IT Questions and Answers :)

Friday, May 17, 2019

Which protocol provides encapsulation for IPSec in transport mode?

Which protocol provides encapsulation for IPSec in transport mode?

  • L2TP
  • PAP
  • PPTP
  • PPP 
Which protocol provides encapsulation for IPSec in transport mode?

EXPLANATION


PAP - Passes cleartext username and password during authentication and is NOT Secure.

In computer networking, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy.

Share:

Two-factor authentication can include something you have and one of the following:

Two-factor authentication can include something you have and one of the following:

  • Something you make up
  • Something unique
  • Something encrypted
  • Something you know 
Two-factor authentication can include something you have and one of the following:

EXPLANATION

Multi-factor authentication is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence.

Authentication is the first step in access control, and there are three common factors used for authentication: something you know, something you have, and something you are. This article provides you with good understanding of the three factors of authentication and how they can be used together with multifactor authentication.
Share:

Which of the following is not an example of an application vulnerability?

Which of the following is not an example of an application vulnerability?

  • Fail-open error handling
  • Running with least privilege
  • Failure to properly close database connections
  • Lack of sufficient logging 
Which of the following is not an example of an application vulnerability?


EXPLANATION

All security mechanisms should deny access until specifically granted, not grant access until denied, which is a common reason why fail open errors occur. Other errors can cause the system to crash or consume significant resources, effectively denying or reducing service to legitimate users.

 Exploitation of insufficient logging and monitoring is the bedrock of nearly every major incident. Attackers rely on the lack of monitoring and timely response to achieve their goals without being detected

Share:

Which RAID level uses a combination of disk striping and mirrored volumes?

Which RAID level uses a combination of disk striping and mirrored volumes?

  • RAID 0
  • RAID 1
  • RAID 5
  • RAID 10 
Which RAID level uses a combination of disk striping and mirrored volumes?

 EXPLANATION

 

Some levels can be combined to produce a two-digit RAID level. RAID 10, then, is a combination of levels 1 (mirroring) and 0 (striping), which is why it is also sometimes identified as RAID 1 + 0. Mirroring is writing data to two or more hard drive disks (HDDs) at the same time – if one disk fails, the mirror image preserves the data from the failed disk. Striping breaks data into “chunks” that are written in succession to different disks. This improves performance because your computer can access data from more than one disk simultaneously. Striping does not, however, provide redundancy to protect information, which is why it is designated 0.

The Advantages Of RAID 10

Combining these two storage levels makes RAID 10 fast and resilient at the same time. If you need hardware-level protection for your data and faster storage performance, RAID 10 is a simple, relatively inexpensive fix. RAID 10 is secure because mirroring duplicates all your data. It's fast because the data is striped across multiple disks; chunks of data can be read and written to different disks simultaneously.
Share:

What do you call software that emulates a particular computer system?

What do you call software that emulates a particular computer system?

  • Guest operating system
  • Virtual machine
  • Hypervisor
  • Processor 
What do you call software that emulates a particular computer system?

EXPLANATION

 In computing, an emulator is hardware or software that enables one computer system (called the host) to behave like another computer system (called the guest). An emulator typically enables the host system to run software or use peripheral devices designed for the guest system. Emulation refers to the ability of a computer program

The software layer that emulates the necessary hardware for an operating system to run in. It is the hardware virtualization that lets multiple operating systems run simultaneously on a single computer, such as a network server.

Share:

Popular Posts