IT Questions and Answers :)

Friday, December 6, 2019

Which Microsoft solution makes use of FSMO roles in its servers?

Which Microsoft solution makes use of FSMO roles in its servers?

  • Microsoft SQL
  • Microsoft Sharepoint
  • Microsoft Active Directory
  • Microsoft Exchange 2013 

 
Which Microsoft solution makes use of FSMO roles in its servers?

EXPLANATION

Because an Active Directory role is not bound to a single DC, it is referred to as a Flexible Single Master Operation (FSMO) role. Active Directory has five special roles that are vital for the smooth running of AD as a multi-master system.
Some functions of AD require an authoritative master to which all Domain Controllers can refer. These roles are installed automatically and normally you would not move them. However if you de-commission a DC and DCPROMO fails to run correctly or if you have a catastrophic failure of a DC you will need to know about these roles to recover or transfer them to another DC.


Share:

Thursday, December 5, 2019

Which of the following is not a standard US PSTN telecommunications method? E1/BRI SIP/VOIP T1/PRI Analog/POTS

Which of the following is not a standard US PSTN telecommunications method?

  • E1/BRI
  • SIP/VOIP
  • T1/PRI
  • Analog/POTS 

 
Which of the following is not a standard US PSTN telecommunications method?

EXPLANATION

Analog or Plain Old Telephone Service (POTS) are your standard (essentially) one line in per call telephone lines.  These were fairly inefficient for larger organizations due to the sheer volume of calls needed and the number of physical lines that would be needed to accomplish many concurrent calls, for example a call center needing the ability to work with 45 concurrent calls would need essentially 45 Analog lines (although, later uses of the lines could incorporate some usage of more than one call per physical line), which is both costly and takes up a large volume of real-estate (space).
In order to make multiple concurrent calls across one physical medium, the US telecommunications industry began to use T1 or PRI lines - which could support up to 23 concurrent calls over one "line" (or circuit).  So, for that same business to make approximately 45 concurrent calls, only *2* circuits would be required.
As demands increased yet again and higher-speed backbone connections became available, VoIP (Voice over Internet Protocol) or SIP trunks have become the de-facto standard for high-usage / high-volume (and even low-volume) environments.  The concurrent call limit per SIP or VoIP trunk is essentially limitless, bound *in-theory* only by the amount of bandwidth available to the destination/origin.
BRI circuits are essentially the same (or extremely similar) to the North American/US T1/PRI circuits, however, they are only found overseas/in European countries and NOT in the US.
*This question and the answers, including this explanation, are a simplification of many PSTN and Telecommunications terms and technologies.  Additional details and information can be found by searching Wikipedia, as well as other scholarly resources,  for the aforementioned terms,

SOURCE

https://en.wikipedia.org/wiki/Public_switched_telephone_network
Share:

Tuesday, December 3, 2019

Which is not a standard communication port for SMTP traffic?

Which is not a standard communication port for SMTP traffic?

  • 465
  • 110
  • 587
  • 25 

Which is not a standard communication port for SMTP traffic?

EXPLANATION

Communication between mail servers generally uses the standard TCP port 25 designated for SMTP

Mail clients however generally don't use this, instead using specific "submission" ports.
Mail services generally accept email submission from clients on one of:
  • 587
  • 465

SOURCE

https://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol

Share:

What popular form of Mac specific malware discovered in July 2018 will enable remote login, enable screen sharing, add permissions for malicious actors, add remote login capabilities for all users, and add its own user account to a Mac?

What popular form of Mac specific malware discovered in July 2018 will enable remote login, enable screen sharing, add permissions for malicious actors, add remote login capabilities for all users, and add its own user account to a Mac?

  • Redyms
  • Kovter
  • OSX.Calisto
  • OSX.Imuler 
What popular form of Mac specific malware discovered in July 2018 will enable remote login, enable screen sharing, add permissions for malicious actors, add remote login capabilities for all users, and add its own user account to a Mac?

EXPLANATION

Discovered in the July of 2018 by Symantec, the OSX.Calisto Trojan remained undetected for at least two years. Apparently,
the backdoor was first uploaded to VIrusTotal in 2016. This malware can essentially provide malicious actors with full control over your Mac device and full access to the entirety of your data.

SOURCE

https://www.vipre.com/blog/mac-malware-cybersecurity/



Share:

Monday, December 2, 2019

DMARC builds on what other 2 industry standards to authenticate email?

DMARC builds on what other 2 industry standards to authenticate email?

  • DKIM and SPF
  • DKIM and SMTP
  • SPF and SMTP
  • DKIM and IMAP 
DMARC builds on what other 2 industry standards to authenticate email?

EXPLANATION

DMARC, which stands for “Domain-based Message Authentication, Reporting & Conformance”, is an email authentication, policy, and reporting protocol.
It builds on the widely deployed SPF and DKIM protocols, adding linkage to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders, to improve and monitor protection of the domain from fraudulent email.

SOURCE

https://dmarc.org/
Share:

Popular Posts