IT Questions and Answers :)

Thursday, August 9, 2018

Which of the following retains the information it's storing when the system power is turned off?

Which of the following retains the information it's storing when the system power is turned off?

  • ROM
  • RAM
  • GPU
  • CPU 

 
Which of the following retains the information it's storing when the system power is turned off?

EXPLANATION

Read only memory (ROM) is nonvolatile, meaning that turning off the computer doesn't erase it. 

Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware (software that is closely tied to specific hardware, and unlikely to need frequent updates) or application software in plug-in cartridges.
Strictly, read-only memory refers to memory that is hard-wired, such as diode matrix and the later mask ROM (MROM), which cannot be changed after manufacture. Although discrete circuits can be altered in principle, integrated circuits (ICs) cannot, and are useless if the data is bad or requires an update. That such memory can never be changed is a disadvantage in many applications, as bugs and security issues cannot be fixed, and new features cannot be added.


More recently, ROM has come to include memory that is read-only in normal operation, but can still be reprogrammed in some way. Erasable programmable read-only memory (EPROM) and electrically erasable programmable read-only memory (EEPROM) can be erased and re-programmed, but usually this can only be done at relatively slow speeds, may require special equipment to achieve, and is typically only possible a certain number of times

Share:

Friday, August 3, 2018

In Windows Active Directory, what is the default time interval that the Knowledge Consistency Checker (KCC) uses for incremental syncs to review and update the Active Directory replication topology?

In Windows Active Directory, what is the default time interval that the Knowledge Consistency Checker (KCC) uses for incremental syncs to review and update the Active Directory replication topology?

  • 48 hours
  • 15 minutes
  • 60 minutes
  • 5 minutes 

 

EXPLANATION




By default, the knowledge consistency checker (KCC) reviews and makes modifications to the Active Directory replication topology every 15 minutes. The KCC ensures propagation of data, either directly or transitively, by creating and deleting connection objects as needed. The KCC recognizes changes that occur in the environment and ensures that domain controllers are not orphaned in the replication topology.

For more information on the KCC, see: https://technet.microsoft.com/en-us/library/cc961781.aspx
Share:

Thursday, August 2, 2018

Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

  • Social Engineering
  • Cross Site Scripting
  • ARP Poisoning
  • SQL Injection 

 
Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

EXPLANATION

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught-on among computer and information security professionals.

SOURCE

https://en.wikipedia.org/wiki/Social_engineering_(security)
Share:

What can be used to protect you from receiving email messages with a forged sender address?

What can be used to protect you from receiving email messages with a forged sender address?

  • Digital ID
  • IMAP
  • Secure SMTP
  • SPF

What can be used to protect you from receiving email messages with a forged sender address?

EXPLANATION

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators.[1] The list of authorized sending hosts for a domain is published in the Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. Email spam and phishing often use forged "from" addresses, so publishing and checking SPF records can be considered anti-spam techniques.
IETF publication RFC 7208 dated April 2014 defines Sender Policy Framework as "proposed standard".

SOURCE

https://en.wikipedia.org/wiki/Sender_Policy_Framework 
Share:

Tuesday, July 31, 2018

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

In Unix, which of the following commands could you use to find files with a .log extension in the /var directory?

  • find /var -name "*.log"
  • mv "*.log"
  • ls -l *.log
  • find / | grep "*.log" 

 

EXPLANATION

The "find" command specifies the directory, "/var". The "-name" option tells the "find" command to show only files that have a ".log" extension.

SOURCE

https://quiz.techlanda.com/2017/11/in-unix-which-of-following-commands.html
Share:

Where is the iSCSI protocol typically used?

Where is the iSCSI protocol typically used?

  • File sharing
  •  SANs (Storage Area Networks)
  • Inter-site routing
  • Internal drive arrays 

 
Where is the iSCSI protocol typically used?

EXPLANATION

iSCSI (Internet Small Computer System Interface) works on top of TCP and allows SCSI
commands to be sent over a network to iSCSI storage devices. This allows for a low cost SAN infrastructure using standard network hardware.

Share:

Friday, July 27, 2018

What is the advantage of coaxial cable over STP or UTP?

What is the advantage of coaxial cable over STP or UTP?

  • It can run for a longer distance unboosted
  • It is easier to splice.
  • It is less expensive
  • It is easier to install because it is so flexible 

 
What is the advantage of coaxial cable over STP or UTP?

EXPLANATION

Coaxial cable conducts the electrical signal using an inner conductor (usually copper) surrounded by an insulating layer. The whole works are enclosed by a one to four layer shield. This makes coaxial cable thicker than STP or UTP, so harder to install and splice. It also makes it more expensive. But, it has the advantage of being able to carry large quantities of data over a longer distance unboosted.
Share:

Popular Posts