IT Questions and Answers :)

Wednesday, May 30, 2018

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

  • :q
  • :q!
  • :x
  • Ctrl + Z 

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

 EXPLANATION



:x - Exit, saving changes
:q - Exit as long as there have been no changes

:q! - Exit and ignore any changes
Ctrl + Z - Suspend editor
https://www.cs.colostate.edu/helpdocs/vi.html
http://www.lagmonster.org/docs/vi.html
http://www.rollanet.org/~mdoc/vi.htm
Share:

Tuesday, May 29, 2018

Which of the following is not a tool in Kali Linux?

Which of the following is not a tool in Kali Linux?

  • Sqlmap
  • MBSA
  • Armitage
  • Beef 

 

EXPLANATION

MBSA (Microsoft Baseline Security Analyzer) is a security
testing tool for Microsoft Windows Operating systems to identify vulnerabilities.
Share:

Which of the following is a software implementation of a telephone private branch exchange (PBX)?

Which of the following is a software implementation of a telephone private branch exchange (PBX)?

  • Snom
  • Digium
  • Asterisk
  • Polycom 

 
Which of the following is a software implementation of a telephone private branch exchange (PBX)?

EXPLANATION

Digium is the company and hardware (appliance) name where Asterisk is software name. Polycom and Snom provide VoIP equipment.

SOURCE

https://en.wikipedia.org/wiki/Asterisk_(PBX)
Share:

Saturday, May 26, 2018

Which of the following is the primary benefit of Platform as a Service (PaaS)?

Which of the following is the primary benefit of Platform as a Service (PaaS)?

  • High bandwidth
  • Replication
  • Low latency
  • Rapid application deployment 

Which of the following is the primary benefit of Platform as a Service (PaaS)?

EXPLANATION

PaaS provides rapid application deployment. Platform as a service (PaaS) is a category of cloud computing services that provides a platform allowing customers to develop,
run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
Share:

What is the minimum number of drives required for a non-degraded Raid 5 array?

What is the minimum number of drives required for a non-degraded Raid 5 array?

  • 2
  • 4
  • 5
  • 3
 
What is the minimum number of drives required for a non-degraded Raid 5 array?
 

EXPLANATION

RAID 5 requires 3 disks. It consists of block-level data striping with distributed parity. This means that data is striped across multiple disks with fault-tolerant parity data written to each disk. If one disk fails, the array can reconstruct the data from the parity information. 
Share:

Wednesday, May 23, 2018

In a computer device, which of the following types of memory has the fastest access time?

In a computer device, which of the following types of memory has the fastest access time?

  • PCIe based SSD memory
  • RAM
  • CPU register
  • CPU cache 

 
In a computer device, which of the following types of memory has the fastest access time?

EXPLANATION

The faster the memory is the more expensive. Also the closer to the CPU is the lesser the latency would be. In this regard one can reasonably suggest which is the fastest memory only be looking by it size and location in the system.

The fastest memory block in a computer is the CPU register but it is also the smallest. It is followed by various levels of CPU cache. More info can be found here:
http://www.moreprocess.com/devices/computer-memory-hierarchy-internal-register-cache-ram-hard-disk-m...
Share:

Tuesday, May 22, 2018

In computing security, which of the following describes a nonce?

In computing security, which of the following describes a nonce?

  • A hacking algorythm
  • No Other non-Critical Events
  • A value used once
  • A vector 

 
In computing security, which of the following describes a nonce?

EXPLANATION

Typically, a nonce is some value that varies with time, although a very large random number is sometimes used. A nonce can be a time stamp, a visit counter on a Web page, or a special marker intended to limit or prevent the unauthorized replay or reproduction of a file.

SOURCE

http://searchsecurity.techtarget.com/definition/nonce
Share:

Popular Posts