IT Questions and Answers :)

Tuesday, March 20, 2018

For files in Unix and Linux, "atime" means most recent access time. What does "ctime" mean?

For files in Unix and Linux, "atime" means most recent access time. What does "ctime" mean?

  • the time that file was most recently copied
  • the file's data change time
  • the file's status change time
  • the file's creation time 
For files in Unix and Linux, "atime" means most recent access time. What does "ctime" mean?

EXPLANATION

atime is access time, or when the file was last read.
mtime is modification time, or when the file's data was last modified.
ctime is change time, or when the files status (metadata) was last changed.  Metadata, data about the file as opposed to data in the file, is held in the file's inode.
Unix jargon for "the time a file's status last changed". Change time and creation time (ctime)Unix and Windows file systems interpret 'ctime' differently:Unix systems maintain the historical interpretation of ctime as being the time when certain file metadata, not its contents, were last changed, such as the file's permissions or owner (e.g. 'This file's metadata was changed on 05/05/02 12:15pm').    Windows systems use ctime to mean 'creation time'[citation needed] (also called 'birth time') (e.g. 'This file was created on 05/05/02 12:15pm').


SOURCE

https://www.tldp.org/LDP/Linux-Dictionary/html/Linux-Dictionary.html
Share:

Monday, March 19, 2018

What date/time is UNIX time calculated based off of?

What date/time is UNIX time calculated based off of?

  • 00:00:00 31 December 1967
  • 00:00:00 1 January 0000
  • 00:00:00 1 January, 1900
  • 00:00:00 1 January 1970 
 
What date/time is UNIX time calculated based off of?

EXPLANATION

 

Epoch time, also known as Unix time, is defined as the number of seconds that have elapsed since 00:00:00 Coordinated Universal Time (UTC), Thursday, 1 January 1970 (not counting leap seconds).
Share:

Friday, March 16, 2018

Wednesday, March 14, 2018

Why is the Power Factor (PFC) value listed on most modern PSU units?

Why is the Power Factor (PFC) value listed on most modern PSU units?

  • It indicates the level of efficiency of the PSU
  • It points to the materials used in the PSU (Gold, Silver etc)
  • It relates with the thermal resistance properties
  • Indicates coeficient for the longevity of the PSU 

 
Why is the Power Factor (PFC) value listed on most modern PSU units?

EXPLANATION

The Power Factor value shows the efficiency of the power unit. The power unit capabilities are usually stated as W consumed by the unit (kVA). How much of this power will be available to the loads attached to the PSU however is dictated by the its conversion capabilities summarized by the PFC value. For example, a 1000W PSU with a PFC factor of 0.9 will be able to supply a total of 900W to it's loads.


The PFC itself measures the alignment of the the voltage sinusoidal against the current sinusoidal. If they match 100% you would get a PFC of 1 and hence the perfect lossless PSU. In realty >0.95 is hardly achieved and considered very good while 0.8 could be considered as average PSU. 0.7 is considered as a bad performing PSU
Share:

Tuesday, March 13, 2018

Which of the following CLI commands empties the DNS server cache in Windows Server?

Which of the following CLI commands empties the DNS server cache in Windows Server?

  • ipconfig /flushdns
  • Set-DNS -ClearCache
  • Delete-DNSCache
  • dnscmd /clearcache 

 EXPLANATION Dnscmd /clearcache clears the cache used for DNS server. Dnscmd is the tool used to manage DNS from the command line.
ipconfig /flushdns clears the DNS client cache. A DNS server has both caches but the client cache is the one used to provide name resolution for its own requests, not for other clients on the network.
Dnscmd TechNet article:
https://technet.microsoft.com/en-us/library/cc772069(v=ws.11).aspx
Share:

What type of malware replicates itself from PC to PC throughout the network?

What type of malware replicates itself from PC to PC throughout the network?

  • Spyware
  • Scareware/ransomware
  • Trojan
  • Worm

What type of malware replicates itself from PC to PC throughout the network?

EXPLANATION




Computer worms use the network to send copies of themselves to other PCs, usually exploiting a security hole to travel from one host to the next without user intervention. Because they can spread so rapidly across a network infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses.
Trojan horses are applications that look like they are doing something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don't replicate themselves—they must be installed by an unwitting user.

Scareware is a relatively new type of attack, where a user is tricked into downloading what appears to be an antivirus application, which then proceeds to tell you that your PC is infected with hundreds of viruses that can only be cleaned if you pay for a full license. Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom—in most cases, you can't uninstall them or even use the PC.



Spyware is any software installed on your PC that collects your information without your knowledge, and sends that information back to the creator so they can use it in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.
Share:

Monday, March 12, 2018

Revoked digital certificates are listed in a(n)

Revoked digital certificates are listed in a(n)

  • Public Key Crypto Folder (PKCF)
  • Certificate Revocation List (CRL)
  • 509.X certificate
  • Certification Authority Revocation Algorithm (CARA) 
Revoked digital certificates are listed in a(n)

EXPLANATION

n the operation of some cryptosystems, usually public key infrastructures (PKIs), a certificate revocation list (CRL) is a list of certificates
dhruv-k@hcl.com (or more specifically, a list of serial numbers for certificates) that have been revoked, and therefore, entities presenting those (revoked) certificates should no longer be trusted.
https://en.wikipedia.org/wiki/Revocation_list
Share:

Popular Posts