IT Questions and Answers :)

Monday, May 20, 2019

Which of the following is NOT considered an "advanced threat"?

Which of the following is NOT considered an "advanced threat"?

  • Zero-day attack
  • Advanced persistent threat (APT)
  • Zombieware [Please report if the answer is incorrect]
  • Polymorphic malware 
Which of the following is NOT considered an "advanced threat"?

EXPLANATION

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.

An advanced persistent threat is a set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity. An APT usually targets either private organizations, states or both for business or political motives. 

 In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks (DOS attacks). Most owners of "zombie" computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to fictional zombies. A coordinated DDoS attack by multiple botnet machines also resembles a "zombie horde attack", as depicted in fictional zombie films.

Polymorphic Code is the debut studio album by French one-man band The Algorithm, signed by Basick Records and released on November 19, 2012. Music video for the song Trojans was released on November 7, 2012.

Share:

Which of these is NOT a characteristic of a private cloud?

Which of these is NOT a characteristic of a private cloud?

  • Users can self-provision
  • Located on-premises
  • Elastic and scalable
  • Pay for only the resources you use 
Which of these is NOT a characteristic of a private cloud?

EXPLANATION

The five characteristics of a private cloud:

1. Scalable: High levels of utilization (e.g., through virtualization, and the size and maturity of data centers)
2. Accessible: IT customers can self-provision
3. Elastic: Appearance of infinite capacity on demand
4. Shared: Workloads are multiplexed, capacity is pooled

5. Metered consumption: Ability to pay for use with no commitment

 

Share:

Which of these is not a private cloud platform?

Which of these is not a private cloud platform?

  • OpenStack
  • Eucalyptus
  • CloudStack
  • ownCloud 
Which of these is not a private cloud platform?

EXPLANATION

Eucalyptus L'Héritier 1789 is a diverse genus of flowering trees and shrubs in the myrtle family, Myrtaceae. Members of the genus dominate the tree flora of Australia, and include Eucalyptus regnans, the tallest known flowering plant on Earth. Australia is covered by of eucalypt forest, comprising three quarters of the area covered by native forest. Wikipedia

Share:

What does Amazon EC2 stand for?

What does Amazon EC2 stand for?

  • Amazon Elastic Compute Cloud
  • Amazon Expensive Cloud Computing
  • Amazon Elective Computing Cloud
  • Amazon Expert Computing Cloud 

EXPLANATION

Amazon Elastic Compute Cloud

Amazon Elastic Compute Cloud forms a central part of Amazon.com's cloud-computing platform, Amazon Web Services, by allowing users to rent virtual computers on which to run their own computer applications. Wikipedia

 

Share:

Friday, May 17, 2019

What's the term for the removal of deleted objects in Active Directory?

What's the term for the removal of deleted objects in Active Directory?

  • Trash collection
  • Garbage collection
  • Bin removal
  • Recycling 
What's the term for the removal of deleted objects in Active Directory?

EXPLANATION

 In computer science, garbage collection is a form of automatic memory management. The garbage collector, or just collector, attempts to reclaim garbage, or memory occupied by objects that are no longer in use by the program. Garbage collection was invented by John McCarthy around 1959 to simplify manual memory management in Lisp.

Fundamentals of Garbage Collection: Describes how garbage collection works, how objects are allocated on the managed heap, and other core concepts. Garbage Collection and Performance: Describes the performance checks you can use to diagnose garbage collection and performance issues.

 

Share:

Which of the following is NOT an IPV4 address range reserved for private networks?

Which of the following is NOT an IPV4 address range reserved for private networks?

  • 172.16.0.0 - 172.31.255.255
  • 163.168.0.0-163.168.255.255
  • 192.168.0.0 - 192.168.255.255
  • 10.0.0.0 - 10.255.255.255 
Which of the following is NOT an IPV4 address range reserved for private networks?

EXPLANATION

In the Internet addressing architecture, a private network is a network that uses private IP address space. Both, the IPv4 and the IPv6 specifications define private addressing ranges. These addresses are commonly used for local area networks in residential, office, and enterprise environments. Private IP address spaces were originally defined in an effort to delay IPv4 address exhaustion.

The Internet Assigned Numbers Authority (IANA) reserves the following IP address blocks for use as private IP addresses:
  • 10.0.0.0 to 10.255.255.255
  • 172.16.0.0 to 172.31.255.255
  • 192.168.0.0 to 192.168.255.255
The first set of IP addresses from above allow for over 16 million addresses, the second for over 1 million, and over 65,000 for the last range.
Another range of private IP addresses is 169.254.0.0 to 169.254.255.255, but those addresses are for Automatic Private IP Addressing (APIPA) use only.

 

Share:

What is phishing?

What is phishing?

  • A great way to spend a Sunday afternoon
  • A type of electronic fraud
  • A type of worm
  • A type of computer virus 
What is phishing?

EXPLANATION

Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim.

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. 

Share:

Popular Posts