IT Questions and Answers :)

Thursday, November 23, 2017

Windows 10 offers four (4) different update branches that describe every update parameter; from the applicable edition of Win. 10 to the length of support for the update, (5-yrs, 10-yrs, etc). Which of the following is NOT one of these branches?

Windows 10 offers four (4) different update branches that describe every update parameter; from the applicable edition of Win. 10 to the length of support for the update, (5-yrs, 10-yrs, etc). Which of the following is NOT one of these branches?

  • Current Branch for Business
  • Long Term Servicing Branch
  • Windows Insider Preview Branch
  • Open grade 

 
Windows 10 offers four (4) different update branches that describe every update parameter; from the applicable edition of Win. 10 to the length of support for the update, (5-yrs, 10-yrs, etc). Which of the following is NOT one of these branches?

EXPLANATION


Upgraded builds of Windows 10, known as feature updates,[199] are occasionally released, containing new features and other changes; in April 2017, Microsoft stated that in the future, these updates would be released semi-annually every March and September.[200]
The pace at which feature updates are received by devices is dependent on which release channel is used; the default branch for all users of Windows 10 Home and Pro is "Current Branch", (CB) which receives stable builds after they are publicly released by Microsoft. A 60-day grace period is provided for each CB build to be rolled out to users before Microsoft ends support and updates for the previous version.[199] Windows Insider branches receive unstable builds as they are released, at either a "Fast" pace (immediately after release) or "Slow" pace (slightly delayed from their "Fast" release). The Pro and Enterprise editions may optionally use the "Current Branch for Business" release channel (CBB), which receives the stable builds on a roughly four-month delay from their CB release to allow for additional testing.[199][191][201] CBB may defer build upgrades for up to eight months, after which the new build must be installed in order to maintain support and access to security updates.[197] Administrators can also use the "Windows Update for Business" system to organize structured deployments of updates and build upgrades across their networks.[191]
Enterprise licensees may use the Windows 10 Enterprise Long-term Servicing Branch (LTSB) edition.[199][201] LTSB milestones of Windows 10 are designed for long-term deployments in specialized environments, and only receive quality of life updates (i.e. security patches). Each LTSB milestone is given a full, 10-year support lifecycle. Due to Microsoft's intended use cases for LTSB builds, certain features, including most Cortana functionality, Windows Store, and bundled apps, are excluded from LTSB.[199][175][202][203]Microsoft director Stella Chernyak explained that "we have businesses [that] may have mission-critical environments where we respect the fact they want to test and stabilize the environment for a long time."[204]

SOURCE

https://en.wikipedia.org/wiki/Windows_10#Storage_requirements
Share:

To send an email via an SMTP server using the TELNET program, what commands should you use in which order?

To send an email via an SMTP server using the TELNET program, what commands should you use in which order?

  • EHLO, DATA, MAIL FROM then RCPT TO
  • EHLO, MAIL FROM, RCPT TO then DATA
  • DATA, EHLO, RCPT TO, then MAIL FROM
  • EHLO, RCPT TO, MAIL FROM then DATA 

 
To send an email via an SMTP server using the TELNET program, what commands should you use in which order?

EXPLANATION

Using telnet to test a mail server is a staple part of being able to diagnose e-mail faults. You must follow a specific protocol order for commands, EHLO first (to introduce your connection and view the available features of the server), MAIL FROM next to specify the sender, RCPT TO thirdly to specify the recipient, and finally DATA, which is followed by the message headers and body.

SOURCE

https://www.port25.com/how-to-check-an-smtp-connection-with-a-manual-telnet-session-2/
Share:

What of the following names is a USB device that registers itself as a network adapter but is a covert systems administration and penetration testing tool?

What of the following names is a USB device that registers itself as a network adapter but is a covert systems administration and penetration testing tool?

  • BeamGun
  • LAN Turtle
  • NET Ninja
  • Rubber Ducky 

 
What of the following names is a USB device that registers itself as a network adapter but is a covert systems administration and penetration testing tool?

EXPLANATION

The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle monitoring capabilities.
Housed within a generic "USB Ethernet Adapter" case, the LAN Turtle’s covert appearance allows it to blend into many IT environments.
See: https://lanturtle.com/ for more information

Share:

In Perl, which variable contains the parameters passed to a subroutine?

In Perl, which variable contains the parameters passed to a subroutine?

  • $ARGV
  • $0 through $9
  • @_
  • @parameters 

 
In Perl, which variable contains the parameters passed to a subroutine?

EXPLANATION

The @_ array contains the parameters passed to any perl subroutine, method or function. You may reference the @_ array with either list assignment, e.g. "my ($param1, $param2) = @_;" or via referencing any of the array indicies, e.g. "my $param2 =  $_[1];".

SOURCE

https://stackoverflow.com/questions/4563485/what-is-the-meaning-of-in-perl
Share:

Which of these files will not fit in a 32GB flashdrive formatted as FAT32?

Which of these files will not fit in a 32GB flashdrive formatted as FAT32?

  • 10 .msi files with 1000MB each
  • All of them would fit just fine
  • 3 .tar.gz files with 5GB each
  • A .zip file with 1024MB 

 
Which of these files will not fit in a 32GB flashdrive formatted as FAT32?

EXPLANATION

Since your flash drive is formatted with the FAT32 file system, any file that is larger than 4GB will not be placed there. This type of a file system has a built-in limitation on the size of the files that it may contain. Although the total size of the files that you can copy to a FAT32 drive could be as large as 2TB (or the physical capacity of the drive, whichever is smaller), the size of each individual file may not exceed 4GB.

This limitation may sound silly: why would anyone design a system that would not allow for the larger files? The problem is, when the FAT32 file system was designed (that was back in the days of Windows 95), no one anticipated that we would have such large files in use today. Or, maybe the designers hoped that by the time such large files became common, the use of the FAT32 system would be replaced by more modern systems.

Share:

At a Windows command prompt that is set to the root of the drive, which of the following commands will search the entire drive for all occurrences of the "Testing.docx" file?

At a Windows command prompt that is set to the root of the drive, which of the following commands will search the entire drive for all occurrences of the "Testing.docx" file?

  • DIR Testing.docx
  • DIR /ALL Testing.docx
  • DIR /R Testing.docx
  • DIR /S Testing.docx 
 
At a Windows command prompt that is set to the root of the drive, which of the following commands will search the entire drive for all occurrences of the "Testing.docx" file?

EXPLANATION

The directory command allows many flags, including the recursive search flag "/S". This flag searches the current folder and all sub folders.
Share:

What part of the IPsec protocol provides authentication and integrity but not privacy?

What part of the IPsec protocol provides authentication and integrity but not privacy?

  • Sans-privacy protocol
  • Encapsulating security payload
  • Virtual private network
  • Authentication header 

What part of the IPsec protocol provides authentication and integrity but not privacy?

EXPLANATION

In computing, Internet Protocol Security is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network. Because of the complexity or immaturity of the IP security protocols, the initial IPv4 was developed without or barely with security protocols such that the IP version was incomplete, open or left for further research development.
The authentication header provides authentication so that the receiver can be confident of the data source. It does not use encryption, so it does not provide privacy.  
Share:

Popular Posts