IT Questions and Answers :)

Thursday, November 23, 2017

What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

  • Protocol manipulation
  • Cross-site scripting
  • Sniffing
  • Spoofing 
What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

 EXPLANATION

A cross-site scripting attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party.

SOURCE

https://en.wikipedia.org/wiki/Cross-site_scripting
Share:

Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

  • Up to 25.5 W
  • Up to 31.41592 W
  • > 9000 mW
  • 1.21 GW 

 
Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

EXPLANATION

The updated IEEE 802.3at-2009[7] PoE standard also known as PoE+ or PoE plus, provides up to 25.5 W of power.
https://en.wikipedia.org/wiki/Power_over_Ethernet
Share:

Which of the following is not a part of 3-2-1 backup strategy?

Which of the following is not a part of 3-2-1 backup strategy?

  • Different vendor
  • Different copy
  • Different location
  • Different media 

 

EXPLANATION

The 3-2-1 backup strategy, also known as the Rule of Three, says that you should have at least 3 different copies of the data on at least 2 different types of media in at least 1 different location.

Share:

In Linux, what does the -a flag stand for, when used with the rsync command?

In Linux, what does the -a flag stand for, when used with the rsync command?

  • Archive
  • Active
  • Append
  • Advanced 

 
In Linux, what does the -a flag stand for, when used with the rsync command?

EXPLANATION

From the man page: 
 -a, --archive archive mode; same as -rlptgoD (no -H)

http://linuxcommand.org/man_pages/rsync1.html
Share:

In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

  • msAssistantExch
  • msExchAssistantName
  • msExchAssistant
  • ExchAssistantName 

 
In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

EXPLANATION

This attribute in Active Directory is usually set using ADSIEdit. There are ways to set this programmatically using C# and PowerShell. This attribute sets the assistant's name in the GAL which allows for identifying a PA / Secretary for a (usually) senior member of staff in an organisation

See: https://msdn.microsoft.com/en-us/library/ms677841(v=vs.85).aspx

Share:

Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

  • [a-zA-Z]
  • [a-zA-Z0-9]
  • [a-zA-Z_]
  • [a-zA-Z0-9_] 

 
Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

EXPLANATION

The "word" meta-character \w in RegEx will match the full alpha-numeric range, basically the full alphabet as well as number characters, and includes underscores.

Note that it matches more alphabet characters than the standard a through z: pretty much any alphabet character, such as 'ñ', also match.

http://www.w3schools.com/jsref/jsref_regexp_wordchar.asp 
Share:

In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

  • 10
  • 3
  • 2

 
In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

EXPLANATION

The correct answer is 2. While Event ID 4624 shows a successful logon, you need to look at the event code to see the specific nature of that logon. You’ll see type 2 logons when a user attempts to log on at the local keyboard and screen, whether with a domain account or a local account from the computer’s local SAM.  Code 10 is for remote access, code 3 is from the network (for things such as accessing shares), and code 5 is used when a service starts up. For more information, See the source

SOURCE

http://www.windowsecurity.com/articles-tutorials/misc_network_security/Logon-Types.html
Share:

Popular Posts