IT Questions and Answers :)

Thursday, January 25, 2018

What is the non-linear function that made DES cryptography so strong?

What is the non-linear function that made DES cryptography so strong?

  • Trick question, DES is fully linear
  • Swapping 4 bytes (left and right) after every round
  • Expansion & Contraction algorithms
  • 16 rounds of S-Box lookups 
 
What is the non-linear function that made DES cryptography so strong?

EXPLANATION

The genius of Horst Feisel's cipher was in the use S-Boxes for a non-linear lookup function based on the bit values of the ciphertext within each round. Operating on only 1/2 the ciphertext per round, the 48 expanded bits are chopped into 6-bit inputs across the 8 S-Boxes, with each 6-bit input performing a row/table lookup to yield 4 bits of output.  Without this non-linear function, DES would have been linear, and thus very weak.
This design is even more impressive when you consider that the process ran the same forwards and backwards for encrypt/decrypt, and was optimized for hardware.  While met with great suspicion when introduced, the Data Encryption Standard proved worthy of the trust provided it, weathering every attack except Moore's Law and time, which ultimately led to its obsolescence due to brute force attacks.  40 years later, the field of cryptography, and the fabric of the Internet and digital commerce, owes much to the knowledge we gained regarding cryptanalysis and ciphers from this legacy

SOURCE

https://en.wikipedia.org/wiki/Data_Encryption_Standard#The_Feistel_.28F.29_function
Share:

Wednesday, January 24, 2018

Ubuntu releases are usually nicknamed after animals. Which of these was not a release nickname?

Ubuntu releases are usually nicknamed after animals. Which of these was not a release nickname?

  • Avid Aardvark
  • Hoary Hedgehog
  • Jaunty Jackalope
  • Warty Warthog 

 
Ubuntu releases are usually nicknamed after animals. Which of these was not a release nickname?

EXPLANATION

The only one of these ridiculous names that isn't a real thing is Avid Aardvark.

Share:

Tuesday, January 23, 2018

What version of Office are you using when the installation folder is Office14?

What version of Office are you using when the installation folder is Office14?

  • Office 2014
  • Office 2010
  • Office 2013
  • Office 2016 

 
What version of Office are you using when the installation folder is Office14?

EXPLANATION

Microsoft started office at version one and put the version number at the end of the folder. Beginning with Office 95, Microsoft started naming the versions after the years in which they were released, but they kept using the version number for the program folder.

SOURCE

http://www.ryadel.com/en/microsoft-office-default-installation-folders-versions/
Share:

What is the default port used by a POP3 server for communicating with a POP3 client?

What is the default port used by a POP3 server for communicating with a POP3 client?

  • 587
  • 110
  • 109
  • 25 

 
What is the default port used by a POP3 server for communicating with a POP3 client?

EXPLANATION

Port 110 is the default POP3 non-encrypted port.
Port 995 is the default POP3 port for encrypted (SSL) traffic.

SOURCE

http://quiz.techlanda.com/2017/12/what-is-default-port-used-by-pop3.html
Share:

Friday, January 19, 2018

When installing a new domain controller into an exisiting Windows Server 2012 R2 domain using Windows PowerShell, which cmdlet do you use?

When installing a new domain controller into an exisiting Windows Server 2012 R2 domain using Windows PowerShell, which cmdlet do you use?

  • Promote-ADSDomainController
  • Install-ADDomainController
  • Get-ADDSDomainController
  • Install-ADDSDomainController 
 
When installing a new domain controller into an exisiting Windows Server 2012 R2 domain using Windows PowerShell, which cmdlet do you use?

EXPLANATION

When installing a new domain controller into an existing AD domain, use the Install-ADDSDomainController cmdlet and the parameters that meet your needs.

SOURCE

https://technet.microsoft.com/en-us/library/hh974723%28v=wps.630%29.aspx
Share:

Thursday, January 18, 2018

What are VM snapshots intended to be used for?

What are VM snapshots intended to be used for?

  • To easily revert the VM to an earlier state
  • To shut down the server
  • As a backup tool for your VMs
  • To create albums 

 
What are VM snapshots intended to be used for?

EXPLANATION

Snapshots provide a fast and easy way to revert the virtual machine to a previous state. For this reason, virtual machine snapshots are intended mainly for use in development and test environments. Having an easy way to revert a virtual machine can be very useful if you need to recreate a specific state or condition so that you can troubleshoot a problem.
There are certain circumstances in which it may make sense to use snapshots in a production environment. For example, you can use snapshots to provide a way to revert a potentially risky operation in a production environment, such as applying an update to the software running in the virtual machine.
Many backup products use snapshots in a production environment. They create a snapshot and then processing continues from the snapshot, meanwhile they have an unchanging original to back up. Once the backup is completed the snapshot is merged back into the live environment. This allows a machine to be backed up with very little affect for the users and for them remains up 24/7.
NB: Hyper-V snapshots do not replace backups. Backup usually involves some form of duplication (so two copies of the protected data exist) but in snapshots... there is no duplication whatsoever. All data is in VHD(X) file and changes in AVHD(X) file and if the VHD(X) file is damaged/lost, the data is pretty much gone. Also with most backups you can restore a single file to an earlier state, but with Snapshots, it's all or nothing (meaning if an user wants a file from last week, you'd have to bring the whole system back a week). There are other concerns as well (there might be performance  issues with multiple snapshots, snapshots usually lose value as they age and there are issues with disk space)

SOURCE

https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1015180
 
Share:

Wednesday, January 17, 2018

The 'CAT' (Category) rating on a multimeter relates to its capability to

The 'CAT' (Category) rating on a multimeter relates to its capability to:

  • Survive in tough environments
  • Reduce user hazards
  • Maintain high accuracy
  • Provide extended battery life 

 
The 'CAT' (Category) rating on a multimeter relates to its capability to

EXPLANATION

The Category rating, typically CAT I, II, III, IV etc, relates to the ability of the meter to avoid creating a safety hazard when subjected to a massive overload, as for example when inadvertently connected directly across a supply when on a current range. It does not necessarily imply that the meter will survive the abuse. Rather, that the result should not include user injury due to fire, insulation failure, arcing or bursting open of the case.

Budget meters sold for use on small electronic projects do not typically have the protection devices (Especially, high breaking-current fuses) fitted to meters intended for measurements on distribution boards, etc. Therefore anyone intending such work should choose a meter with a suitable CAT rating.

http://support.fluke.com/find-sales/download/asset/1263690_6116_eng_h_w.pdf

SOURCE

http://support.fluke.com/find-sales/download/asset/1263690_6116_eng_h_w.pdf
Share:

Popular Posts