IT Questions and Answers :)

Wednesday, April 17, 2019

[blank] is a set of voluntary standards governing encryption.

[blank] is a set of voluntary standards governing encryption.

  • PKCS
  • ISA
  • RSA
  • PKI 

[blank] is a set of voluntary standards governing encryption.


EXPLANATION

 In cryptography, PKCS stands for "Public Key Cryptography Standards". These are a group of public-key cryptography standards devised and published by RSA Security Inc, starting in the early 1990s


SOURCE

https://quizlet.com/57845307/sec-preface-flash-cards/








Share:

Which of the following values is associated with the Passwordless Guest Account on Ubuntu?

Which of the following values is associated with the Passwordless Guest Account on Ubuntu?

  • U6aMy0wojraho
  • [NULL]
  • [NULL=guestsession]
  • $1EgYb2Fn6I$2EgYv4xZTUtb2Fn6I 

Which of the following values is associated with the Passwordless Guest Account on Ubuntu?


EXPLANATION

The default user on the Ubuntu Live CD is configured to not require a password. By replacing the password value of your guest user with the one from the Ubuntu Live CD, users will be able to log in by leaving the password prompt blank.
To begin, create a new user to serve as your guest account. You will be required to enter a password. Enter anything you like, as you will be changing the password shortly. Be sure to revoke any privileges (such as Administering the system) that you do not want your guests to have.
Once the new account is created, open a terminal and enter the appropriate command for your version of Ubuntu:
Ubuntu
gksudo gedit /etc/shadow

Kubuntu
kdesu kate /etc/shadow

Xubuntu
gksudo mousepad /etc/shadow

You will be prompted to enter your password (not the one for the account you are creating). After that is complete, a text editor will display the contents of the /etc/shadow file. You will need to locate the line which contains information for your guest account. The line will appear similar to this:
guest:$1$2EgYb2Fn6I$2EgYv4xZTUtb2Fn6I$2E.gYdgo8dq9EgYv:13720:1:99999:7:::

Once you locate the line for your guest account, you need to replace the text between the second and third colons. Erase the current value, and enter the following in its place:
U6aMy0wojraho

If your line began like the above example, it would now look like this:
guest:U6aMy0wojraho:13720:1:99999:7:::
Save the file and exit from the text editor. Once this is complete, you will be able to log in to your guest account from the login screen. When you select the account, you will be prompted for a password, but will be allowed to log in if you leave the space blank.

Share:

What is the name of the protocol behind PowerShell's Remoting feature, which is Microsoft's new standard for administrative communications?

What is the name of the protocol behind PowerShell's Remoting feature, which is Microsoft's new standard for administrative communications?

  • RPC
  • WMI
  • WS-MAN
  • WS-AT 

What is the name of the protocol behind PowerShell's Remoting feature, which is Microsoft's new standard for administrative communications?

EXPLANATION

The Connect-WSMan cmdlet connects to the WinRM service on a remote computer, and it establishes a persistent connection to the remote computer. You can use this cmdlet in the context of the WSMan provider to connect to the WinRM service on a remote computer. However, you can also use this cmdlet to connect to the WinRM service on a remote computer before you change to the WSMan provider. The remote computer appears in the root directory of the WSMan provider.
Explicit credentials are required when the client and server computers are in different domains or workgroups.
For information about how to disconnect from the WinRM service on a remote computer, see the Disconnect-WSMan cmdlet.

Examples

Example 1: Connect to a remote computer
PowerShell
PS C:\> Connect-WSMan -ComputerName "server01"
PS C:\> cd wsman:
PS WSMan:\>
PS WSMan:\> dir
WSManConfig: Microsoft.WSMan.Management\WSMan::WSMan

ComputerName                                  Type
------------                                  ----
localhost                                     Container
server01                                      Container
This command creates a connection to the remote server01 computer.
The Connect-WSMan cmdlet is generally used in the context of the WSMan provider to connect to a remote computer, in this case the server01 computer. However, you can use the cmdlet to establish connections to remote computers before you change to the WSMan provider. Those connections appear in the ComputerName list.

 

Share:

What does POST stand for ?

What does POST stand for ?

  • power of system test
  • Power on self tech
  • power on self test
  • power on storage test 

 
What does POST stand for ?

EXPLANATION

POST stands for "Power On Self Test." It is a diagnostic program built into the computer's hardware that tests different hardware components before the computer boots up. The POST process is run on both Windows and Macintosh computers.

which is what the computer firmware does when it is turned on, checking for the correct settings for the computer hardware.

Share:

What model do the terms, Session, Application Layer, Presentation Layer belong to?

What model do the terms, Session, Application Layer, Presentation Layer belong to?

  • SOI Model
  • Network and Connectivity Model
  • OSI Model
  • ISO Model 
What model do the terms, Session, Application Layer, Presentation Layer belong to?
 

EXPLANATION

  • Layer 7 - Application
  • Layer 6 - Presentation
  • Layer 5 - Session
  • Layer 4 - Transport
  • Layer 3 - Network
  • Layer 2 - Data Link
  • Layer 1 - Physical

 OSI network model, TCP/IP also has a network model. TCP/IP was on the path of development when the OSI standard was published and there was interaction between the designers of OSI and TCP/IP standards. The TCP/IP model is not same as OSI model.


OSI is a seven-layered standard, but TCP/IP is a four layered standard. The OSI model has been very influential in the growth and development of TCP/IP standard, and that is why much OSI terminology is applied to TCP/IP. The following figure compares the TCP/IP and OSI network models.


Share:

What tool can be used to identify listening ports and bindings?

What tool can be used to identify listening ports and bindings?

  • netstat
  • ntdsutil
  • nslookup
  • netsh 

 
What tool can be used to identify listening ports and bindings?

EXPLANATION

 netstat In computing, netstat is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics

ntdsutil is used to transfer FSMO roles.


nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System to obtain domain name or IP address mapping or for any other specific DNS record.

 In computing, netsh, or network shell, is a command-line utility included in Microsoft's Windows NT line of operating systems beginning with Windows 2000. It allows local or remote configuration of network devices such as the interface.

 


Share:

Popular Posts