IT Questions and Answers :)

Thursday, July 26, 2018

When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

  • Annual
  • KMS
  • Perpetual
  • MAK 

 
When replacing a damaged Chromebook in the Google GSuite admin console, what license allows you to reuse a license for the same model Chromebook?

EXPLANATION

Google allows a Google GSuite console to move licenses to a different Chrome device, but there are differences. There are a Annual and Perpetual. Perpetual licenses are a one time purchase for a single type of device. If that device breaks and is replaced with the same model, you can transfer the license to that device. If you would replace it with a different type and model of device, you would have to purchase an additional license.
An annual license is bought per term and in the case of this, you can transfer the license to any new devices, regardless of the model and type during the license term.
Also, different versions of GSuite support different licensing models. GSuite Enterprise supports Annual and Perpetual, whereas GSuite Education and GSuite Nonprofit only supports Perpetual.

SOURCE

https://support.google.com/chrome/a/answer/2717664?hl=en
Share:

Wednesday, July 25, 2018

Which of the following is NOT a fork of Nagios Core network monitoring system?

Which of the following is NOT a fork of Nagios Core network monitoring system?

  • Naemon
  • Shinken
  • Check MK
  • Icinga 

 
Which of the following is NOT a fork of Nagios Core network monitoring system?

EXPLANATION

Nagios Core is a free and open source computer-software application that monitors systems, networks and infrastructure, initially released in 1999.
Icinga is an open source computer system and network monitoring application. It was originally created as a fork of the Nagios system monitoring application in 2009.
Naemon is an open source computer system monitoring, network monitoring and infrastructure monitoring software application. Initial release 2015 and based on Nagios 4 core.
Shinken is an open source computer system and network monitoring software application. Released as a fork of Nagios in 2009.
Check_MK is an extension to the Nagios monitoring system that allows creating rule-based configuration using Python and offloading work from the Nagios core to make it scale better, allowing more systems to be monitored from a single Nagios server. Initial release 2008.

SOURCE

https://en.wikipedia.org/wiki/Nagios#See_also
Share:

Tuesday, July 24, 2018

Which of the following is the port used for POP3 SSL Traffic?

Which of the following is the port used for POP3 SSL Traffic?

  • 587
  • 995
  • 25
  • 110
Which of the following is the port used for POP3 SSL Traffic?

EXPLANATION

POP uses port 110, but SSL/TLS encrypted POP uses port 995.

SOURCE

https://www.fastmail.com/help/technical/ssltlsstarttls.html
Share:

Monday, July 23, 2018

In programming, which of the following is a mechanism by which an object acquires the properties of another object?

In programming, which of the following is a mechanism by which an object acquires the properties of another object?

  • Anamorphism
  • Inheritance
  • Encapsulation
  • Polymorphism 

 
In programming, which of the following is a mechanism by which an object acquires the properties of another object?

EXPLANATION

‘Inheritance’ is the mechanism provided by Object Oriented Language, which helps an object to acquire the properties of another object usually child object from parent object.

SOURCE

https://en.wikipedia.org/wiki/Inheritance_(object-oriented_programming)
Share:

Friday, July 20, 2018

What does the sender need in order to digitally sign an email?

What does the sender need in order to digitally sign an email?

  • The public key of the recipient
  • The public key of the sender
  • The private key of the recipient
  • The private key of the sender 

EXPLANATION

A digital signature is created by hashing a message and encrypting the hash with the sender's private key. The recipient can then decrypt the hash with the sender's public key. The recipient's keys are not used for a digital signature.

The sender's public key is NOT required to sign the message.
The sender's public key (in the possession of the recipient) is used verify signature.
The recipient's public key is meaningless in this scenario.
The recipient's private key is meaningless in this scenario.  

A general overview of this process can be found here https://www.docusign.com/how-it-works/electronic-signature/digital-signature/digital-signature-faq

SOURCE

https://en.wikipedia.org/wiki/Public-key_cryptography#Digital_signatures
Share:

Thursday, July 19, 2018

In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

  • NTFS
  • exFAT
  • HFS
  • REFS 

 
In Windows, if you want to format a hard drive or removable disk so it can be read and written by both Windows and Apple machines you would format the disk as which of the following?

EXPLANATION

Both Windows and Apple machines can read drives formatted in FAT32.  Apple can read NTFS but cannot write to it.

SOURCE

https://www.laptopmag.com/articles/format-drive-for-windows-and-mac
Share:

Tuesday, July 17, 2018

Which of these is an valid email address?

Which of these is an valid email address?

  • All of them
  • Michael.Scarn@[117.42.15.92]
  • "dogs@r.com"@catsrule.com
  • Security+@comptia.org 

 

EXPLANATION

Based on RFC 5322,
email address can have two "@" symbols as long as the first one is in quotation marks to identify the local name versus the domain name.  IP addresses can be used to identify the domain name.  The "+" symbol is valid in local names.


SOURCE

https://tools.ietf.org/html/rfc5322
Share:

Popular Posts