IT Questions and Answers :)

Thursday, March 7, 2019

What type of attack has a program running on your server that bypasses authorization?

What type of attack has a program running on your server that bypasses authorization?

  • Backdoor
  • DDoS
  • Phishing
  • DoS 

 
What type of attack has a program running on your server that bypasses authorization?

EXPLANATION

When a program running on a server bypasses authorization, it is obvious that a back door attack is in progress.
Key Takeaway: In a back door attack, a program or service is placed on a server to bypass normal security procedures. A back door is a program that is designed to hide itself inside a target host. It allows the installing user access to the system at a later time without using normal authorization or vulnerability exploitation.

http://www.hbs.net/blog/december-2016/bypassing-security-controls-cyber-crime
https://www.incapsula.com/web-application-security/backdoor-shell-attack.html
Share:

Wednesday, March 6, 2019

Which of the following is an IPSLA option?

Which of the following is an IPSLA option?

  • Object-tracking
  • Reachability
  • Icmp-probing
  • IGMP-Snooping 

 
Which of the following is an IPSLA option?

EXPLANATION

The correct option is reachability.  This option permits the cisco device to track connectivity to an object, and change routes
accordingly based upon failure of the primary path.

SOURCE

http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/813-cisco-router-ipsla-basic.html
Share:

In T-SQL, which of the following is NOT a requirement to define a table expression?

In T-SQL, which of the following is NOT a requirement to define a table expression?

  • All columns must have a name
  • Column names must be unique
  • Must be preceded by WITH
  • Cannot use ORDER BY to guarantee presentation order 

 
In T-SQL, which of the following is NOT a requirement to define a table expression?

 

EXPLANATION

Table expressions in SQL Server are named query expressions that represent a valid relational table. SQL Server supports four types of table expressions: Common Table Expressions (CTEs), Derived Tables, Views and In-line Table-Valued Functions. Only a CTE definition needs to be preceded by WITH.

T-SQL allows the ORDER BY clause in conjunction with TOP, OFFSET or FOR XML for processing purposes, but this does not guarantee presentation order in an outer query that references the table expression.


SOURCE

https://www.microsoftpressstore.com/articles/article.aspx?p=2233323
Share:

What's the basic unit of virtualization that contains an OS, its apps, and resources?

What's the basic unit of virtualization that contains an OS, its apps, and resources?

  • Virtual app
  • Virtual machine
  • Virtual reality
  • Virtual OS 

 
What's the basic unit of virtualization that contains an OS, its apps, and resources?

EXPLANATION

A virtual machine (VM) is a type of container you can assign resources to, like processing cores, memory, and storage. You can install an operating system in a VM and the OS will behave as if it's actually running on a physical computer.

Virtual machines

Another form of virtual machine is one that allows us to run multiple operating systems concurrently, sharing access to the physical machine resources. With this for of virtual machine, we can partition one computer to act like several computers, each with its own operating system (and IP address on the network). We can also migrate an entire OS (along with all of its applications) from one machine to another.
To understand how this form of virtualization works, we need to consider what an operating system does. Basically, it provides a set of interfaces (system calls) that applications use to access system resources (file system, network, semaphores, etc.). The operating system is just a program. It spends its time doing table look-ups, copying blocks of data, formatting network packet headers, and other mundane tasks. Every once in a while, however, it needs to access system hardware: to configure the memory management unit, set a timer, set the task register, and perform certain types of input and output. These instructions are called privileged instructions, in contrast to all the other instructions on the processor, which are unprivileged. To execute them, the operating system kernel runs in privileged, or supervisor mode, while regular processes do not. If a regular application attemts to execute a privileged instruction, it will generate a trap on many architectures.

Share:

Friday, March 1, 2019

Which statement is not true about SQL Injection?

Which statement is not true about SQL Injection?

  • Boosts database performace.
  • The placement of malicious code in SQL statements
  • A code injection technique that might destroy your database.
  • One of the most common web hacking techniques. 

 
Which statement is not true about SQL Injection?

EXPLANATION

SQL Injection does not boost database performance.

SQL injection is the placement of malicious code in SQL
statements, via web page input. SQL in Web Pages SQL injection usually occurs when you ask a user for input, like their username/userid, and instead of a name/id, the user gives you an SQL statement that you will unknowingly run on your database.

SOURCE

https://www.w3schools.com/sql/sql_injection.asp
Share:

What port is recommended for secure SMTP communications between client and mailserver.

What port is recommended for secure SMTP communications between client and mailserver.

  • 587
  • 965
  • 465
  • 25 

 
What port is recommended for secure SMTP communications between client and mailserver.

EXPLANATION

Port 465 was never recognized by the IETF (Internet Engineering Task Force), as an official port for SMTP and has been assigned to another service.
Port 25 can be used but alot of ISP's block this due to the prevalence of unsecured mail servers on this port and the spam sending capabilities this exposes. Port 965 is your POP3 (receive) port, so while it is the correct POP3 port it shouldn't be used for SMTP (send).

SOURCE

https://www.jscape.com/blog/smtp-ports
Share:

Thursday, February 28, 2019

In Windows, this is a snapshot of your computer's settings at a specific time.

In Windows, this is a snapshot of your computer's settings at a specific time.

  • Ghost image
  • System protection
  • Restore point
  • Rollback marker 

In Windows, this is a snapshot of your computer's settings at a specific time.

EXPLANATION

In Windows, a restore point is a backup copy of all your settings at a particular time. If some disaster occurs, you can restore your system to the most recent restore point. 

System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state to that of a previous point in time, which can be used to recover from system malfunctions or other problems. First included in Windows ME, it has been included in all following desktop versions of Windows released since, excluding the Windows Server. In Windows 10, System Restore is turned off by default and must be enabled by users in order to function.Wikipedia
Share:

Popular Posts