IT Questions and Answers :)

Wednesday, January 31, 2018

Which of the following is a software program that uses the Secure Shell protocol to accept connections from remote computers?

Which of the following is a software program that uses the Secure Shell protocol to accept connections from remote computers?

  • LogMeIn
  • Remote desktop
  • Team viewer
  • SSH server 

 
Which of the following is a software program that uses the Secure Shell protocol to accept connections from remote computers?

EXPLANATION




A Secure Shell  (SSH) server is a software program that uses the SSH protocol to accept connections from remote computers. SFTP/SCP file transfers and remote terminal connections are popular use cases for an SSH server.
 
Share:

Tuesday, January 30, 2018

Which of the following is not a requirement of an elastic system?

Which of the following is not a requirement of an elastic system?

  • CPU, GPU, RAM, storage availability
  • Provision/deprovision resources
  • Monitor resource usage
  • Leprechauns

 
Which of the following is not a requirement of an elastic system?

EXPLANATION

According to a paper from Karlsruhe Institute of Technology, "Elasticity is the degree to which a system is able to adapt to workload changes by provisioning and deprovisioning resources in an autonomic manner, such that at each point in time the available resources match the current demand as closely as possible." https://sdqweb.ipd.kit.edu/publications/pdfs/HeKoRe2013-ICAC-Elasticity.pdf
Resources such as CPU cycles, RAM, and storage are all necessary to provision to a client account. What makes elasticity different from simply being scale-able is that systems can be automated to add or remove these resources pending the outcome of a monitoring routine. Generally speaking, an elastic system doesn't require a Leprechauns to operate.

SOURCE

https://sdqweb.ipd.kit.edu/publications/pdfs/HeKoRe2013-ICAC-Elasticity.pdf
 
Share:

Which type of RAID configuration requires minimum six drives?

Which type of RAID configuration requires minimum six drives?

  • RAID 60 (RAID 6 + 0)
  • RAID 50 (RAID 5 + 0)
  • RAID 100 (RAID 10+0)
  • RAID 6 

 
Which type of RAID configuration requires minimum six drives?

EXPLANATION

RAID 50, also called RAID 5+0, combines the straight block-level striping of RAID 0 with the distributed parity of RAID 5.[3] As a RAID 0 array striped across RAID 5 elements, minimal RAID 50 configuration requires six drives.

SOURCE

https://en.wikipedia.org/wiki/Nested_RAID_levels
Share:

Friday, January 26, 2018

When it comes to associative memory, how does the memory locate the address of the data?

When it comes to associative memory, how does the memory locate the address of the data?

  • The address of the data is supplied by the users
  • The address of the data is generated by the CPU
  • The data are accessed sequentially
  • There is no need for an address, the data is used as an address 
 
When it comes to associative memory, how does the memory locate the address of the data?

EXPLANATION

Associative memory is memory capable of determining whether a given datum (the search word) is contained in one of its addresses or locations. Associative memory  is also referred to as content-addressable memory.
Unlike standard computer memory (random access memory or RAM) in which the user supplies a memory address and the RAM returns the data word stored at that address, associative memory is designed such that the user supplies a data word and the computer searches its entire memory to see if that data word is stored anywhere in it.
Share:

Thursday, January 25, 2018

What is the non-linear function that made DES cryptography so strong?

What is the non-linear function that made DES cryptography so strong?

  • Trick question, DES is fully linear
  • Swapping 4 bytes (left and right) after every round
  • Expansion & Contraction algorithms
  • 16 rounds of S-Box lookups 
 
What is the non-linear function that made DES cryptography so strong?

EXPLANATION

The genius of Horst Feisel's cipher was in the use S-Boxes for a non-linear lookup function based on the bit values of the ciphertext within each round. Operating on only 1/2 the ciphertext per round, the 48 expanded bits are chopped into 6-bit inputs across the 8 S-Boxes, with each 6-bit input performing a row/table lookup to yield 4 bits of output.  Without this non-linear function, DES would have been linear, and thus very weak.
This design is even more impressive when you consider that the process ran the same forwards and backwards for encrypt/decrypt, and was optimized for hardware.  While met with great suspicion when introduced, the Data Encryption Standard proved worthy of the trust provided it, weathering every attack except Moore's Law and time, which ultimately led to its obsolescence due to brute force attacks.  40 years later, the field of cryptography, and the fabric of the Internet and digital commerce, owes much to the knowledge we gained regarding cryptanalysis and ciphers from this legacy

SOURCE

https://en.wikipedia.org/wiki/Data_Encryption_Standard#The_Feistel_.28F.29_function
Share:

Popular Posts