IT Questions and Answers :)

Friday, August 24, 2018

Which provides a method for validating source of a message through cryptographic authentication ?

Which provides a method for validating source of a message through cryptographic authentication ?

  • DNS
  • SPF
  • DNSSEC
  • DKIM

Which provides a method for validating source of a message through cryptographic authentication ?

EXPLANATION

DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication.

SOURCE

http://www.dkim.org/
 
Share:

Thursday, August 23, 2018

Which of these commands could you use to view the status of the system's ports?

Which of these commands could you use to view the status of the system's ports?

  • netstat -o
  • netstat -a
  • netstat -y
  • netstat -p 

 
Which of these commands could you use to view the status of the system's ports?

EXPLANATION

You can use the netstat -a command to list the ports used by the system and whether they are open and listening.
Share:

You need to encrypt and compress your backups before replicating them off site. Which is best practice, compress then encrypt, or encrypt then compress?

You need to encrypt and compress your backups before replicating them off site. Which is best practice, compress then encrypt, or encrypt then compress?

  • Neither!
  • Doesn't matter!
  • Encrypt first!
  • Compress first! 

You need to encrypt and compress your backups before replicating them off site. Which is best practice, compress then encrypt, or encrypt then compress?

EXPLANATION

If you encrypt the data first, it will be randomized and unintelligible by your compression application which need to compress the data in a logical format.
Compressing then encrypting is the way to go.

SOURCE

https://stackoverflow.com/questions/4676095/when-compressing-and-encrypting-should-i-compress-first-or-encrypt-first
Share:

Tuesday, August 21, 2018

In Active Directory, what would a RSOP report tell you?

In Active Directory, what would a RSOP report tell you?

  • Remote System Operation Protocol
  • Random State Oscillation Period
  • Removal Strategy for Outside People
  • Resultant Set Of Policy 

In Active Directory, what would a RSOP report tell you?

EXPLANATION




 A Resultant Set of Policy (RSOP) is a report of all Group Policy settings within Active Directory that shows how those settings can affect a network, or how existing Group Policy Objects (GPOs) affect various combinations of users and computers when the local security policy is applied.
Share:

Which of the following is implemented exclusively as firmware?

Which of the following is implemented exclusively as firmware?

  • BIOS
  • Linux
  • Database
  • Wi-Fi 

 
Which of the following is implemented exclusively as firmware?

EXPLANATION

Firmware is software that is permanently programmed into a device's read-only memory. Basic Input/Output System (BIOS) is an example of firmware.
Share:

Popular Posts