IT Questions and Answers :)

Saturday, December 7, 2019

What VPN tunnel type was developed in cooperation with Cisco Systems and Microsoft, and uses Data Encryption Standard (DES) or Triple DES (3DES)?

What VPN tunnel type was developed in cooperation with Cisco Systems and Microsoft, and uses Data Encryption Standard (DES) or Triple DES (3DES)?

  • L2TP/IPsec
  • SSTP
  • PPTP
  • L2TP 

What VPN tunnel type was developed in cooperation with Cisco Systems and Microsoft, and uses Data Encryption Standard (DES) or Triple DES (3DES)?

EXPLANATION

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy.





Share:

What does VPN stand for?

What does VPN stand for?

  • Virtual Private Network
  • Very Private Network
  • Virtual Private Netconnection
  • Virtual Privacy Network 

EXPLANATION

A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running on a computing device, e.g., a laptop, desktop, smartphone, across a VPN may therefore benefit from the functionality, security, and management of the private network. Encryption is a common, though not an inherent, part of a VPN connection. VPN technology was developed to allow remote users and branch offices to access corporate applications and resources.


Share:

Which version of Windows Server 2012 is available through OEMs only, and is limited to amaximum of 15 users?

Which version of Windows Server 2012 is available through OEMs only, and is limited to amaximum of 15 users?

  • Essentials Edition
  • Foundation Edition
  • Standard
  • Datacenter 
Which version of Windows Server 2012 is available through OEMs only, and is limited to amaximum of 15 users?

EXPLANATION

Windows Server 2012 Foundation edition

This edition of Windows Server 2012 is targeted towards small businesses of up to 15 users. The Windows Server 2012 R2 Foundation edition comes pre-installed on hardware server with single physical processor and up to 32GB of DRAM memory. Foundation edition can be implemented in environments where features such as file sharing, printer sharing, security and remote access are required. Advanced server features such as Hyper V, RODC (Read Only Domain Controller), data deduplication, dynamic memory, IPAM (IP Address Management), server core, certificate service role, hot add memory, windows update services and failover clustering are not available in the Foundation edition.



Windows Server 2012 Essentials edition

The Windows Server 2012 R2 Essentials edition is the next step up, also geared towards small businesses of up to 25 users.  Windows Server 2012 R2 Essentials edition is available in retail stores around the world making it easy for businesses to install the new operating system without necessarily purchasing new hardware. Similar to the Foundation edition, the Essentials edition does not support many advanced server features, however it does provide support of features like Hyper V, dynamic memory and hot add/remove RAM.
Windows Server 2012 R2 Essentials edition can run a single instance of virtual machine on Hyper V, a feature that was not available in Windows Server 2012 Essentials (non-R2) edition. This single virtual machine instance can be Windows Server 2012 R2 Essential edition only, seriously limiting the virtualization options but allowing companies to begin exploring the benefits of the virtualization platform.

Windows Server 2012 Standard edition

The Windows Server 2012 R2 Standard edition of windows server is used for medium to large businesses that require additional features not present in the Foundation & Essential edition. The Standard edition is able to support an unlimited amount of users, as long as the required user licenses have been purchased.
Advanced features such as certificate services role, Hyper V, RODC (Read Only Domain Controller), IPAM (IP Address Management), Data deduplication, server core, failover clustering and more, are available to Windows Server 2012 Standard edition. We should note that the Standard edition supports up to 2 Virtual Machines.


Windows Server 2012 Datacenter edition

The Windows Server 2012 R2 Datacenter edition is the flagship product created to meet the needs of medium to large enterprises. The major difference between the Standard and Datacenter edition is that the Datacenter edition allows the creation of unlimited Virtual Machines and is therefore suitable for environments with extensive use of virtualization technology.

 

Share:

An attacker went to a local bank and collected thrown away paper with the intention of using this information to steal funds and information from the bank's customers. What is this an example of?

An attacker went to a local bank and collected thrown away paper with the intention of using this information to steal funds and information from the bank's customers. What is this an example of?

  • Tailgating
  • Dumpster Diving
  • Impersonation
  • Typosquatting

An attacker went to a local bank and collected thrown away paper with the intention of using this information to steal funds and information from the bank's customers. What is this an example of?

EXPLANATION

Impersonation attacks are emails that attempt to impersonate a trusted individual or company in an attempt to gain access to corporate finances or data. Business email compromise (BECs) also known as CEO fraud is a popular example of an impersonation attack.

The tailgating attack, also known as “piggybacking,” involves an attacker seeking entry to a restricted area which lacks the proper authentication- The attacker can simply walk in behind a person who is authorized to access the area.

