IT Questions and Answers :)

Monday, April 22, 2019

What are the types of Eavesdropping attacks?

What are the types of Eavesdropping attacks?

  • Passive & Active
  • Data driven & software written
  • Right & Wrong
  • malicous & outbound 

What are the types of Eavesdropping attacks?

EXPLANATION

Eavesdropping attacks occur through the interception of network traffic. By eavesdropping, an attacker can obtain passwords, credit card numbers and other confidential information that a user might be sending over the network. Eavesdropping can be passive or active:
  • Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network.
  • Active eavesdropping — A hacker actively grabs the information by disguising himself as friendly unit and by sending queries to transmitters. This is called probing, scanning or tampering.
Detecting passive eavesdropping attacks is often more important than spotting active ones, since active attacks requires the attacker to gain knowledge of the friendly units by conducting passive eavesdropping before.
Data encryption is the best countermeasure for eavesdropping.

SOURCE

https://blog.netwrix.com/2018/05/15/top-10-most-common-types-of-cyber-attacks/#Eavesdropping%20attack
Share:

In telecommunications, what does DIA stand for?

In telecommunications, what does DIA stand for?

  • Dynamic Internet Access
  • Digital Internet Access
  • Direct Internet Access
  • Dedicated Internet Access 


EXPLANATION

 These are data center applications which might require your company to need a Dedicated Internet Access (DIA) circuit, instead of the average, cost-effective business Internet access types, like Fios, U-verse, business-class cable, and DSL.

Types of Dedicated Internet Access circuits include:
Dedicated Fiber (a.k.a. fast ethernet, metro ethernet, ethernet over fiber); Ethernet over Copper (EoC); T-1 (DS-1); T-3 (DS-3); and Dedicated Fixed-Wireless.
The type of DIA circuit your company needs, depends on the circuit types available at your address and the bandwidth your company requires. In theory, the type of DIA circuit (i.e. fiber vs. T-1), only affects the bandwidth and price of the Internet connection.

SOURCE

 https://acronyms.thefreedictionary.com/dia

Share:

On ESXi, how is the parent-child relation determined between the base disk file and it's delta files, when a snapshot of a VM is taken.

On ESXi, how is the parent-child relation determined between the base disk file and it's delta files, when a snapshot of a VM is taken.

  • Through VMFS metadata
  • Through ESXi database
  • Through .vmx file
  • Through .vmdk descriptor file 

On ESXi, how is the parent-child relation determined between the base disk file and it's delta files, when a snapshot of a VM is taken.

EXPLANATION

 Delta disk files: A .vmdk file to which the guest operating system can write. The delta disk represents the difference between the current state of the virtual disk and the state that existed at the time that the previous snapshot was taken. When you take a snapshot, the state of the virtual disk is preserved, which prevents the guest operating system from writing to it, and a delta or child disk is created. A delta disk has two files, including a descriptor file that is small and contains information about the virtual disk and a corresponding file that contains the raw data. The files that make up the delta disk are referred to as child disks or redo logs.


Share:

What is the name of Microsoft's virtualization suite?

What is the name of Microsoft's virtualization suite?

  • Hyper-V
  • VM Ware
  • Viridian
  • Windows Server Virtualization 
What is the name of Microsoft's virtualization suite?

EXPLANATION

VMware
vmware.comVMware, Inc. is a subsidiary of Dell Technologies that provides cloud computing and platform virtualization software and services. It was the first commercially successful company to virtualize the x86 architecture.
Hyper-V

Microsoft Hyper-V, codenamed Viridian and formerly known as Windows Server Virtualization, is a native hypervisor; it can create virtual machines on x86-64 systems running Windows. Starting with Windows 8, Hyper-V superseded Windows Virtual PC as the hardware virtualization component of the client editions of Windows NT. A server computer running Hyper-V can be configured to expose individual virtual machines to one or more networks.
Type:Native hypervisor
Included with:Windows Server 2008 and later, Select editions of Windows 8 and later
Replaces:Windows Virtual PC

Share:

What is the longest run of UTP cable allowed for a single segment connection?

What is the longest run of UTP cable allowed for a single segment connection?

  • 110 to 150 meters
  • 90 to 100 Meters
  • 100 to 105 meters
  • 80 to 89 meters 

EXPLANATION

UTP cable does not have a maximum length.
However, the protocol that runs over UTP has a maximum length for performance and technical reasons (such as collision detection in Ethernet).

You're probably talking about Ethernet, and the maximum end-to-end cable length in Ethernet (at least for 100Base-TX, 1000Base-T and 10GBase-T) is 100M.

Assuming you're running full-duplex, you're withing spec (and hence should be fine) as long as no switch-switch or switch-host connection exceeds 100M.



Share:

What is the port for HTTPS?

What is the port for HTTPS?

  • Port 434
  • Port 444
  • Port 440
  • Port 443 
 What is the port for HTTPS?

EXPLANATION

HTTPS

(HyperText Transport Protocol Secure) The protocol used to access a secure Web server. When https:// is used as the prefix of a Web address rather than the common http://, the session is managed by a security protocol, typically TLS, which superseded SSL, and the transmission is encrypted to and from the Web server. Increasingly, all websites use HTTPS;
for example, in 2015, Wikipedia switched to HTTPS. For details about the HTTP protocol, see HTTP. To learn about the security protocol, see TLS and security protocol. See HSTS and HTTPS Everywhere.

 Port 443 PortTCP - HTTPS (Hypertext Transfer Protocol over SSL/TLS)


Share:

Sunday, April 21, 2019

What is the port for HTTP?

What is the port for HTTP?

  • Port 443
  • Port 225
  • Port 20
  • Port 80 

What is the port for HTTP?

EXPLANATION

Port 443
HTTP Secure is an extension of the Hypertext Transfer Protocol for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security, or formerly, its predecessor, Secure Sockets Layer. The protocol is therefore also often referred to as HTTP over TLS, or HTTP over SSL.



 Port 80 is the port number assigned to commonly used internet communication protocol, Hypertext Transfer Protocol (HTTP). It is the port from which a computer sends and receives Web client-based communication and messages from a Web server and is used to send and receive HTML pages or data

Share:

Popular Posts