IT Questions and Answers :)

Thursday, November 23, 2017

What part of the IPsec protocol provides authentication and integrity but not privacy?

What part of the IPsec protocol provides authentication and integrity but not privacy?

  • Sans-privacy protocol
  • Encapsulating security payload
  • Virtual private network
  • Authentication header 

What part of the IPsec protocol provides authentication and integrity but not privacy?

EXPLANATION

In computing, Internet Protocol Security is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network. Because of the complexity or immaturity of the IP security protocols, the initial IPv4 was developed without or barely with security protocols such that the IP version was incomplete, open or left for further research development.
The authentication header provides authentication so that the receiver can be confident of the data source. It does not use encryption, so it does not provide privacy.  
Share:

Which of these is NOT a PHP class?

Which of these is NOT a PHP class?

  • ErrorLog
  • DateTime
  • PDO
  • XMLReader 

 
Which of these is NOT a PHP class?

EXPLANATION

"ErrorLog" is the correct answer.  PHP has a function called "error_log", but it returns true/false and there is no object-oriented version like there is with some of the other classes.
PDO is a PHP extension for working with databases. XMLReader and DateTime are also classes, though they both have procedural versions too.

Share:

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

  • find / | grep "*.log"
  • find /var -name "*.log"
  • ls -l *.log
  • mv "*.log" 

 
In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

EXPLANATION

The "find" command specifies the directory, "/var". The "-name" option tells the "find" command to show only files that have a ".log" extension.

SOURCE

https://www.lifewire.com/uses-of-linux-command-find-2201100
Share:

When running any kind of wires for networked equipment (ie. printers, PC's, video cameras, door locks and readers, etc,) who would be the ultimate authority to ensure code requirements are not violated?

When running any kind of wires for networked equipment (ie. printers, PC's, video cameras, door locks and readers, etc,) who would be the ultimate authority to ensure code requirements are not violated?

  • The local fire marshal.
  • The local building inspector.
  • The state fire marshal and state building inspector.
  • The authority having jurisdiction. 
 
When running any kind of wires for networked equipment (ie. printers, PC's, video cameras, door locks and readers, etc,) who would be the ultimate authority to ensure code requirements are not violated?

EXPLANATION

The Authority Having Jurisdiction, or AHJ, is a general term for whatever agency has the ultimate authority concerning building and life safety codes for a given locality. That authority can vary by location and region, and also by what the actually work pertains to. It can be building inspector, fire marshal, a port authority if the property location falls under such province, a health inspector are some examples.
This may seem like an out of place question for IT matters, but considering many IT professionals are required, or prefer to do "do it yourself" (DIY) projects which sometimes involves running wires, it's important to know the laws and governance that regulate where and how wires are run, the type used, and if any special licensing is required to run such wires. Even a simple wire run in the ceiling from one room to another might run afoul of local building codes. It's also good to know if using contractors to insure they know what they are doing.

SOURCE

https://www.nfpa.org/Assets/files/AboutTheCodes/101/101_FAQs.pdf
Share:

You take a full backup every Sunday and a daily differential backup each morning. Assuming you don't have software that would simplify the process, how many backups would you have to restore following a disaster on Friday?

You take a full backup every Sunday and a daily differential backup each morning. Assuming you don't have software that would simplify the process, how many backups would you have to restore following a disaster on Friday?

  • 1
  • 5
  • 2

You take a full backup every Sunday and a daily differential backup each morning. Assuming you don't have software that would simplify the process, how many backups would you have to restore following a disaster on Friday?

EXPLANATION

With differential backups, you only need to restore the last full backup and the last differential backup. If you were using incremental backups, then you'd need to restore the last full and all intervening incremental backups for full recovery.
Share:

Popular Posts