IT Questions and Answers :)

Wednesday, April 10, 2019

What encoding scheme represents text in computers and communications equipment?

What encoding scheme represents text in computers and communications equipment?

  • Hexadecimal
  • UEFI
  • Binary
  • ASCII

What encoding scheme represents text in computers and communications equipment?

EXPLANATION

ASCII, abbreviated from American Standard Code for Information Interchange, is a character-encoding scheme (the IANA prefers the name US-ASCII). ASCII codes represent text in computers, communications equipment, and other devices that use text. Most modern
character-encoding schemes are based on ASCII, though they support many additional characters.

SOURCE

https://en.wikipedia.org/wiki/ASCII
 
Share:

Which of the following is NOT a business phone technology?

Which of the following is NOT a business phone technology?

  • SIP
  • DNS
  • PRI
  • PBX 

 
Which of the following is NOT a business phone technology?

EXPLANATION

Domain name system (DNS) is not a business phone technology. The Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for
carrying multiple DS0 voice and data transmissions between the network and a user. The Session Initiation Protocol (SIP) is an Internet Engineering Task Force (IETF) standard protocol for initiating an interactive user session that involves multi-media elements, such as video, voice, chat, gaming, and virtual reality. A PBX (private branch exchange) is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. 

Share:

Tuesday, April 9, 2019

Which is not an advantage of Windows 10 Pro over Windows 10 Home

Which is not an advantage of Windows 10 Pro over Windows 10 Home

  • Domain Join Services
  • BitLocker Drive Encryption
  • Remote Access Services
  • Windows Hello face & iris recognition 

Which is not an advantage of Windows 10 Pro over Windows 10 Home

EXPLANATION

Although Windows 10 Home is powerful in its own right, it definitely has some significant enterprise limitations the eliminate it from serious business contention.

SOURCE

https://www.microsoft.com/en-us/windows/compare
Share:

When installing Oracle Real Application Clusters on Linux/Unix, what is the default port number and protocol?

When installing Oracle Real Application Clusters on Linux/Unix, what is the default port number and protocol?

  • 11000/TCP
  • 61000/TCP
  • Dynamic/UDP
  • 1521/TCP 

 
When installing Oracle Real Application Clusters on Linux/Unix, what is the default port number and protocol?

EXPLANATION

Oracle Real Application Clusters (UNIX) uses a dynamic UDP port number that is assigned automatically during installation.
Oracle Real Application Clusters (Cluster Interconnect: Windows only) uses port 11000/TCP
Oracle Real Application Clusters (Local Host: Windows only) uses port 61000/TCP
Oracle SQL*Net Listener uses port 1521/TCP for Oracle client connections to the database over Oracle's SQL*Net protocol.

SOURCE

https://docs.oracle.com/en/database/oracle/oracle-database/12.2/rilin/port-numbers-and-protocols-of-oracle-components.html#GUID-D168F70C-BECE-4F9A-B616-D9103A35F1FF
Share:

Monday, April 8, 2019

What is the minimum number of passes in a DOD-Level Data Wipe?

What is the minimum number of passes in a DOD-Level Data Wipe?

  • Three
  • Five
  • Six
  • Two 

EXPLANATION

How Does a DOD-Level Data Wipe Work? Three Pass Overwrite
A three pass overwrite means that the data is overwritten with a set of characters three times. There is a verification pass as well to check that all the data on the drive has been overwritten.
There is a standard process for the three pass overwrite: a single pass with a “0” character, followed by a single pass with a “1” character, and a final pass with a random character.
Seven Pass Overwrite
Like the three pass overwrite, the seven pass pattern overwrites the data many times with a specific pattern of characters.
The standard seven pass process is: a “0” character pass, a “1” character pass, random character pass, a second random character pass, a “0” character pass, a “1” character pass, and a random character pass before the final verification pass.

SOURCE

http://www.reliant-technology.com/storage_blog/dod-data-wipe-standards/
Share:

Friday, April 5, 2019

Which of the following is a step used to harden a database application?


Which of the following is a step used to harden a database application?

Disabling default accounts and changing passwords
Enabling all services
Disabling SQL
Disabling stored procedures 
Which of the following is a step used to harden a database application?

EXPLANATION

Application hardening, which includes hardening database applications, consists of disabling default accounts and changing default passwords.
Application hardening includes disabling unnecessary services, not enabling all of them. You shouldn't disable SQL in a database application. Stored procedures increase performance, which can help prevent SQL injection attacks and shouldn't be disabled.
Share:

Thursday, April 4, 2019

What port does SMTP traffic use by default?

What port does SMTP traffic use by default?

25
21
443
80 
What port does SMTP traffic use by default?

EXPLANATION

SMTP (Simple Mail Transfer Protocol) traffic flows across TCP port 25. Some ISPs block end users from sending via this port in an effort to reduce spam and it seems to be working.
 
Share:

Popular Posts