IT Questions and Answers :)

Monday, May 27, 2019

What is a Hybrid Cloud?

What is a Hybrid Cloud?

  • Public + Private Cloud
  • Public + IAM Cloud
  • Private + Home Cloud
  • Private + Bob Cloud 

 
What is a Hybrid Cloud?

EXPLANATION

It is the combination of public and private cloud. It is the most robust approach to implement cloud architecture as it includes the functionalities and features of both the worlds.
It allows organizations to create their own cloud and allow them to give the control over to someone else as well.

SOURCE

https://www.careerride.com/cloud-computing-interview-questions.aspx
Share:

Thursday, May 23, 2019

Wi-Fi commonly makes transmissions at what frequencies?

Wi-Fi commonly makes transmissions at what frequencies?

  • 3 or 8 GHz
  • 5 or 13 GHz
  • 2.4 or 5 GHz
  • Any GHz 
Wi-Fi commonly makes transmissions at what frequencies?

EXPLANATION

Few devices are as essential to the smooth running of a modern-day digital household than a wireless router, so it’s strange that this black box is so little understood. Here we’ll outline one of the key features of many modern routers, dual band 2.4GHz and 5GHz support, so you know exactly what it is and how to take advantage of each.

Not every router out there offers both 2.4GHz and 5GHz, but most devices released in the last few years do. These boxes are typically advertised as “dual band” and while the specifics of each router are different, the principles behind these two bands are the same no matter what hardware you’ve got installed.
As well as a router that supports both these bands, you need devices that do too—and the vast majority of recent gadgets out there now do. Low-powered and older bits of hardware might be limited to 2.4GHz only, but they’re becoming less common.
Share:

What wireless networking standard should you choose if your wireless network uses MIMO?

What wireless networking standard should you choose if your wireless network uses MIMO?

  • 802.11n
  • 802.11b
  • CT-802
  • 802.11a 
What wireless networking standard should you choose if your wireless network uses MIMO?


EXPLANATION

In radio, multiple-input and multiple-output, or MIMO, is a method for multiplying the capacity of a radio link using multiple transmit and receive antennas to exploit multipath propagation. MIMO has become an essential element of wireless communication standards including IEEE 802.11n, IEEE 802.11ac, HSPA+, WiMAX, and Long Term Evolution.

Years ago, 802.11n introduced some exciting technologies that brought massive speed boosts over 802.11b and g. 802.11ac does something similar compared with 802.11n. For example, 802.11n supported four spatial streams (4×4 MIMO) and a channel width of 40MHz. But 802.11ac can utilize eight spatial streams and has channels up to 80MHz wide — which can then be combined to make 160MHz channels. Even if everything else remained the same (and it doesn’t), this means 802.11ac has 8x160MHz of spectral bandwidth to play with versus 4x40MHz — a huge difference that allows 802.11ac to squeeze vast amounts of data across the airwaves.
Share:

What type of malware encrypts data and demands payment to unlock it?

What type of malware encrypts data and demands payment to unlock it?

  • Ransomware
  • BitLocker
  • Hostageware
  • HostileEncryptor 
What type of malware encrypts data and demands payment to unlock it?

EXPLANATION

 Ransomware is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them.[1][2][3][4] In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash and cryptocurrency are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the "WannaCry worm", traveled automatically between computers without user interaction.[citation needed]
Starting from around 2012 the use of ransomware scams has grown internationally.[5][6][7] There were 181.5 million ransomware attacks in the first six months of 2018. This marks a 229% increase over this same time frame in 2017.[8] In June 2014, vendor McAfee released data showing that it had collected more than double the number of samples of ransomware that quarter than it had in the same quarter of the previous year.[9] CryptoLocker was particularly successful, procuring an estimated US $3 million before it was taken down by authorities,[10] and CryptoWall was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over US $18m by June 2015.[11]
Share:

Which is a common tactic used to manipulate people so they divulge confidential information?

Which is a common tactic used to manipulate people so they divulge confidential information?

  • Social engineering
  • Bait and switch
  • Double cross
  • Spamming 

Which is a common tactic used to manipulate people so they divulge confidential information?

EXPLANATION

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
 
It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests.

 

 

Share:

Exploits of generally unknown vulnerabilities that typically don't have patches yet are called:

Exploits of generally unknown vulnerabilities that typically don't have patches yet are called:

  • Fast response
  • Unrecognized threat
  • Quick acting
  • Zero-day 

Exploits of generally unknown vulnerabilities that typically don't have patches yet are called:

EXPLANATION

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.

 Things to remember about zero-day vulnerabilities. Keep your software up-to-date to help protect yourself against a zero-day vulnerability. Check for a solution when a zero-day vulnerability is announced. Most software vendors work quickly to patch a security vulnerability. Don't underestimate the threat.

Share:

An often secret or hidden method of bypassing security mechanisms is known as a:

An often secret or hidden method of bypassing security mechanisms is known as a:

  • Backdoor
  • Trick door
  • Secret passage
  • Pass through 

An often secret or hidden method of bypassing security mechanisms is known as a:

EXPLANATION

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device, or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer". Backdoors are often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.



Share:

Popular Posts