IT Questions and Answers :)

Wednesday, April 17, 2019

What backup type would generally provide the fastest backup times

What backup type would generally provide the fastest backup times

  • Incremental
  • Full
  • Differential
  • Archival 

What backup type would generally provide the fastest backup times

EXPLANATION

 Full backups copy all sectors of the file image whether the sectors contain data or not. This is easy to operate; however, it is time-consuming, space-intensive, and the least flexible method.

An incremental backup is one in which successive copies of the data contain only that portion that has changed since the preceding backup copy was made. When a full recovery is needed, the restoration process would need the last full backup plus all the incremental backups until the point of restoration. Incremental backups are often desirable as they reduce storage space usage, and are quicker to perform than differential backups.

 A differential backup is a type of data backup that preserves data, saving only the difference in the data since the last full backup.

 Archival backup is a type of data backup in which all files are copied to a backup storage device. Archival backups are also called full backup.Contrast with incremental backups, in which only modified files are copied.


Share:

[blank] is a set of voluntary standards governing encryption.

[blank] is a set of voluntary standards governing encryption.

  • PKCS
  • ISA
  • RSA
  • PKI 

[blank] is a set of voluntary standards governing encryption.


EXPLANATION

 In cryptography, PKCS stands for "Public Key Cryptography Standards". These are a group of public-key cryptography standards devised and published by RSA Security Inc, starting in the early 1990s


SOURCE

https://quizlet.com/57845307/sec-preface-flash-cards/








Share:

Which of the following values is associated with the Passwordless Guest Account on Ubuntu?

Which of the following values is associated with the Passwordless Guest Account on Ubuntu?

  • U6aMy0wojraho
  • [NULL]
  • [NULL=guestsession]
  • $1EgYb2Fn6I$2EgYv4xZTUtb2Fn6I 

Which of the following values is associated with the Passwordless Guest Account on Ubuntu?


EXPLANATION

The default user on the Ubuntu Live CD is configured to not require a password. By replacing the password value of your guest user with the one from the Ubuntu Live CD, users will be able to log in by leaving the password prompt blank.
To begin, create a new user to serve as your guest account. You will be required to enter a password. Enter anything you like, as you will be changing the password shortly. Be sure to revoke any privileges (such as Administering the system) that you do not want your guests to have.
Once the new account is created, open a terminal and enter the appropriate command for your version of Ubuntu:
Ubuntu
gksudo gedit /etc/shadow

Kubuntu
kdesu kate /etc/shadow

Xubuntu
gksudo mousepad /etc/shadow

You will be prompted to enter your password (not the one for the account you are creating). After that is complete, a text editor will display the contents of the /etc/shadow file. You will need to locate the line which contains information for your guest account. The line will appear similar to this:
guest:$1$2EgYb2Fn6I$2EgYv4xZTUtb2Fn6I$2E.gYdgo8dq9EgYv:13720:1:99999:7:::

Once you locate the line for your guest account, you need to replace the text between the second and third colons. Erase the current value, and enter the following in its place:
U6aMy0wojraho

If your line began like the above example, it would now look like this:
guest:U6aMy0wojraho:13720:1:99999:7:::
Save the file and exit from the text editor. Once this is complete, you will be able to log in to your guest account from the login screen. When you select the account, you will be prompted for a password, but will be allowed to log in if you leave the space blank.

Share:

What is the name of the protocol behind PowerShell's Remoting feature, which is Microsoft's new standard for administrative communications?

What is the name of the protocol behind PowerShell's Remoting feature, which is Microsoft's new standard for administrative communications?

  • RPC
  • WMI
  • WS-MAN
  • WS-AT 

What is the name of the protocol behind PowerShell's Remoting feature, which is Microsoft's new standard for administrative communications?

EXPLANATION

The Connect-WSMan cmdlet connects to the WinRM service on a remote computer, and it establishes a persistent connection to the remote computer. You can use this cmdlet in the context of the WSMan provider to connect to the WinRM service on a remote computer. However, you can also use this cmdlet to connect to the WinRM service on a remote computer before you change to the WSMan provider. The remote computer appears in the root directory of the WSMan provider.
Explicit credentials are required when the client and server computers are in different domains or workgroups.
For information about how to disconnect from the WinRM service on a remote computer, see the Disconnect-WSMan cmdlet.

Examples

Example 1: Connect to a remote computer
PowerShell
PS C:\> Connect-WSMan -ComputerName "server01"
PS C:\> cd wsman:
PS WSMan:\>
PS WSMan:\> dir
WSManConfig: Microsoft.WSMan.Management\WSMan::WSMan

ComputerName                                  Type
------------                                  ----
localhost                                     Container
server01                                      Container
This command creates a connection to the remote server01 computer.
The Connect-WSMan cmdlet is generally used in the context of the WSMan provider to connect to a remote computer, in this case the server01 computer. However, you can use the cmdlet to establish connections to remote computers before you change to the WSMan provider. Those connections appear in the ComputerName list.

 

Share:

What does POST stand for ?

What does POST stand for ?

  • power of system test
  • Power on self tech
  • power on self test
  • power on storage test 

 
What does POST stand for ?

EXPLANATION

POST stands for "Power On Self Test." It is a diagnostic program built into the computer's hardware that tests different hardware components before the computer boots up. The POST process is run on both Windows and Macintosh computers.

which is what the computer firmware does when it is turned on, checking for the correct settings for the computer hardware.

Share:

What model do the terms, Session, Application Layer, Presentation Layer belong to?

What model do the terms, Session, Application Layer, Presentation Layer belong to?

  • SOI Model
  • Network and Connectivity Model
  • OSI Model
  • ISO Model 
What model do the terms, Session, Application Layer, Presentation Layer belong to?
 

EXPLANATION

  • Layer 7 - Application
  • Layer 6 - Presentation
  • Layer 5 - Session
  • Layer 4 - Transport
  • Layer 3 - Network
  • Layer 2 - Data Link
  • Layer 1 - Physical

 OSI network model, TCP/IP also has a network model. TCP/IP was on the path of development when the OSI standard was published and there was interaction between the designers of OSI and TCP/IP standards. The TCP/IP model is not same as OSI model.


OSI is a seven-layered standard, but TCP/IP is a four layered standard. The OSI model has been very influential in the growth and development of TCP/IP standard, and that is why much OSI terminology is applied to TCP/IP. The following figure compares the TCP/IP and OSI network models.


Share:

Popular Posts