IT Questions and Answers :)

Monday, March 11, 2019

Which of these is NOT a use case of Microsoft Azure Stack?

Which of these is NOT a use case of Microsoft Azure Stack?

  • Update and extend legacy applications with modern Azure services on-premise
  • Address latency and connectivity requirements for edge and disconnected solutions
  • Develop applications and deploy in Azure or on-premises to meet regulatory and policy requirements
  • The next-gen Hyper-V platform for you to migrate your current workloads on your existing hardware 

Which of these is NOT a use case of Microsoft Azure Stack?

EXPLANATION

If you answered "next-gen Hyper-V platform for you to migrate..." then yes you're correct - that is NOT the intended use case of Microsoft Azure Stack.  Microsoft Windows Server Software Defined (WSSD)
is a better solution to implement virtualization in scale within your datacenter.   Azure Stack's three primary use cases can be found at the link provided to learn more.

SOURCE

https://azure.microsoft.com/en-us/overview/azure-stack/
Share:

Friday, March 8, 2019

CPUs have a NX flag/bit to segregate areas of memory for process instruction or data. What does NX stand for?

CPUs have a NX flag/bit to segregate areas of memory for process instruction or data. What does NX stand for?

  • NineX
  • Non-Existent
  • No-Execute
  • Near-Exact 
CPUs have a NX flag/bit to segregate areas of memory for process instruction or data. What does NX stand for?

EXPLANATION


The NX bit (no-execute) is a technology used in CPUs to segregate areas of memory for use by either storage of processor instructions (code) or for storage of data, a feature normally only found in Harvard architecture processors. However, the NX bit is being increasingly used in conventional von Neumann architecture processors, for security reasons.
An operating system with support for the NX bit may mark certain areas of memory as non-executable. The processor will then refuse to execute any code residing in these areas of memory. The general technique, known as executable space protection, is used to prevent certain types of malicious software from taking over computers by inserting their code into another program's data storage area and running their own code from within this section; one class of such attacks is known as the buffer overflow attack.
Intel markets the feature as the XD bit (execute disable). Advanced Micro Devices (AMD) uses the marketing term Enhanced Virus Protection (EVP). The ARM architecture refers to the feature, which was introduced in ARMv6, as XN (execute never).[1] The term NX bit itself is sometimes used to describe similar technologies in other processors.

SOURCE

https://en.wikipedia.org/wiki/NX_bit
Share:

You are getting a DNS lookup error when trying to access any webpage that your local DNS server has no record for, what should you check?

You are getting a DNS lookup error when trying to access any webpage that your local DNS server has no record for, what should you check?

  • The Forwarders on your DNS server
  • The Reverse Lookup Zones on your DNS server
  • The CNAME records on your DNS server for your host
  • The Forward Lookup Zones on your DNS 

 
You are getting a DNS lookup error when trying to access any webpage that your local DNS server has no record for, what should you check?

EXPLANATION

In Domain Name System (DNS) terms, a DNS forwarder is a DNS server that is used to forward DNS queries for external DNS names to DNS servers outside that network. It does it to DNS queries that it cannot resolve locally, meaning DNS queries
that it has no personal knowledge of. By using DNS forwarders you can improve the efficiency of name resolution for the computers in your network that query for DNS names outside your network (such as names on the Internet).

SOURCE

https://www.petri.com/best-practices-for-dns-forwarding
Share:

Thursday, March 7, 2019

What type of attack has a program running on your server that bypasses authorization?

What type of attack has a program running on your server that bypasses authorization?

  • Backdoor
  • DDoS
  • Phishing
  • DoS 

 
What type of attack has a program running on your server that bypasses authorization?

EXPLANATION

When a program running on a server bypasses authorization, it is obvious that a back door attack is in progress.
Key Takeaway: In a back door attack, a program or service is placed on a server to bypass normal security procedures. A back door is a program that is designed to hide itself inside a target host. It allows the installing user access to the system at a later time without using normal authorization or vulnerability exploitation.

http://www.hbs.net/blog/december-2016/bypassing-security-controls-cyber-crime
https://www.incapsula.com/web-application-security/backdoor-shell-attack.html
Share:

Wednesday, March 6, 2019

Which of the following is an IPSLA option?

Which of the following is an IPSLA option?

  • Object-tracking
  • Reachability
  • Icmp-probing
  • IGMP-Snooping 

 
Which of the following is an IPSLA option?

EXPLANATION

The correct option is reachability.  This option permits the cisco device to track connectivity to an object, and change routes
accordingly based upon failure of the primary path.

SOURCE

http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/813-cisco-router-ipsla-basic.html
Share:

In T-SQL, which of the following is NOT a requirement to define a table expression?

In T-SQL, which of the following is NOT a requirement to define a table expression?

  • All columns must have a name
  • Column names must be unique
  • Must be preceded by WITH
  • Cannot use ORDER BY to guarantee presentation order 

 
In T-SQL, which of the following is NOT a requirement to define a table expression?

 

EXPLANATION

Table expressions in SQL Server are named query expressions that represent a valid relational table. SQL Server supports four types of table expressions: Common Table Expressions (CTEs), Derived Tables, Views and In-line Table-Valued Functions. Only a CTE definition needs to be preceded by WITH.

T-SQL allows the ORDER BY clause in conjunction with TOP, OFFSET or FOR XML for processing purposes, but this does not guarantee presentation order in an outer query that references the table expression.


SOURCE

https://www.microsoftpressstore.com/articles/article.aspx?p=2233323
Share:

What's the basic unit of virtualization that contains an OS, its apps, and resources?

What's the basic unit of virtualization that contains an OS, its apps, and resources?

  • Virtual app
  • Virtual machine
  • Virtual reality
  • Virtual OS 

 
What's the basic unit of virtualization that contains an OS, its apps, and resources?

EXPLANATION

A virtual machine (VM) is a type of container you can assign resources to, like processing cores, memory, and storage. You can install an operating system in a VM and the OS will behave as if it's actually running on a physical computer.

Virtual machines

Another form of virtual machine is one that allows us to run multiple operating systems concurrently, sharing access to the physical machine resources. With this for of virtual machine, we can partition one computer to act like several computers, each with its own operating system (and IP address on the network). We can also migrate an entire OS (along with all of its applications) from one machine to another.
To understand how this form of virtualization works, we need to consider what an operating system does. Basically, it provides a set of interfaces (system calls) that applications use to access system resources (file system, network, semaphores, etc.). The operating system is just a program. It spends its time doing table look-ups, copying blocks of data, formatting network packet headers, and other mundane tasks. Every once in a while, however, it needs to access system hardware: to configure the memory management unit, set a timer, set the task register, and perform certain types of input and output. These instructions are called privileged instructions, in contrast to all the other instructions on the processor, which are unprivileged. To execute them, the operating system kernel runs in privileged, or supervisor mode, while regular processes do not. If a regular application attemts to execute a privileged instruction, it will generate a trap on many architectures.

Share:

Popular Posts