In the world of information technology, dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes.
Typosquatting, also called URL hijacking, a sting site, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser. Should a user accidentally enter an incorrect website address, they may be led to any URL (including an alternative website owned by a cybersquatter).[1]
The typosquatter's URL will usually be one of five kinds, all similar to the victim site address (e.g. example.com):
  • A common misspelling, or foreign language spelling, of the intended site: exemple.com
  • A misspelling based on typos: examlpe.com
  • A differently phrased domain name: examples.com
  • A different top-level domain: example.org
  • An abuse of the Country Code Top-Level Domain (ccTLD): example.cm by using .cm, example.co by using .co, or example.om by using .om. A person leaving out a letter in .com in error could arrive at the fake URL's website.
Similar abuses:
  • Combosquatting - no misspelling, but appending an arbitrary word that appears legitimate, but that anyone could register. "Combosquatting is around one hundred times more common than typosquatting.": example-security.com
  • Doppelganger domain - omitting a period: financeexample.com (instead of finance.example.com)
  • Extra period: e.xample.com
  • Appending terms to name an intuitive name for a gripe sites: example-sucks.com or examplesucks.com

  

Share:

In PowerShell what cmdlet would you use to update a registry value

In PowerShell what cmdlet would you use to update a registry value

  • Set-ItemValue
  • Set-RegistryValue
  • Set-ItemProperty
  • Update-RegistryKey 
In PowerShell what cmdlet would you use to update a registry value

EXPLANATION

Modifying the value of a registry property value

To modify the value of a registry property value requires using the Set-PropertyItem cmdlet.
Only the steps…
Modifying the value of a registry property value:
  1. Use the Push-Location cmdlet to save the current working location.
  2. Use the Set-Location cmdlet to change to the appropriate registry drive.
  3. Use the Set-ItemProperty cmdlet to assign a new value to the registry property.
  4. Use the Pop-Location cmdlet to return to the original working location.
In the image that follows, a registry key named hsg exists in the HKCU:\Software hive. The registry key has a property named NewProperty.
Share:

Friday, December 6, 2019

Which is not a layer of the OSI Model

Which is not a layer of the OSI Model

  • Presentation
  • Data Link
  • Packet
  • Transport
Which is not a layer of the OSI Model

EXPLANATION

 A network packet is a formatted unit of data carried by a packet-switched network. A packet consists of control information and user data, which is also known as the payload

A packet is a small amount of data sent over a network, such as a LAN or the Internet. Similar to a real-life package, each packet includes a source and destination as well as the content (or data) being transferred. When the packets reach their destination, they are reassembled into a single file or other contiguous block of data.
While the exact structure of a packet varies between protocols, a typical packet includes two sections — a header and payload. Information about the packet is stored in the header. For example, an IPv6 header includes the following fields:
  1. Source address (128 bits) - IPv6 address of the packet origin
  2. Destination address (128 bits) - IPv6 address of the packet destination
  3. Version (4 bits) - "6" for IPv6
  4. Traffic class (8 bits) - priority setting for the packet
  5. Flow label (20 bits) - optional ID that labels the packet as part of a specific flow; used to distinguish between multiple transmissions from a single origin
  6. Payload length (16 bits) - size of the data, defined in octets
  7. Next header (8 bits) - ID of the header following the current packet; may be TCP, UDP, or another protocol
  8. Hop limit (8 bits) - maximum number of network hops (between routers, switches, etc) before the packet is dropped; also known as "TTL" in IPv4
The payload section of a packet contains the actual data being transferred. This is often just a small part of a file, webpage, or other transmission, since individual packets are relatively small. For example, the maximum size of an IP packet payload is 65,535 bytes, or 64 kilobytes. The maximum size of an Ethernet packet or "frame" is only 1,500 bytes or 1.5 kilobytes.
Packets are intended to transfer data reliably and efficiently. Instead of transferring a large file as a single block of data, sending smaller packets helps ensure each section is transmitted successfully. If a packet is not received or is "dropped," only the dropped packet needs to be resent. Additionally, if a data transfer encounters network congestion due to multiple simultaneous transfers, the remaining packets can be rerouted through a less congested path.

 

Share:

How to show & hide invisible folders on macOS

How to show & hide invisible folders on macOS

  • control+command+space
  • shift+command+period [CMD + SHIFT + .
  • shift+option+i
  • option+command+period 
How to show & hide invisible folders on macOS

EXPLANATION

the command to show hidden files on Mac OS X, not to mention Googling for the command to then hide those hidden files a few minutes later.

Today I decided to make a short and easy to remember alias to speed up the process. All I need do now is type showFiles and hideFiles whenever I need to show/hide OS X’s hidden files. Here’s how you can do it too.

The Quickest Way to Show/Hide Hidden Files

Since the release of macOS Sierra, when in Finder, it is now possible to use the shortcut:
 CMD + SHIFT + .
Press once to show hidden files and again to hide them. If you’re using a version earlier than macOS Sierra, see Show/Hide Hidden Files using Terminal Aliases to setup a toggle command via terminal.

 


Share:

Popular Posts