IT Questions and Answers :)

Friday, August 16, 2019

Which of the following is the term for the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive, iPhone, iPod or other MP3 player?

Which of the following is the term for the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive, iPhone, iPod or other MP3 player?

  • Pod Slurping
  • Snarfing
  • Bluebugging
  • Sneakernet 
Which of the following is the term for the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive, iPhone, iPod or other MP3 player?

EXPLANATION

The small size of the devices and the ease of connectivity -- for example through the USB port or a wireless Bluetooth connection -- makes it possible for anyone who can get access to a computer to download files from it quickly and surreptitiously.
To protect against podslurping and other network intrusions targeting individual computers, experts recommend that administrators develop and enforce effective endpoint security policies.

 

Share:

What is the acronym for the management system that includes PowerShell?

What is the acronym for the management system that includes PowerShell?

  • WMI
  • WPF
  • WRM
  • WMF 
What is the acronym for the management system that includes PowerShell?

EXPLANATION

 Microsoft's World of Management Instrumentation - e.g., WMI, OMI, CIM, and a bunch of other acronyms. I glossed over some of the finer details, and this article is intended to provide more specificity and accuracy - thanks to Microsoft's Keith Bankston for helping me sort things out.

CIM and the DMTF

Let us begin with CIM. CIM stands for Common Information Model, and it is not a tangible thing. It isn't even software. It's a set of standards that describe how management information can be represented in software, and it was created by the Distributed Management Task Force (DMTF), an industry working group that Microsoft is a member of.

Old WMI, DCOM, and RPC

Back in the day - we're talking Windows NT 4.0 timeframe - Microsoft created Windows Management Instrumentation, or WMI. This was a server component (technically, a background service, and it ran on Workstation as well as Server) that delivered up management information in the CIM format. Now, at the time, the CIM standards were pretty early in their life, and WMI complied with what existed at the time. But the standards themselves were silent on quite a few things, like what network communications protocol you'd use to actually talk to a server. Microsoft opted for Distributed Component Object Model, or DCOM, which was a very mainstream thing for them at the time. DCOM talks by using Remote Procedure Calls, or RPCs, also a very standard thing for Windows in those days.

New WMI, WS-MAN, and WINRM

Fast forward a bit to 2012. With Windows Management Framework 3, Microsoft releases a new version of WMI. They fail to give it a unique name, which causes a lot of confusion, but it complies with all the latest CIM specifications. There's still a server-side component, but this "new WMI" talks over WS-Management (Web Services for Management, often written as WS-MAN) instead of DCOM/RPC. Microsoft's implementation of WS-MAN lives in the Windows Remote Management (WinRM) service. The PowerShell cmdlets that talk this new kind of WMI all use CIM as part of the noun, giving us Get-CimInstance, Get-CimClass, Invoke-CimMethod, and so on. But make no mistake - these things aren't "talking CIM," because CIM isn't a protocol. They're talking WS-MAN, which is what the new CIM standard specifies.
Sidebar: From a naming perspective, Microsoft was pretty much screwed with the new cmdlets' names, no matter what they called them. "Cim" is a terrible part of the noun. After all, the "old WMI" was compliant with the CIM of its day, but it didn't get to be called CIM. The new cmdlets don't use any technology called "Cim," they're merely compliant with the newest CIM standards. Maybe they should have been called something like Get-Wmi2Instance, or Invoke-NewWmiMethod, but that wasn't going to make anyone happy, either. So, Cim it is.
Share:

What is the difference between volatile and non-volatile memory

What is the difference between volatile and non-volatile memory

  • The contents of volatile memory can be lost but non-volatile memory can’t
  • volatile memory can’t be upgraded to non-volatile memory
  • non-volatile memory can’t be upgraded to volatile memory
  • The contents of non-volatile memory can be lost but volatile memory can’t 

 
What is the difference between volatile and non-volatile memory

EXPLANATION

Non-volatile memory is typically used for the task of secondary storage, or long-term persistent storage.
The most widely used form of primary storage today is avolatile form of random access memory (RAM), meaning that when the computer is shut down, anything contained in RAM is lost.

