IT Questions and Answers :)

Friday, September 3, 2021

Which target attribute is used with links to force the web browser to open the link in a new tab or window?

Which target attribute is used with links to force the web browser to open the link in a new tab or window?

  • _new
  • _reload
  • _top
  • _blank               
Which target attribute is used with links to force the web browser to open the link in a new tab or window?


EXPLANATION

The target attribute specifies where the linked document will open when the link is clicked. The default is the current window. If target="_blank", the linked document will open in a new tab or (on older browsers) a new window.  

Share:

Thursday, August 12, 2021

In which layer of the OSI model does the ICA protocol from Citrix operate?

In which layer of the OSI model does the ICA protocol from Citrix operate?

  • Transport
  • Application
  • Presentation
  • Physical               

In which layer of the OSI model does the ICA protocol from Citrix operate?


EXPLANATION

 The Independent Computing Architecture (ICA) protocol operates at the presentation layer of the OSI model, that is, the 6th layer. ICA is a Windows presentation services protocol from Citrix that provides the foundation for turning any client device-thin or fat-into the ultimate thin client. In the case of the ICA protocol, the 6th layer or the presentation layer is responsible for making sure the data can be presented to the application layer, in other words, the presentation layer prepares/formats the data making it ready to be passed up to the application layer.

SOURCE

http://s3.amazonaws.com/legacy.icmp/additional/ica_acceleration_0709a.pdf
Share:

In a ISA type system, what DMA channel was always assigned to the system board?

In a ISA type system, what DMA channel was always assigned to the system board?

  • 3
  • 0
  • 7
  • 5               

In a ISA type system, what DMA channel was always assigned to the system board?



EXPLANATION

http://www.pchell.com/hardware/irqs.shtml

SOURCE

http://www.pchell.com/hardware/irqs.shtml
Share:

Friday, July 30, 2021

What international standard describes requirements for an information security management system (ISMS)?

What international standard describes requirements for an information security management system (ISMS)?

  • GDPR
  • ISO/IEC 27001
  • ISO/IEC 27000
  • ISO/IEC 27002  
What international standard describes requirements for an information security management system (ISMS)?



EXPLANATION

"Standards aren’t the same as regulations and following a standard doesn’t guarantee that you’re within the relevant laws."

GDPR is a data privacy law/regulation created by the European Union (EU). It has an "extra-territorial effect" to protect data belonging to EU citizens and residents. This not only applies to EU-based organizations but also that in another region, which target or collect data related to people from European Economic Area (EEA).

ISO 27000 has an overview of ISMS and it contains terms and definitions.
ISO 27002 has guidelines and it's optional. However, there are useful tips related to the implementation of controls and requirements, which are provided in ISO 27001.

SOURCE

Share:

Thursday, July 29, 2021

On an RPM based Linux server what command would you use to update software from the command line

On an RPM based Linux server what command would you use to update software from the command line

  • apt
  • nano
  • sup
  • yum              

On an RPM based Linux server what command would you use to update software from the command line


EXPLANATION

YUM allows automatic updates, package and dependency management, on RPM-based distributions. Like the Advanced Package Tool (APT) from Debian, YUM works with software repositories (collections of packages), which can be accessed locally[4] or over a network connection.

SOURCE

Share:

Popular Posts