IT Questions and Answers :)

Wednesday, July 25, 2018

Which of the following is NOT a fork of Nagios Core network monitoring system?

Which of the following is NOT a fork of Nagios Core network monitoring system?

  • Naemon
  • Shinken
  • Check MK
  • Icinga 

 
Which of the following is NOT a fork of Nagios Core network monitoring system?

EXPLANATION

Nagios Core is a free and open source computer-software application that monitors systems, networks and infrastructure, initially released in 1999.
Icinga is an open source computer system and network monitoring application. It was originally created as a fork of the Nagios system monitoring application in 2009.
Naemon is an open source computer system monitoring, network monitoring and infrastructure monitoring software application. Initial release 2015 and based on Nagios 4 core.
Shinken is an open source computer system and network monitoring software application. Released as a fork of Nagios in 2009.
Check_MK is an extension to the Nagios monitoring system that allows creating rule-based configuration using Python and offloading work from the Nagios core to make it scale better, allowing more systems to be monitored from a single Nagios server. Initial release 2008.

SOURCE

https://en.wikipedia.org/wiki/Nagios#See_also
Share:

Tuesday, July 24, 2018

Which of the following is the port used for POP3 SSL Traffic?

Which of the following is the port used for POP3 SSL Traffic?

  • 587
  • 995
  • 25
  • 110
Which of the following is the port used for POP3 SSL Traffic?

EXPLANATION

POP uses port 110, but SSL/TLS encrypted POP uses port 995.

SOURCE

https://www.fastmail.com/help/technical/ssltlsstarttls.html
Share:

Monday, July 23, 2018

In programming, which of the following is a mechanism by which an object acquires the properties of another object?

In programming, which of the following is a mechanism by which an object acquires the properties of another object?

  • Anamorphism
  • Inheritance
  • Encapsulation
  • Polymorphism 

 
In programming, which of the following is a mechanism by which an object acquires the properties of another object?

EXPLANATION

‘Inheritance’ is the mechanism provided by Object Oriented Language, which helps an object to acquire the properties of another object usually child object from parent object.

SOURCE

https://en.wikipedia.org/wiki/Inheritance_(object-oriented_programming)
Share:

Friday, July 20, 2018

What does the sender need in order to digitally sign an email?

What does the sender need in order to digitally sign an email?

  • The public key of the recipient
  • The public key of the sender
  • The private key of the recipient
  • The private key of the sender 

EXPLANATION

A digital signature is created by hashing a message and encrypting the hash with the sender's private key. The recipient can then decrypt the hash with the sender's public key. The recipient's keys are not used for a digital signature.

The sender's public key is NOT required to sign the message.
The sender's public key (in the possession of the recipient) is used verify signature.
The recipient's public key is meaningless in this scenario.
The recipient's private key is meaningless in this scenario.  

A general overview of this process can be found here https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq

SOURCE

https://en.wikipedia.org/wiki/Public-key_cryptography#Digital_signatures
Share:

Thursday, July 19, 2018

In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

  • NTFS
  • exFAT
  • HFS
  • REFS 

 
In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

EXPLANATION

Both Windows and Apple machines can read drives formatted in FAT32.  Apple can read NTFS but cannot write to it.

SOURCE

https://www.laptopmag.com/articles/format-drive-for-windows-and-mac
Share:

Tuesday, July 17, 2018

Which of these is an valid email address?

Which of these is an valid email address?

  • All of them
  • Michael.Scarn@[117.42.15.92]
  • "dogs@r.com"@catsrule.com
  • Security+@comptia.org 

 

EXPLANATION

Based on RFC 5322,
email address can have two "@" symbols as long as the first one is in quotation marks to identify the local name versus the domain name.  IP addresses can be used to identify the domain name.  The "+" symbol is valid in local names.


SOURCE

https://tools.ietf.org/html/rfc5322
Share:

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

Which of the following technologies is required to run Hyper-V on Windows 2012 R2?

  • DirectX
  • Hyper-threading
  • Hardware Enforced Data Execution Prevention (DEP)
  • MMX4 

 

EXPLANATION

Hyper-V virtualization technology requires specific hardware. You can identify systems that support x64-based architecture and Hyper-V by searching the Windows Server Catalog for Hyper-V: Windows Server catalog.
Hyper-V Server has hardware requirements that are similar to those for the Hyper-V role in other editions of Windows Server. Hardware-enforced Data Execution Prevention (DEP) must be available and enabled. Specifically, you must enable the Intel XD (“execute disable”) bit or the AMD NX (“no execute”) bit.


SOURCE

https://technet.microsoft.com/en-us/library/cc731898(v=ws.11).aspx
Share:

Popular Posts