SOURCE

https://en.wikipedia.org/wiki/Non-volatile_memory
Share:

Wednesday, August 14, 2019

In Vsphere 6.0, what is the primary difference between a vSS switch and a vDS switch?

In Vsphere 6.0, what is the primary difference between a vSS switch and a vDS switch?

  • vSS supports host only networking. vDS switches share network resources across multiple hosts
  • vSS supports only 2 hosts. vDS must be used for 3 or more hosts.
  • vSS switches and vDS switches are essentially the same
  • vSS switches are standard and vDS are virtual 

 
In Vsphere 6.0, what is the primary difference between a vSS switch and a vDS switch?

EXPLANATION

vSS (standard switch) works within one ESXi host only. vDS enables more features and allows the switches to be used by multiple hosts.
Searchvmware.techtarget.com
Vmware terminology
Share:

Which of these is NOT a valid ping command

Which of these is NOT a valid ping command

  • ping 0x08080808
  • ping 8.8.8.8 google.com
  • ping 127.1
  • ping 01002004010 

 
Which of these is NOT a valid ping command

EXPLANATION

PING 127.1 is a valid command because it is a short form of 127.0.0.1, same as IPv6 addresses, IPv4 addresses can be shortened by removing leading zeroes. See page 4 of RFC3513
PING 01002004010 is a valid ping command as it is the octal number form of 8.8.8.8.
PING 0x08080808 is a valid ping command as it is the hex number form of 8.8.8.8

PING 8.8.8.8 google.com is NOT valid because of multiple destinations referenced.
See the ping man page.
These conversions may not be useful for day to day IT pros, but in security, it is a huge threat as skilled attackers can use this technique to conceal their IPs from Web Application Firewalls (WAF) since these firewalls only have rules created for IP addresses.
This tool converts IP to different number formats (it's not limited to IP addresses, other bidirectional formats are available)
P.S This question stemmed from this tweet

SOURCE

https://tools.ietf.org/html/rfc3513
Share:

Tuesday, August 13, 2019

What CIDR would be used to restrict a network to 100 hosts?

What CIDR would be used to restrict a network to 100 hosts?

  • /26
  • /12
  • /25
  • /30 
What CIDR would be used to restrict a network to 100 hosts?


EXPLANATION


AddressesHostsNetmaskAmount of a Class C
/3042255.255.255.2521/64
/2986255.255.255.2481/32
/281614255.255.255.2401/16
/273230255.255.255.2241/8
/266462255.255.255.1921/4
/25128126255.255.255.1281/2
/24256254255.255.255.01
/23512510255.255.254.02
/2210241022255.255.252.04
/2120482046255.255.248.08
/2040964094255.255.240.016
/1981928190255.255.224.032
/181638416382255.255.192.064
/173276832766255.255.128.0128
/166553665534255.255.0.0256









Share:

What does CTRL-ALT-DEL actually do, when at the BIOS screen?

What does CTRL-ALT-DEL actually do, when at the BIOS screen?

  • Sends an interrupt 999 to the CPU
  • Sends an interrupt 0 to the CPU
  • Sends an interrupt 443 to the CPU
  • Sends an interrupt 9 to the CPU 

EXPLANATION

If Ctrl+Alt+Del is executed before Windows is to a point where it can intercept the command, BIOS will simply restart the computer. Ctrl+Alt+Del might also restart the computer while in Windows if Windows is locked up in a certain way. For example, using Ctrl+Alt+Del during the Power On Self Test reboots the computer.
In Windows 3.x and 9x, if Ctrl+Alt+Del is quickly pressed twice in a row, the system will immediately start a reboot without safely shutting down any open programs or processes. The page cache is flushed and any volumes are safely unmounted, but there isn't an opportunity to cleanly shut down running programs or save any work.

 

Share:

Popular Posts