IT Questions and Answers :)

Saturday, December 7, 2019

What VPN tunnel type was developed in cooperation with Cisco Systems and Microsoft, and uses Data Encryption Standard (DES) or Triple DES (3DES)?

What VPN tunnel type was developed in cooperation with Cisco Systems and Microsoft, and uses Data Encryption Standard (DES) or Triple DES (3DES)?

  • L2TP/IPsec
  • SSTP
  • PPTP
  • L2TP 

What VPN tunnel type was developed in cooperation with Cisco Systems and Microsoft, and uses Data Encryption Standard (DES) or Triple DES (3DES)?

EXPLANATION

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy.





Share:

What does VPN stand for?

What does VPN stand for?

  • Virtual Private Network
  • Very Private Network
  • Virtual Private Netconnection
  • Virtual Privacy Network 

EXPLANATION

A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running on a computing device, e.g., a laptop, desktop, smartphone, across a VPN may therefore benefit from the functionality, security, and management of the private network. Encryption is a common, though not an inherent, part of a VPN connection. VPN technology was developed to allow remote users and branch offices to access corporate applications and resources.


Share:

Which version of Windows Server 2012 is available through OEMs only, and is limited to amaximum of 15 users?

Which version of Windows Server 2012 is available through OEMs only, and is limited to amaximum of 15 users?

  • Essentials Edition
  • Foundation Edition
  • Standard
  • Datacenter 
Which version of Windows Server 2012 is available through OEMs only, and is limited to amaximum of 15 users?

EXPLANATION

Windows Server 2012 Foundation edition

This edition of Windows Server 2012 is targeted towards small businesses of up to 15 users. The Windows Server 2012 R2 Foundation edition comes pre-installed on hardware server with single physical processor and up to 32GB of DRAM memory. Foundation edition can be implemented in environments where features such as file sharing, printer sharing, security and remote access are required. Advanced server features such as Hyper V, RODC (Read Only Domain Controller), data deduplication, dynamic memory, IPAM (IP Address Management), server core, certificate service role, hot add memory, windows update services and failover clustering are not available in the Foundation edition.



Windows Server 2012 Essentials edition

The Windows Server 2012 R2 Essentials edition is the next step up, also geared towards small businesses of up to 25 users.  Windows Server 2012 R2 Essentials edition is available in retail stores around the world making it easy for businesses to install the new operating system without necessarily purchasing new hardware. Similar to the Foundation edition, the Essentials edition does not support many advanced server features, however it does provide support of features like Hyper V, dynamic memory and hot add/remove RAM.
Windows Server 2012 R2 Essentials edition can run a single instance of virtual machine on Hyper V, a feature that was not available in Windows Server 2012 Essentials (non-R2) edition. This single virtual machine instance can be Windows Server 2012 R2 Essential edition only, seriously limiting the virtualization options but allowing companies to begin exploring the benefits of the virtualization platform.

Windows Server 2012 Standard edition

The Windows Server 2012 R2 Standard edition of windows server is used for medium to large businesses that require additional features not present in the Foundation & Essential edition. The Standard edition is able to support an unlimited amount of users, as long as the required user licenses have been purchased.
Advanced features such as certificate services role, Hyper V, RODC (Read Only Domain Controller), IPAM (IP Address Management), Data deduplication, server core, failover clustering and more, are available to Windows Server 2012 Standard edition. We should note that the Standard edition supports up to 2 Virtual Machines.


Windows Server 2012 Datacenter edition

The Windows Server 2012 R2 Datacenter edition is the flagship product created to meet the needs of medium to large enterprises. The major difference between the Standard and Datacenter edition is that the Datacenter edition allows the creation of unlimited Virtual Machines and is therefore suitable for environments with extensive use of virtualization technology.

 

Share:

An attacker went to a local bank and collected thrown away paper with the intention of using this information to steal funds and information from the bank's customers. What is this an example of?

An attacker went to a local bank and collected thrown away paper with the intention of using this information to steal funds and information from the bank's customers. What is this an example of?

  • Tailgating
  • Dumpster Diving
  • Impersonation
  • Typosquatting

An attacker went to a local bank and collected thrown away paper with the intention of using this information to steal funds and information from the bank's customers. What is this an example of?

EXPLANATION

Impersonation attacks are emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data. Business email compromise (BECs) also known as CEO fraud is a popular example of an impersonation attack.

The tailgating attack, also known as “piggybacking,” involves an attacker seeking entry to a restricted area which lacks the proper authentication- The attacker can simply walk in behind a person who is authorized to access the area.

In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes.
Typosquatting, also called URL hijacking, a sting site, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser. Should a user accidentally enter an incorrect website address, they may be led to any URL (including an alternative website owned by a cybersquatter).[1]
The typosquatter's URL will usually be one of five kinds, all similar to the victim site address (e.g. example.com):
  • A common misspelling, or foreign language spelling, of the intended site: exemple.com
  • A misspelling based on typos: examlpe.com
  • A differently phrased domain name: examples.com
  • A different top-level domain: example.org
  • An abuse of the Country Code Top-Level Domain (ccTLD): example.cm by using .cm, example.co by using .co, or example.om by using .om. A person leaving out a letter in .com in error could arrive at the fake URL's website.
Similar abuses:
  • Combosquatting - no misspelling, but appending an arbitrary word that appears legitimate, but that anyone could register. "Combosquatting is around one hundred times more common than typosquatting.": example-security.com
  • Doppelganger domain - omitting a period: financeexample.com (instead of finance.example.com)
  • Extra period: e.xample.com
  • Appending terms to name an intuitive name for a gripe sites: example-sucks.com or examplesucks.com

  

Share:

In PowerShell what cmdlet would you use to update a registry value

In PowerShell what cmdlet would you use to update a registry value

  • Set-ItemValue
  • Set-RegistryValue
  • Set-ItemProperty
  • Update-RegistryKey 
In PowerShell what cmdlet would you use to update a registry value

EXPLANATION

Modifying the value of a registry property value

To modify the value of a registry property value requires using the Set-PropertyItem cmdlet.
Only the steps…
Modifying the value of a registry property value:
  1. Use the Push-Location cmdlet to save the current working location.
  2. Use the Set-Location cmdlet to change to the appropriate registry drive.
  3. Use the Set-ItemProperty cmdlet to assign a new value to the registry property.
  4. Use the Pop-Location cmdlet to return to the original working location.
In the image that follows, a registry key named hsg exists in the HKCU:\Software hive. The registry key has a property named NewProperty.
Share:

Popular Posts