IT Questions and Answers :)

Friday, February 19, 2021

What part of a packet gets modified as part of a header manipulation attack?

 What part of a packet gets modified as part of a header manipulation attack?

  • Flags
  • Buffers
  • Signature definitions
  • Databases
What part of a packet gets modified as part of a header manipulation attack?

EXPLANATION

Flags = Correct

A header manipulation modifies flags and data in a packet and can launch a session hijacking attack.
Buffer overflow attacks can modify memory buffers.
SQL injection attacks can modify databases.
Antivirus software requires up-to-date signature definitions, but header manipulation does not modify these.

SOURCE

http://www.chegg.com/homework-help/create-http-header-http-headers-originate-web-browser-attack-chapter-3-problem-6hp-solution-9781305480858-exc
               
Share:

In Powershell, what does the command "(get-history)[-1].commandLine | clip" do?

 In Powershell, what does the command "(get-history)[-1].commandLine | clip" do?

  • Clears the entire command history in the current shell session.
  • Copies the entire command history in the current shell session to the clipboard.
  • Copies the last-issued command in the current shell session to the clipboard.
  • Clears the last-issued command in the command history in the current shell session.     
In Powershell, what does the command "(get-history)[-1].commandLine | clip" do?

EXPLANATION

Get-History - Get a list of the commands entered during the current session.  Returns a HistoryInfo object for each history item that it gets.

Powershell About Arrays - "Negative numbers count from the end of the array. For example, '-1' refers to the last element of the array."  

HistoryInfo.CommandLine Property - Returns the command line string that was issued for that command history item

clip -  Windows Vista included a tiny command line utility called clip. All it does is paste its stdin onto the clipboard.  (Not actually a Powershell command so can be used in Command Prompt as well.

SOURCE

Share:

Thursday, February 18, 2021

Two administrators update the same Active Directory user account at the same time while connected to two different domain controllers. What method does Active Directory replication use to determine what changes to make in the event of a conflict?

Two administrators update the same Active Directory user account at the same time while connected to two different domain controllers. What method does Active Directory replication use to determine what changes to make in the event of a conflict?

  • USN - Update Sequence Number
  • SID - Security Identifier
  • Email to Administrator with links to available choices
  • RID - Relative Identifier               
Two administrators update the same Active Directory user account at the same time while connected to two different domain controllers. What method does Active Directory replication use to determine what changes to make in the event of a conflict?

EXPLANATION

Active Directory replication does not depend on time to determine what changes need to be propagated. It relies instead on the use of update sequence numbers (USNs) that are assigned by a counter that is local to each domain controller. Because these USN counters are local, it is easy to ensure that they are reliable and never "run backward" (that is, decrease in value). The trade-off is that it is meaningless to compare a USN assigned on one domain controller to a USN assigned on a different domain controller.
More info here:

https://technet.microsoft.com/en-us/library/cc961798.aspx">https://technet.microsoft.com/en-...

Share:

Monday, January 25, 2021

Which of the following is NOT in the same subnet as the other 3

Which of the following is NOT in the same subnet as the other 3

  • 10.27.9.14/29
  • 10.27.9.16/29
  • 10.27.9.20/29
  • 10.27.9.18/29 

 Which of the following is NOT in the same subnet as the other 3


EXPLANATION

In IP v4. The range is from 10.27.9.16 to 10.27.9.23 with a 29 bit subnet mask. 255.255.255.248

Giving a total of 8 hosts on the sunbet, although only 6 are usable.

SOURCE

https://en.wikipedia.org/wiki/Subnetwork
Share:

Friday, January 22, 2021

In macOS, what are the default numeric file permissions on a user home folder; /Users/username/?

In macOS, what are the default numeric file permissions on a user home folder; /Users/username/?

  • 755
  • 777
  • 775
  • 733 

In macOS, what are the default numeric file permissions on a user home folder; /Users/username/?

EXPLANATION

By default, the permissions on a home folder are drwxr-xr-x or 755. This allows other users on the system access to the top level of the the home folder so that they can access the Public and Sites folders to read or send files to the owner. The main other folders (Desktop, Documents, etc) are locked to drwx------ so that only the owner has access.

SOURCE

http://www.macinstruct.com/node/415

 

Share:

Popular Posts