IT Questions and Answers :)

Thursday, April 18, 2019

CentOS is to RedHat Enterprise Linux as Elementary OS is to......?


CentOS is to RedHat Enterprise Linux as Elementary OS is to......?

  • Fedora
  • Mint
  • Ubuntu
  • Scientific

CentOS is to RedHat Enterprise Linux as Elementary OS is to......?

EXPLANATION

Scientific Linux is an Enterprise Linux rebuild sponsored by Fermi National Accelerator Laboratory.


Fedora is a Linux distribution developed by the community-supported Fedora Project and sponsored by Red Hat. Fedora contains software distributed under various free and open-source licenses and aims to be on the leading edge of such technologies. Fedora is the upstream source of the commercial Red Hat Enterprise Linux distribution

SOURCE

https://en.wikipedia.org/wiki/Fedora_(operating_system)
Share:

How do you get the status of anti-malware software in your system using Powershell


How do you get the status of anti-malware software in your system using Powershell

  • Get-ComputerStatusMalpro
  • Get-MpComputerStatus
  • Get-MpStatus
  • Get-MalproComputer

How do you get the status of anti-malware software in your system using Powershell


EXPLANATION

The Defender module is only supported on Windows 8.1, Windows 10, Server 2012 R2 and Server 2016 TP.

Gets the status of antimalware software on the computer.

Syntax

PowerShell
Get-MpComputerStatus
   [-CimSession <CimSession[]>]
   [-ThrottleLimit <Int32>]
   [-AsJob]
   [<CommonParameters>]

Description

The Get-MpComputerStatus cmdlet gets the status of antimalware software installed on the computer.

Examples

Example 1: Get the computer status
PowerShell
PS C:\> Get-MpComputerStatus
AMEngineVersion                 : 1.1.9700.0
AMProductVersion                : 4.3.9463.0
AMServiceEnabled                : True
AMServiceVersion                : 4.3.9463.0
AntispywareEnabled              : True
AntispywareSignatureAge         : 0
AntispywareSignatureLastUpdated : 7/30/2013 3:01:45 AM
AntispywareSignatureVersion     : 1.155.1107.0
AntivirusEnabled                : True
AntivirusSignatureAge           : 0
AntivirusSignatureLastUpdated   : 7/30/2013 3:01:45 AM
AntivirusSignatureVersion       : 1.155.1107.0
BehaviorMonitorEnabled          : True
ComputerID                      : A69DA5B8-06B3-4A00-B2C1-D18ED66BAD40
ComputerState                   : 0
FullScanAge                     : 4294967295
FullScanEndTime                 :
FullScanStartTime               :
IoavProtectionEnabled           : True
LastFullScanSource              : 0
LastQuickScanSource             : 2
NISEnabled                      : False
NISEngineVersion                : 2.1.9700.0
NISSignatureAge                 : 0
NISSignatureLastUpdated         : 7/30/2013 1:30:46 PM
NISSignatureVersion             : 106.0.0.0
OnAccessProtectionEnabled       : True
QuickScanAge                    : 0
QuickScanEndTime                : 7/30/2013 1:50:24 PM
QuickScanStartTime              : 7/30/2013 1:49:15 PM
RealTimeProtectionEnabled       : True
RealTimeScanDirection           : 0
This command gets the status of antimalware protection software installed on the computer.



SOURCE

https://docs.microsoft.com/en-us/powershell/module/defender/Get-MpComputerStatus?view=win10-ps
Share:

In terms of digital information storage which of the following is a multiple of a bit?


In terms of digital information storage which of the following is a multiple of a bit?
  • overbite
  • zebibit
  • cubit
  • weebit

In terms of digital information storage which of the following is a multiple of a bit?

