IT Questions and Answers :)

Thursday, November 23, 2017

Which of the following is an IPV6 automatic tunneling protocol used by Windows on systems located behind a NAT router?

Which of the following is an IPV6 automatic tunneling protocol used by Windows on systems located behind a NAT router?

  • APIPA
  • ISATAP
  • 6to4
  • Teredo
 
Which of the following is an IPV6 automatic tunneling protocol used by Windows on systems located behind a NAT router?

EXPLANATION

Teredo is a mechanism that enables devices behind non-IPv6 NAT routers to function as tunnel endpoints.
For more information on Teredo, see: https://en.wikipedia.org/wiki/Teredo_tunneling
 
Share:

Which of the following is FALSE about DDR2 and DDR3 RAM?

Which of the following is FALSE about DDR2 and DDR3 RAM?

  • DDR3 uses less power than DDR2
  • DDR3 has fewer pins than DDR2
  • DDR3 is not backwards compatible with DDR2
  • DDR3 is faster than DDR2 

 
Which of the following is FALSE about DDR2 and DDR3 RAM?

EXPLANATION

DDR3 is the successor to DDR2 memory technology. There are several differences between them. DDR3 is not backwards compatible with DDR2. While both types of modules have the same numbers of pins, the notches in the PCB are in different locations. In other words, a DDR3 module cannot be placed in a DDR2 memory socket, and vice-versa.

DDR3 modules run on 1.5V compared to the 1.8V that DDR2 modules require. The DDR3 decrease in voltage results in less power consumption and greater energy-efficiency at comparable speeds.
DDR3 is faster. DDR2 "JEDEC standard" memory typically stops at around 800MHz whereas the introductory speeds of DDR3 when it was released in 2007 started at 800MHz and is far faster than that now.

Share:

What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

  • Protocol manipulation
  • Cross-site scripting
  • Sniffing
  • Spoofing 
What type of attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party?

 EXPLANATION

A cross-site scripting attack occurs when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a third party.

SOURCE

https://en.wikipedia.org/wiki/Cross-site_scripting
Share:

Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

  • Up to 25.5 W
  • Up to 31.41592 W
  • > 9000 mW
  • 1.21 GW 

 
Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

EXPLANATION

The updated IEEE 802.3at-2009[7] PoE standard also known as PoE+ or PoE plus, provides up to 25.5 W of power.
https://en.wikipedia.org/wiki/Power_over_Ethernet
Share:

Which of the following is not a part of 3-2-1 backup strategy?

Which of the following is not a part of 3-2-1 backup strategy?

  • Different vendor
  • Different copy
  • Different location
  • Different media 

 

EXPLANATION

The 3-2-1 backup strategy, also known as the Rule of Three, says that you should have at least 3 different copies of the data on at least 2 different types of media in at least 1 different location.

Share:

In Linux, what does the -a flag stand for, when used with the rsync command?

In Linux, what does the -a flag stand for, when used with the rsync command?

  • Archive
  • Active
  • Append
  • Advanced 

 
In Linux, what does the -a flag stand for, when used with the rsync command?

EXPLANATION

From the man page: 
 -a, --archive archive mode; same as -rlptgoD (no -H)

http://linuxcommand.org/man_pages/rsync1.html
Share:

In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

  • msAssistantExch
  • msExchAssistantName
  • msExchAssistant
  • ExchAssistantName 

 
In Active Directory what is the attribute name for someone's Assistant in the Exchange Global Address List

EXPLANATION

This attribute in Active Directory is usually set using ADSIEdit. There are ways to set this programmatically using C# and PowerShell. This attribute sets the assistant's name in the GAL which allows for identifying a PA / Secretary for a (usually) senior member of staff in an organisation

See: https://msdn.microsoft.com/en-us/library/ms677841(v=vs.85).aspx

Share:

Popular Posts