since the late 1960s, but did not obtain the "NoSQL" moniker until a surge of popularity in the early twenty-first century,[2] triggered by the needs of Web 2.0 companies such as Facebook, Google, and Amazon.com.[3][4][5] NoSQL databases are increasingly used in big data and real-time webapplications.[6] NoSQL systems are also sometimes called "Not only SQL" to emphasize that they may support SQL-like query languages.

SOURCE

https://en.wikipedia.org/wiki/NoSQL

Author Orginally copied from

http://webcache.googleusercontent.com/search?q=cache:KiyrP91akesJ:https://www.briefmenow.org/comptia/sql-databases-in-a-three-tier-environment-3/&hl=en&gl=us&strip=1&vwsrc=0



Share:

Popular Posts