EXPLANATION

Zetta- and Zebi-
  • Zettabit. A unit of information or storage abbreviated Zbit or Zb. One zettabit most typically equals 1021 or 1,000,000,000,000,000,000,000 bits (one sextillion or one trilliard in long scale measure*). Note: Zettabit is not yet used; thought it’s only a matter of time before it is.
  • Zebibit. A unit of information or storage abbreviated Zibit or Zib. This is the absolute binary measure equaling 1,180,591,620,717,411,303,424 (270) bits. Use it when precision is needed. Note: Zebibit is not yet used; thought it’s only a matter of time before it is.
  • Zettabyte. A unit of information or storage abbreviated ZB. Again, there are/will be confusing interpretations for this term for different contexts (also see the more general discussion above).
    • 1,000,000,000,000,000,000,000 bytes (1021) when used in a networking context, clocks, or performance measures.
    • 1,180,591,620,717,411,303,424 (270) bytes. This definition is used for memory, file and formatted disk size, and other contexts where binary notation fits better.
  • Zebibyte. A unit of information or storage abbreviated ZiB. This is the specific measure of the binary representation of 1,180,591,620,717,411,303,424 (270) bytes. When precision is demanded, this is the term to use.
SOURCE

https://www.cknow.com/cms/ref/bits-bytes-and-multiple-bytes.html
Share:

Wednesday, April 17, 2019

XML is a widely used data format used in everything from web services to documents to images. Where XML is used, there must be an XML parser. Which type of attack takes advantage of a widely available feature of XML parsers?

XML is a widely used data format used in everything from web services to documents to images. Where XML is used, there must be an XML parser. Which type of attack takes advantage of a widely available feature of XML parsers?

  • XML Entropy Scoping (XXS)
  • XML Extra Sanitizing (XXS)
  • XML Extensive Threads (XXT)
  • XML External Entities (XXE) 

XML is a widely used data format used in everything from web services to documents to images. Where XML is used, there must be an XML parser. Which type of attack takes advantage of a widely available feature of XML parsers?

EXPLANATION

An XML External Entity (XXE) attack (sometimes called an XXE injection attack) is based on Server Side Request Forgery (SSRF). This type of attack abuses a widely available but rarely used feature of XML parsers. Using XXE, an attacker is able to cause Denial of Service (DoS) as well as access local and remote content and services.
Share:

Which of these would be a good way to mitigate against some of the most common security misconfigurations?

Which of these would be a good way to mitigate against some of the most common security misconfigurations?

  • Have a patch management process that includes a task to check current vulnerability databases.
  • Have a patch management process that includes a task to back up critical drives.
  • Have a patch management process that includes a task to review and update configurations.
  • Have a patch management process that includes a task to reboot servers monthly. 


EXPLANATION

 

Patch Priority

System patch distribution shall begin by:

System patch installation/application shall be completed by:

Critical Distribution shall begin within 72 hours of patch availability. 100% of systems - 30 days
High Distribution shall begin within 5 business days of patch availability. 100% of systems - 30 days
Medium Distribution shall begin within 30 calendar days of patch availability. 100% of systems - 90 days
Low Distribution shall begin within 90 calendar days of patch availability. 100% of systems - 150 days

 

 

Share:

Which one of the following is not a legitimate form of Cross-Site Scripting?

Which one of the following is not a legitimate form of Cross-Site Scripting?

  • Bypass XXS
  • DOM XXS
  • Stored XXS
  • Reflected XXS 

EXPLANATION

There are several types of Cross-site Scripting attacks: stored/persistent XSS, reflected/non-persistent XSS, and DOM-based XSS. You can read more about them in an article titled Types of XSS.

SOURCE

https://www.acunetix.com/websitesecurity/cross-site-scripting/

Share:

Which routing protocol is designed to use areas to scale large hierarchical networks?

Which routing protocol is designed to use areas to scale large hierarchical networks?

  • BGP
  • OSPF
  • EIGRP
  • RIP

Which routing protocol is designed to use areas to scale large hierarchical networks?

EXPLANATION

Border Gateway Protocol is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems on the Internet. The protocol is classified as a path vector protocol

Open Shortest Path First is a routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior gateway protocols, operating within a single autonomous system. It is defined as OSPF Version 2 in RFC 2328 for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340. OSPF supports the Classless Inter-Domain Routing addressing model.

 Enhanced Interior Gateway Routing Protocol is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration. The protocol was designed by Cisco Systems as a proprietary protocol, available only on Cisco routers. Partial functionality of EIGRP was converted to an open standard in 2013 and was published with informational status as in 2016.

 The Routing Information Protocol is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The largest number of hops allowed for RIP is 15, which limits the size of networks that RIP can support.

Share:

Popular Posts