IT Questions and Answers :)

Thursday, June 7, 2018

The intersection of a column and row in a spreadsheet is called a bon or a __?

The intersection of a column and row in a spreadsheet is called a bon or a __?

  • Cell
  • Box
  • Key
  • Field 
The intersection of a column and row in a spreadsheet is called a bon or a __?

 

EXPLANATION





The intersection of a vertical column and horizontal row is called a cell.The location, or address, of a specific cell is identified by using the headers of the column and row involved. For example, cell "F2" is located at the spot where column "F" and row "2" meet.

Share:

Wednesday, June 6, 2018

Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?

Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?

  • TCP Syn Scan
  • Mail bombing
  • Spam
  • Flood pings 

 
Which type of malicious attack not only affects the bandwidth of your connection but also interferes with your mailbox's capability to handle normal email?

EXPLANATION




 A mail bomb attack sends massive amounts of email to a specific person or system.
A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and cause the server to stop functioning.

Share:

Tuesday, June 5, 2018

If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?

If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?

  • 1 TB
  • 4 TB
  • 2 TB
  • 1.5 TB 
If you have a RAID 10 setup with four 500 GB HDDs, how much usable storage capacity will you have?

 EXPLANATION

RAID 10 contains two sets of mirrored drives, and each mirrored set takes two 500 GB drives to store 500 GB of data.
The data will be striped across the two sets for a total of 1 TB usable storage.
Share:

In Windows Active Directory, what are Group Policy Objects?

In Windows Active Directory, what are Group Policy Objects?

  • Settings that define what a system should look like and how it will behave
  • They determine the hierarchy of a domain, which can fit the operational structure of an organization
  • A set of folder rules that determine where Outlook will save email messages
  • Affords the capability for secure extension of network operations to the Web 

 
In Windows Active Directory, what are Group Policy Objects?

EXPLANATION

Group Policy, in part, controls what users can and cannot do on a computer system: for example, to enforce a password complexity policy that prevents users from choosing an overly simple password, to allow or prevent unidentified users from remote computers to connect to a network share, to block access to the Windows Task Manager or to restrict access to certain folders. A set of such configurations is called a Group Policy Object (GPO)
See: http://searchwindowsserver.techtarget.com/definition/Group-Policy-Object

Share:

Friday, June 1, 2018

The Betamax was to VHS, as

The Betamax was to VHS, as

  • DASD is to SAN
  • Terminate and Stay Resident is to Internal OS Commands
  • Switching is to Routing
  • Token-Ring is to Ethernet 

The Betamax was to VHS, as

EXPLANATION

One one time in the 1980s Ethernet and Token-Ring were very competitive, vying for the same customers and networks, replacing Arcnet (similar to Token-Ring) an older network topology.  Speed and reliability of Ethernet versus Token-Ring was the difference maker, and eventually Token-Ring is no longer used nor supported.

SOURCE

http://www.eweek.com/networking/30-years-ago-networking-in-the-1980s-meant-ethernet-vs.-token-ring
Share:

Wednesday, May 30, 2018

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

  • :q
  • :q!
  • :x
  • Ctrl + Z 

Which of the following commands could you use to exit the vi Editor in Linux, saving changes?

 EXPLANATION



:x - Exit, saving changes
:q - Exit as long as there have been no changes

:q! - Exit and ignore any changes
Ctrl + Z - Suspend editor
https://www.cs.colostate.edu/helpdocs/vi.html
http://www.lagmonster.org/docs/vi.html
http://www.rollanet.org/~mdoc/vi.htm
Share:

Tuesday, May 29, 2018

Which of the following is not a tool in Kali Linux?

Which of the following is not a tool in Kali Linux?

  • Sqlmap
  • MBSA
  • Armitage
  • Beef 

 

EXPLANATION

MBSA (Microsoft Baseline Security Analyzer) is a security
testing tool for Microsoft Windows Operating systems to identify vulnerabilities.
Share:

Popular Posts