IT Questions and Answers :)

Thursday, November 23, 2017

Which of these is NOT a type of intrusion detection system (IDS)?

Which of these is NOT a type of intrusion detection system (IDS)?

  • Host-based
  • Tunnel-based
  • Network-based
  • Behavior-based 

 
Which of these is NOT a type of intrusion detection system (IDS)?

EXPLANATION

Behavior-based IDS looks for variations in behavior, like unusually high traffic, policy violations, things like that. Deviations in behavior help it recognize potential threats. A network-based IDS examines all network traffic going to and from network systems. A host-based IDS refers to applications like spyware or virus applications that are installed on individual network systems and monitor for things like system file modifications or registry changes.

Share:

How much time can a service be unavailable to meet a "five nines" uptime requirement?

How much time can a service be unavailable to meet a "five nines" uptime requirement?

  • 5.3 minutes per year
  • 87 hours per year
  • 53 minutes per year
  • 8.7 hours per year 

 
How much time can a service be unavailable to meet a "five nines" uptime requirement?

EXPLANATION

Five nines refers to a total operational potential of 99.999%. So for a 24x7 service, across a year that translates to less than 5.3 minutes of combined downtime.https://en.wikipedia.org/wiki/High_availability
Share:

At what location in the Microsoft Windows Registry will you find the currently running service definitions?

At what location in the Microsoft Windows Registry will you find the currently running service definitions?

  • HKLM\SYSTEM\CurrentControlSet\services
  • HKU\.DEFAULT\SYSTEM\CurrentControlSet\services
  • HKCC\System\CurrentControlSet\SERVICES
  • HKCU\System\CurrentControlSet\Services 

 
At what location in the Microsoft Windows Registry will you find the currently running service definitions?

EXPLANATION

The HKLM\SYSTEM\CurrentControlSet\Services registry tree stores information about each service on the system. Each driver has a key of the form HKLM\SYSTEM\CurrentControlSet\Services\DriverName. The PnP manager passes this path of a driver in the RegistryPath parameter when it calls the driver's DriverEntryroutine. A driver can store global driver-defined data under its key in the Services tree. Information that is stored under this key is available to the driver during its initialization.

SOURCE

https://docs.microsoft.com/en-us/windows-hardware/drivers/install/hklm-system-currentcontrolset-services-registry-tree
Share:

In Linux, which of the following is a fast way to copy ssh keys from one server to another?

In Linux, which of the following is a fast way to copy ssh keys from one server to another?

  • mv sshkeys.host1 sshkeys.host2
  • ssh-keys user@hostname.example.com
  • ssh-copy-id user@hostname.example.com
  • ssh-copy-keys user@hostname.example.com 

In Linux, which of the following is a fast way to copy ssh keys from one server to another?

EXPLANATION

The ssh-copy-id command (in the openssh-client package and installed by default) copies ssh key from one server to another.
For example, the following command copies the public key of your default identity to the remote host:
ssh-copy-id user@hostname.example.com

Share:

In JavaScript, what is the result of the following: (true + false) > (2 + true);

In JavaScript, what is the result of the following: (true + false) > (2 + true);

  • false
  • TypeError
  • NaN
  • true 

 
In JavaScript, what is the result of the following: (true + false) > (2 + true);

EXPLANATION

The above line of JavaScript returns false. Why? The reason is called type coercion. You're using two boolean values in an arithmetic operation, which is not possible unless the interpreter converts them into numbers first. So consider the following:
If you evaluate the statements, you find that true equals 1 and false equals 0. So your expression is equivalent to:
(1 + 0) > 2 + 1
which reduces to:
1 > 3

which is false!

Share:

AES Encryption uses which cipher?

AES Encryption uses which cipher?

  • Serpent
  • Rijndael
  • Twofish
  • RC6 

 
AES Encryption uses which cipher?

EXPLANATION

AES (Advanced Encryption Standard) is a NIST standard for encryption using the Rijndael cipher. The cipher selected for AES was determined through an open call for new algorithms in 1997. The finalists for selection were Rijndael, Serpent, Twofish, RC6, and MARS, with Rijndael being the winning algorithm.
Share:

Which of the following is not a classless routing protocol?

Which of the following is not a classless routing protocol?

  • IGRP
  • OSPF
  • RIPv2
  • EIGRP 

 
Which of the following is not a classless routing protocol?

EXPLANATION

The Interior Gateway Routing Protocol (IGRP) is a Cisco proprietary technology which has been superseded by the Enhanced Interior Gateway Routing Protocol (EIGRP).  Among its enhancements over IGRP is support for Variable Length Subnet Masks (VLSM), which is required for "classless routing".
Open Shortest Path First (OSPF) is a standard supported by most, if not all, router makers; it has always supported classless routing features.
Routing Information Protocol (RIP) version 1 did not include support for VLSM; version 2 added this support.

Share:

Popular Posts