Wednesday, April 17, 2019
Which of the following values is associated with the Passwordless Guest Account on Ubuntu?
Which of the following values is associated with the Passwordless Guest Account on Ubuntu?
- U6aMy0wojraho
- [NULL]
- [NULL=guestsession]
- $1EgYb2Fn6I$2EgYv4xZTUtb2Fn6I
EXPLANATION
The default user on the Ubuntu Live CD is configured
to not require a password. By replacing the password value of your
guest user with the one from the Ubuntu Live CD, users will be able to
log in by leaving the password prompt blank.
To begin, create a new user
to serve as your guest account. You will be required to enter a
password. Enter anything you like, as you will be changing the password
shortly. Be sure to revoke any privileges (such as Administering the
system) that you do not want your guests to have.
Once the new account is created, open a terminal and enter the appropriate command for your version of Ubuntu:
Ubuntu
gksudo gedit /etc/shadow
Kubuntu
kdesu kate /etc/shadow
Xubuntu
gksudo mousepad /etc/shadow
You
will be prompted to enter your password (not the one for the account
you are creating). After that is complete, a text editor will display
the contents of the /etc/shadow file. You will need to locate the line
which contains information for your guest account. The line will
appear similar to this:
guest:$1$2EgYb2Fn6I$2EgYv4xZTUtb2Fn6I$2E.gYdgo8dq9EgYv:13720:1:99999:7:::
Once
you locate the line for your guest account, you need to replace the
text between the second and third colons. Erase the current value, and
enter the following in its place:
U6aMy0wojraho
If your line began like the above example, it would now look like this:
guest:U6aMy0wojraho:13720:1:99999:7:::Save the file and exit from the text editor. Once this is complete, you will be able to log in to your guest account from the login screen. When you select the account, you will be prompted for a password, but will be allowed to log in if you leave the space blank.
What is the name of the protocol behind PowerShell's Remoting feature, which is Microsoft's new standard for administrative communications?
What is the name of the protocol behind PowerShell's Remoting feature, which is Microsoft's new standard for administrative communications?
- RPC
- WMI
- WS-MAN
- WS-AT
EXPLANATION
The Connect-WSMan cmdlet connects to the WinRM service on a remote computer, and it establishes a persistent connection to the remote computer. You can use this cmdlet in the context of the WSMan provider to connect to the WinRM service on a remote computer. However, you can also use this cmdlet to connect to the WinRM service on a remote computer before you change to the WSMan provider. The remote computer appears in the root directory of the WSMan provider.Explicit credentials are required when the client and server computers are in different domains or workgroups.
For information about how to disconnect from the WinRM service on a remote computer, see the Disconnect-WSMan cmdlet.
Examples
Example 1: Connect to a remote computer
PowerShell
PS C:\> Connect-WSMan -ComputerName "server01"
PS C:\> cd wsman:
PS WSMan:\>
PS WSMan:\> dir
WSManConfig: Microsoft.WSMan.Management\WSMan::WSMan
ComputerName Type
------------ ----
localhost Container
server01 Container
This command creates a connection to the remote server01 computer.The Connect-WSMan cmdlet is generally used in the context of the WSMan provider to connect to a remote computer, in this case the server01 computer. However, you can use the cmdlet to establish connections to remote computers before you change to the WSMan provider. Those connections appear in the ComputerName list.
What does POST stand for ?
What does POST stand for ?
- power of system test
- Power on self tech
- power on self test
- power on storage test
EXPLANATION
POST stands for "Power On Self Test." It is a diagnostic program built into the computer's hardware that tests different hardware components before the computer boots up. The POST process is run on both Windows and Macintosh computers.
which is what the computer firmware does when it is turned on, checking for the correct settings for the computer hardware.
What model do the terms, Session, Application Layer, Presentation Layer belong to?
What model do the terms, Session, Application Layer, Presentation Layer belong to?
- SOI Model
- Network and Connectivity Model
- OSI Model
- ISO Model
EXPLANATION
- Layer 7 - Application
- Layer 6 - Presentation
- Layer 5 - Session
- Layer 4 - Transport
- Layer 3 - Network
- Layer 2 - Data Link
- Layer 1 - Physical
OSI network model, TCP/IP also has a network model. TCP/IP was on the path of development when the OSI standard was published and there was interaction between the designers of OSI and TCP/IP standards. The TCP/IP model is not same as OSI model.
OSI is a seven-layered standard, but TCP/IP is a four layered standard. The OSI model has been very influential in the growth and development of TCP/IP standard, and that is why much OSI terminology is applied to TCP/IP. The following figure compares the TCP/IP and OSI network models.
What tool can be used to identify listening ports and bindings?
What tool can be used to identify listening ports and bindings?
- netstat
- ntdsutil
- nslookup
- netsh