IT Questions and Answers :)

Tuesday, March 13, 2018

Which of the following CLI commands empties the DNS server cache in Windows Server?

Which of the following CLI commands empties the DNS server cache in Windows Server?

  • ipconfig /flushdns
  • Set-DNS -ClearCache
  • Delete-DNSCache
  • dnscmd /clearcache 

 EXPLANATION Dnscmd /clearcache clears the cache used for DNS server. Dnscmd is the tool used to manage DNS from the command line.
ipconfig /flushdns clears the DNS client cache. A DNS server has both caches but the client cache is the one used to provide name resolution for its own requests, not for other clients on the network.
Dnscmd TechNet article:
https://technet.microsoft.com/en-us/library/cc772069(v=ws.11).aspx
Share:

What type of malware replicates itself from PC to PC throughout the network?

What type of malware replicates itself from PC to PC throughout the network?

  • Spyware
  • Scareware/ransomware
  • Trojan
  • Worm

What type of malware replicates itself from PC to PC throughout the network?

EXPLANATION




Computer worms use the network to send copies of themselves to other PCs, usually exploiting a security hole to travel from one host to the next without user intervention. Because they can spread so rapidly across a network infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses.
Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don't replicate themselves—they must be installed by an unwitting user.

Scareware is a relatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses that can only be cleaned if you pay for a full license. Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom—in most cases, you can't uninstall them or even use the PC.



Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use it in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.
Share:

Monday, March 12, 2018

Revoked digital certificates are listed in a(n)

Revoked digital certificates are listed in a(n)

  • Public Key Crypto Folder (PKCF)
  • Certificate Revocation List (CRL)
  • 509.X certificate
  • Certification Authority Revocation Algorithm (CARA) 
Revoked digital certificates are listed in a(n)

EXPLANATION

n the operation of some cryptosystems, usually public key infrastructures (PKIs), a certificate revocation list (CRL) is a list of certificates
dhruv-k@hcl.com (or more specifically, a list of serial numbers for certificates) that have been revoked, and therefore, entities presenting those (revoked) certificates should no longer be trusted.
https://en.wikipedia.org/wiki/Revocation_list
Share:

Friday, March 9, 2018

What type of jack would you normally use for a POTS line?

What type of jack would you normally use for a POTS line?

  • RJ9
  • RJ31X
  • RJ11
  • RJ45 

 
What type of jack would you normally use for a POTS line?

EXPLANATION

An RJ11 jack supports one POTS (Plain Old Telephone Service) line.
An RJ9 is an unofficial 4P4C plug that is sometimes used for the handset connection to the telephone.  Think the coiled cord. (http://blog.jabra.com/4-types-of-wired-headset-connectors/)
An RJ31X is a special type of jack that can accommodate up to two POTS lines, but is wired using 4 pairs of wire.  This can be described as an intercept or "Man in the Middle" plug.  It is most commonly used with alarm systems,  When the alarm panel is plugged into the jack, the POTS lines pass through the alarm system.  This allow the alarm system to seize the line, possibly dropping a call in progress.  When the alarm system is not plugged into the jack, the POTS lines work normally.

An RJ45 is the jack most IT people are familiar with.  It is the 4 pair plug we normally associate with ethernet and patch cables.

Share:

Thursday, March 8, 2018

In PowerShell, what do you call the method used to pass a hash table to a cmdlet as an argument to give it parameters?

In PowerShell, what do you call the method used to pass a hash table to a cmdlet as an argument to give it parameters?

  • Proping
  • Slamming
  • Hashing
  • Splatting 
 
In PowerShell, what do you call the method used to pass a hash table to a cmdlet as an argument to give it parameters?

EXPLANATION

Splatting can use either an array or a hash table, though it's typically used with a hash table.  The hash table is built with the key names matching the parameter names for the cmdlet, and the values being filled out with the information to pass to the respective parameter.  It's then passed as an argument to the cmdlet with the dollar ("$") decorator replaced with an at symbol ("@").
Example:
$splat = @{
    ParameterOne = 'Value to pass';
    ParameterTwo = 'Another value';
    ParameterThree = 'Still more values';
}

Get-Cmdlet @splat

# The above is equivalent to this:
Get-Cmdlet -ParameterOne 'Value to pass' -ParameterTwo 'Another value' -ParameterThree 'Still more values'
This method can be useful for making a cmdlet with a lot of parameters easier to manage.  It can also be useful for logically adding and removing parameters as needed without having to call the cmdlet multiple times, which can lead to cleaner code and faster execution time.
https://technet.microsoft.com/en-us/library/jj672955.aspx
Share:

Popular Posts