Thursday, June 7, 2018
Wednesday, June 6, 2018
Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?
Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?
- TCP Syn Scan
- Mail bombing
- Spam
- Flood pings
EXPLANATION
A mail bomb attack sends massive amounts of email to a specific person or system.
A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and cause the server to stop functioning.
Tuesday, June 5, 2018
If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?
If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?
In Windows Active Directory, what are Group Policy Objects?
In Windows Active Directory, what are Group Policy Objects?
- Settings that define what a system should look like and how it will behave
- They determine the hierarchy of a domain, which can fit the operational structure of an organization
- A set of folder rules that determine where Outlook will save email messages
- Affords the capability for secure extension of network operations to the Web
EXPLANATION
Group Policy, in part, controls what users can and cannot do on a computer system: for example, to enforce a password complexity policy that prevents users from choosing an overly simple password, to allow or prevent unidentified users from remote computers to connect to a network share, to block access to the Windows Task Manager or to restrict access to certain folders. A set of such configurations is called a Group Policy Object (GPO)See: http://searchwindowsserver.techtarget.com/definition/Group-Policy-Object
Friday, June 1, 2018
The Betamax was to VHS, as
The Betamax was to VHS, as
- DASD is to SAN
- Terminate and Stay Resident is to Internal OS Commands
- Switching is to Routing
- Token-Ring is to Ethernet