IT Questions and Answers :)

Thursday, August 9, 2018

While working on an issue on a clients network you learn that you will be using the 1000BaseCX standard. What type of cable will you be using.

While working on an issue on a clients network you learn that you will be using the 1000BaseCX standard. What type of cable will you be using.

  • CoreXtended Fiber
  • Single-mode fiber
  • Multimode fiber
  • STP

While working on an issue on a clients network you learn that you will be using the 1000BaseCX standard. What type of cable will you be using.

EXPLANATION

The 1000BaseCX standard specifies Gigabit Ethernet over STP cabling.
  1. Multi-mode Fiber is incorrect because 1000BaseSX and 1000BaseLX specify Gigabit Ethernet over two types of Multi-mode fiber.
  2. Single-mode fiber is used with 100BaseFX standard.
  3. As far as CoreXtended Fiber, there anin't no such animal.

SOURCE

http://www.thenetworkencyclopedia.com/entry/1000basecx/
Share:

Which of the following retains the information it's storing when the system power is turned off?

Which of the following retains the information it's storing when the system power is turned off?

  • ROM
  • RAM
  • GPU
  • CPU 

 
Which of the following retains the information it's storing when the system power is turned off?

EXPLANATION

Read only memory (ROM) is nonvolatile, meaning that turning off the computer doesn't erase it. 

Read-only memory (ROM) is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware (software that is closely tied to specific hardware, and unlikely to need frequent updates) or application software in plug-in cartridges.
Strictly, read-only memory refers to memory that is hard-wired, such as diode matrix and the later mask ROM (MROM), which cannot be changed after manufacture. Although discrete circuits can be altered in principle, integrated circuits (ICs) cannot, and are useless if the data is bad or requires an update. That such memory can never be changed is a disadvantage in many applications, as bugs and security issues cannot be fixed, and new features cannot be added.


More recently, ROM has come to include memory that is read-only in normal operation, but can still be reprogrammed in some way. Erasable programmable read-only memory (EPROM) and electrically erasable programmable read-only memory (EEPROM) can be erased and re-programmed, but usually this can only be done at relatively slow speeds, may require special equipment to achieve, and is typically only possible a certain number of times

Share:

Friday, August 3, 2018

In Windows Active Directory, what is the default time interval that the Knowledge Consistency Checker (KCC) uses for incremental syncs to review and update the Active Directory replication topology?

In Windows Active Directory, what is the default time interval that the Knowledge Consistency Checker (KCC) uses for incremental syncs to review and update the Active Directory replication topology?

  • 48 hours
  • 15 minutes
  • 60 minutes
  • 5 minutes 

 

EXPLANATION




By default, the knowledge consistency checker (KCC) reviews and makes modifications to the Active Directory replication topology every 15 minutes. The KCC ensures propagation of data, either directly or transitively, by creating and deleting connection objects as needed. The KCC recognizes changes that occur in the environment and ensures that domain controllers are not orphaned in the replication topology.

For more information on the KCC, see: https://technet.microsoft.com/en-us/library/cc961781.aspx
Share:

Thursday, August 2, 2018

Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

  • Social Engineering
  • Cross Site Scripting
  • ARP Poisoning
  • SQL Injection 

 
Which of the following types of attacks do hackers use to gain information from you without the use of a computer program?

EXPLANATION

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.
The term "social engineering" as an act of psychological manipulation of a human, is also associated with the social sciences, but its usage has caught-on among computer and information security professionals.

SOURCE

https://en.wikipedia.org/wiki/Social_engineering_(security)
Share:

What can be used to protect you from receiving email messages with a forged sender address?

What can be used to protect you from receiving email messages with a forged sender address?

  • Digital ID
  • IMAP
  • Secure SMTP
  • SPF

What can be used to protect you from receiving email messages with a forged sender address?

EXPLANATION

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators.[1] The list of authorized sending hosts for a domain is published in the Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. Email spam and phishing often use forged "from" addresses, so publishing and checking SPF records can be considered anti-spam techniques.
IETF publication RFC 7208 dated April 2014 defines Sender Policy Framework as "proposed standard".

SOURCE

https://en.wikipedia.org/wiki/Sender_Policy_Framework 
Share:

Popular Posts