IT Questions and Answers :)

Thursday, August 30, 2018

Which of these is NOT a card bus type?

Which of these is NOT a card bus type?

  • SOX
  • ISA
  • AGP
  • PCI 

 
Which of these is NOT a card bus type?

EXPLANATION

CardBus is the trade name for an advanced PC Card specification. The technology is used primarily in notebook and portable computers and fits in a slot like a conventional PC card. ISA, AGP, and PCI are all card bus types.
SOX is a common abbreviation for the Sarbanes-Oxley Act, a US Federal law governing publicly traded companies.

 


Share:

Tuesday, August 28, 2018

Which function key is used to check for spelling in MS Office?

Which function key is used to check for spelling in MS Office?

  • Alt + F11
  • F5
  • Alt + F4
  • F7

Which function key is used to check for spelling in MS Office?

EXPLANATION




Function key assignments common to all Microsoft Office applications are: F7 to check spelling.



 In Microsoft PowerPoint, F5 starts the slide show.



 Alt+F11 calls the Visual Basic Editor



 Alt+F4 is used to quit the application.
 
Share:

Monday, August 27, 2018

Which of these is not a high level Linux package manager?

Which of these is not a high level Linux package manager?

  • aptitude
  • yum
  • zypper
  • linupdate

Which of these is not a high level Linux package manager?

EXPLANATION

linupdate is the false one here. The others are all legitimate Linux package managers. Even though these are package managers, they use lower level tools to actually install the packages, such as rpm or dpkg.
Overview: http://www.tecmint.com/linux-package-management/
RPM & DPKG reference: http://packman.linux.is/
 
Share:

Friday, August 24, 2018

Which provides a method for validating source of a message through cryptographic authentication ?

Which provides a method for validating source of a message through cryptographic authentication ?

  • DNS
  • SPF
  • DNSSEC
  • DKIM

Which provides a method for validating source of a message through cryptographic authentication ?

EXPLANATION

DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication.

SOURCE

http://www.dkim.org/
 
Share:

Thursday, August 23, 2018

Which of these commands could you use to view the status of the system's ports?

Which of these commands could you use to view the status of the system's ports?

  • netstat -o
  • netstat -a
  • netstat -y
  • netstat -p 

 
Which of these commands could you use to view the status of the system's ports?

EXPLANATION

You can use the netstat -a command to list the ports used by the system and whether they are open and listening.
Share:

You need to encrypt and compress your backups before replicating them off site. Which is best practice, compress then encrypt, or encrypt then compress?

You need to encrypt and compress your backups before replicating them off site. Which is best practice, compress then encrypt, or encrypt then compress?

  • Neither!
  • Doesn't matter!
  • Encrypt first!
  • Compress first! 

You need to encrypt and compress your backups before replicating them off site. Which is best practice, compress then encrypt, or encrypt then compress?

EXPLANATION

If you encrypt the data first, it will be randomized and unintelligible by your compression application which need to compress the data in a logical format.
Compressing then encrypting is the way to go.

SOURCE

https://stackoverflow.com/questions/4676095/when-compressing-and-encrypting-should-i-compress-first-or-encrypt-first
Share:

Tuesday, August 21, 2018

In Active Directory, what would a RSOP report tell you?

In Active Directory, what would a RSOP report tell you?

  • Remote System Operation Protocol
  • Random State Oscillation Period
  • Removal Strategy for Outside People
  • Resultant Set Of Policy 

In Active Directory, what would a RSOP report tell you?

EXPLANATION




 A Resultant Set of Policy (RSOP) is a report of all Group Policy settings within Active Directory that shows how those settings can affect a network, or how existing Group Policy Objects (GPOs) affect various combinations of users and computers when the local security policy is applied.
Share:

Popular Posts