IT Questions and Answers :)

Wednesday, April 17, 2019

Which one of the following is not a legitimate form of Cross-Site Scripting?

Which one of the following is not a legitimate form of Cross-Site Scripting?

  • Bypass XXS
  • DOM XXS
  • Stored XXS
  • Reflected XXS 

EXPLANATION

There are several types of Cross-site Scripting attacks: stored/persistent XSS, reflected/non-persistent XSS, and DOM-based XSS. You can read more about them in an article titled Types of XSS.

SOURCE

https://www.acunetix.com/websitesecurity/cross-site-scripting/

Share:

Which routing protocol is designed to use areas to scale large hierarchical networks?

Which routing protocol is designed to use areas to scale large hierarchical networks?

  • BGP
  • OSPF
  • EIGRP
  • RIP

Which routing protocol is designed to use areas to scale large hierarchical networks?

EXPLANATION

Border Gateway Protocol is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems on the Internet. The protocol is classified as a path vector protocol

Open Shortest Path First is a routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior gateway protocols, operating within a single autonomous system. It is defined as OSPF Version 2 in RFC 2328 for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340. OSPF supports the Classless Inter-Domain Routing addressing model.

 Enhanced Interior Gateway Routing Protocol is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration. The protocol was designed by Cisco Systems as a proprietary protocol, available only on Cisco routers. Partial functionality of EIGRP was converted to an open standard in 2013 and was published with informational status as in 2016.

 The Routing Information Protocol is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The largest number of hops allowed for RIP is 15, which limits the size of networks that RIP can support.

Share:

In a virtual environment that includes a SAN and VMware ESXI 5.0 or later, which of these steps would you perform last (before re-scanning storage adapters) when removing a storage LUN?

In a virtual environment that includes a SAN and VMware ESXI 5.0 or later, which of these steps would you perform last (before re-scanning storage adapters) when removing a storage LUN?

  • Verify that the LUN is no longer used for storing VMs, templates, HA heartbeats, etc.
  • Detach LUN in VMware client
  • Disconnect LUN in SAN interface
  • Unmount datastore  [Partially Correct Please share your answers on commnet box]


EXPLANATION

Removing a LUN in ESXi/ESX 4.x is complex. Improvements are made in ESXi 5.0 and later to streamline the procedure to make it easier for Administrators to remove LUNs.
 

Unmounting a LUN checklist

Before unmounting a LUN, ensure that:
  • If the LUN is being used as a VMFS datastore, all objects, (such as virtual machines, snapshots, and templates) stored on the VMFS datastore are unregistered or moved to another datastore.

    Note: All CD/DVD images located on the VMFS datastore must also be unregistered from the virtual machines.
     
  • The datastore is not used for vSphere HA heartbeat.
  • The datastore is not part of a datastore cluster.

  SOURCE

 https://kb.vmware.com/s/article/2004605

Share:

What is not a standard windows UART baud rate?

What is not a standard windows UART baud rate?

  • 150 Baud
  • 300 Baud
  • 55 Baud
  • 110 baud 

What is not a standard windows UART baud rate?

EXPLANATION

It started a long long time ago with teletypes — I think 75 baud. Then it's been mostly doubling ever since, with a few fractional (x1.5) multiples, for example 28,800, where there were constraints on phone-line modem tech that didn't quite allow it to double. Standard crystal values came from these early baudrates, and their availability dictates future rates. E.g.,

Most UARTS use a clock of
of the baudrate, more modern parts (e.g. NXP LPC) have fractional dividers to get a wider range by using non-binary multiples.
Other common standards are 31,250 (MIDI) and 250K (DMX), both likely chosen as nice multiples of 'round' clocks like 1MHz etc.

Share:

What technology is not used to implement confidentiality?

What technology is not used to implement confidentiality?

  • Access Controls
  • Authentication
  • Auditing
  • Encryption 

What technology is not used to implement confidentiality?

EXPLANATION

What technology is not used to implement confidentiality, but is used verify that an administrator is not accessing data that he should not be accessing? Auditing

SOURCE

https://quizlet.com/111340244/understanding-security-layers-lesson-1-flash-cards/

 

 


Share:

Popular Posts