IT Questions and Answers :)

Friday, August 3, 2018

In Windows Active Directory, what is the default time interval that the Knowledge Consistency Checker (KCC) uses for incremental syncs to review and update the Active Directory replication topology?

In Windows Active Directory, what is the default time interval that the Knowledge Consistency Checker (KCC) uses for incremental syncs to review and update the Active Directory replication topology?

  • 48 hours
  • 15 minutes
  • 60 minutes
  • 5 minutes 

 

EXPLANATION




By default, the knowledge consistency checker (KCC) reviews and makes modifications to the Active Directory replication topology every 15 minutes. The KCC ensures propagation of data, either directly or transitively, by creating and deleting connection objects as needed. The KCC recognizes changes that occur in the environment and ensures that domain controllers are not orphaned in the replication topology.

For more information on the KCC, see: https://technet.microsoft.com/en-us/library/cc961781.aspx
Share:

Thursday, August 2, 2018

Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

  • Social Engineering
  • Cross Site Scripting
  • ARP Poisoning
  • SQL Injection 

 
Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

EXPLANATION

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught-on among computer and information security professionals.

SOURCE

https://en.wikipedia.org/wiki/Social_engineering_(security)
Share:

What can be used to protect you from receiving email messages with a forged sender address?

What can be used to protect you from receiving email messages with a forged sender address?

  • Digital ID
  • IMAP
  • Secure SMTP
  • SPF

What can be used to protect you from receiving email messages with a forged sender address?

EXPLANATION

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators.[1] The list of authorized sending hosts for a domain is published in the Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. Email spam and phishing often use forged "from" addresses, so publishing and checking SPF records can be considered anti-spam techniques.
IETF publication RFC 7208 dated April 2014 defines Sender Policy Framework as "proposed standard".

SOURCE

https://en.wikipedia.org/wiki/Sender_Policy_Framework 
Share:

Tuesday, July 31, 2018

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

  • find /var -name "*.log"
  • mv "*.log"
  • ls -l *.log
  • find / | grep "*.log" 

 

EXPLANATION

The "find" command specifies the directory, "/var". The "-name" option tells the "find" command to show only files that have a ".log" extension.

SOURCE

https://quiz.techlanda.com/2017/11/in-unix-which-of-following-commands.html
Share:

Where is the iSCSI protocol typically used?

Where is the iSCSI protocol typically used?

  • File sharing
  •  SANs (Storage Area Networks)
  • Inter-site routing
  • Internal drive arrays 

 
Where is the iSCSI protocol typically used?

EXPLANATION

iSCSI (Internet Small Computer System Interface) works on top of TCP and allows SCSI
commands to be sent over a network to iSCSI storage devices. This allows for a low cost SAN infrastructure using standard network hardware.

Share:

Friday, July 27, 2018

What is the advantage of coaxial cable over STP or UTP?

What is the advantage of coaxial cable over STP or UTP?

  • It can run for a longer distance unboosted
  • It is easier to splice.
  • It is less expensive
  • It is easier to install because it is so flexible 

 
What is the advantage of coaxial cable over STP or UTP?

EXPLANATION

Coaxial cable conducts the electrical signal using an inner conductor (usually copper) surrounded by an insulating layer. The whole works are enclosed by a one to four layer shield. This makes coaxial cable thicker than STP or UTP, so harder to install and splice. It also makes it more expensive. But, it has the advantage of being able to carry large quantities of data over a longer distance unboosted.
Share:

Thursday, July 26, 2018

When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

  • Annual
  • KMS
  • Perpetual
  • MAK 

 
When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

EXPLANATION

Google allows a Google GSuite console to move licenses to a different Chrome device, but there are differences. There are a Annual and Perpetual. Perpetual licenses are a one time purchase for a single type of device. If that device breaks and is replaced with the same model, you can transfer the license to that device. If you would replace it with a different type and model of device, you would have to purchase an additional license.
An annual license is bought per term and in the case of this, you can transfer the license to any new devices, regardless of the model and type during the license term.
Also, different versions of GSuite support different licensing models. GSuite Enterprise supports Annual and Perpetual, whereas GSuite Education and GSuite Nonprofit only supports Perpetual.

SOURCE

https://support.google.com/chrome/a/answer/2717664?hl=en
Share:

Popular Posts