IT Questions and Answers :)

Tuesday, April 13, 2021

In Linux, what is the result of this command: tar -xvf public_html.tar

In Linux, what is the result of this command: tar -xvf public_html.tar

  • Untar or extract public_html.tar to /home/public_html
  • Create a new public_html.tar archive using the files in the current directory
  • Untar or extract public_html.tar to the current directory
  • Untar or extract public_html.tar to /root             

In Linux, what is the result of this command: tar -xvf public_html.tar


EXPLANATION

To untar or extract a tar file, just issue following command using option x (extract). For example the below command will untar the file public_html.tar in present working directory:

# tar -xvf public_html.tar

SOURCE

Share:

Monday, April 12, 2021

What is the minimum Domain Functional Level required to use DFSR to replicate SYSVOL?

 What is the minimum Domain Functional Level required to use DFSR to replicate SYSVOL?

  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Server 2003
  • Windows Server 2008
What is the minimum Domain Functional Level required to use DFSR to replicate SYSVOL?

EXPLANATION

The domain functional level needed to be Windows server 2008 to support DFS Replication of SYSVOL. 

SOURCE

https://techcommunity.microsoft.com/t5/storage-at-microsoft/streamlined-migration-of-frs-to-dfsr-sysvol/ba-p/425405
               
Share:

Friday, April 9, 2021

A security analyst received a compromised workstation. Its hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

 A security analyst received a compromised workstation. Its hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

  • Use write blockers.
  • Make a copy of the hard drive.
  • Install it on a different machine and explore the content.
  • Run rm R command to create a hash.         
A security analyst received a compromised workstation. Its hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

EXPLANATION

If you try to make a copy of the disk without the write blockers, you run risk of adding more data than already is into the hard drive. 

SOURCE

https://comptiaexamtest.com/CySA+CS0-001/comptia-cysa-cs0-001-question010/
      
Share:

Wednesday, March 31, 2021

What is the maximum user mailbox size for an Office 365 E3 license?

What is the maximum user mailbox size for an Office 365 E3 license?

  • Unlimited
  • 50 GB
  • 1 TB
  • 100 GB         

What is the maximum user mailbox size for an Office 365 E3 license?

EXPLANATION

Simple question, something I learned recently as I was solving an issue with a user's mailbox.

User mailbox storage limit for an E3 license is 100 GB, it's archive limit is unlimited and its address list limit is 1000.

SOURCE

Share:

Which command, included by default with OpenBSD 6.3, allows you to execute a command as another user?

 Which command, included by default with OpenBSD 6.3, allows you to execute a command as another user?

  • doas
  • sudo
  • runas
  • suid               
Which command, included by default with OpenBSD 6.3, allows you to execute a command as another user?


EXPLANATION

The doas(1) utility first appeared in OpenBSD 5.8, intended as a lightweight drop-in replacement for sudo(1), which stopped being included in the base system since OpenBSD 5.7. The sudo utility had a large codebase, with lots of customizable bells and whistles. Most users would never use the advanced features of sudo, so in an attempt to minimise the attack surface and make a simpler tool, Ted Unangst wrote doas.

Despite being smaller and with fewer options, it still aimed to retain the fine-grained control that people had come to expect of utilities such as sudo, as Ted Unangst describes in his blog post: https://https.www.google.com.tedunangst.com/flak/post/doas

SOURCE

https://man.openbsd.org/doas.1
Share:

Popular Posts