IT Questions and Answers :)

Friday, August 31, 2018

What of the following names is a USB device that registers itself as a network adapter but is a covert systems administration and penetration testing tool?

What of the following names is a USB device that registers itself as a network adapter but is a covert systems administration and penetration testing tool?

  • NET Ninja
  • BeamGun
  • Rubber Ducky
  • LAN Turtle 

What of the following names is a USB device that registers itself as a network adapter but is a covert systems administration and penetration testing tool?

EXPLANATION

The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle monitoring capabilities.
Housed within a generic "USB Ethernet Adapter" case, the LAN Turtle’s covert appearance allows it to blend into many IT environments.
See: https://lanturtle.com/ for more information
Share:

Thursday, August 30, 2018

You only want to use on-premises servers to authenticate. You would like to allow access to cloud email accounts through a user's local credentials. Which solution should you use?

You only want to use on-premises servers to authenticate. You would like to allow access to cloud email accounts through a user's local credentials. Which solution should you use?

  • Implement SaaS
  • Recreate user accounts in the cloud
  • Replicate local user accounts to the cloud
  • Identity federation 

You only want to use on-premises servers to authenticate. You would like to allow access to cloud email accounts through a user's local credentials. Which solution should you use?

EXPLANATION

Identity federation uses a single identity provider to authorize user access to multiple software applications, including cloud email.
Replicating user accounts means you are NOT using the on-premises user identities as you require. SaaS provides end-user software services over the network and has nothing to do with authorization. Recreating user accounts in the cloud won't work because we need to use local user accounts for authentication.
Share:

Which of these is NOT a card bus type?

Which of these is NOT a card bus type?

  • SOX
  • ISA
  • AGP
  • PCI 

 
Which of these is NOT a card bus type?

EXPLANATION

CardBus is the trade name for an advanced PC Card specification. The technology is used primarily in notebook and portable computers and fits in a slot like a conventional PC card. ISA, AGP, and PCI are all card bus types.
SOX is a common abbreviation for the Sarbanes-Oxley Act, a US Federal law governing publicly traded companies.

 


Share:

Tuesday, August 28, 2018

Which function key is used to check for spelling in MS Office?

Which function key is used to check for spelling in MS Office?

  • Alt + F11
  • F5
  • Alt + F4
  • F7

Which function key is used to check for spelling in MS Office?

EXPLANATION




Function key assignments common to all Microsoft Office applications are: F7 to check spelling.



 In Microsoft PowerPoint, F5 starts the slide show.



 Alt+F11 calls the Visual Basic Editor



 Alt+F4 is used to quit the application.
 
Share:

Monday, August 27, 2018

Which of these is not a high level Linux package manager?

Which of these is not a high level Linux package manager?

  • aptitude
  • yum
  • zypper
  • linupdate

Which of these is not a high level Linux package manager?

EXPLANATION

linupdate is the false one here. The others are all legitimate Linux package managers. Even though these are package managers, they use lower level tools to actually install the packages, such as rpm or dpkg.
Overview: http://www.tecmint.com/linux-package-management/
RPM & DPKG reference: http://packman.linux.is/
 
Share:

Friday, August 24, 2018

Which provides a method for validating source of a message through cryptographic authentication ?

Which provides a method for validating source of a message through cryptographic authentication ?

  • DNS
  • SPF
  • DNSSEC
  • DKIM

Which provides a method for validating source of a message through cryptographic authentication ?

EXPLANATION

DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication.

SOURCE

http://www.dkim.org/
 
Share:

Thursday, August 23, 2018

Which of these commands could you use to view the status of the system's ports?

Which of these commands could you use to view the status of the system's ports?

  • netstat -o
  • netstat -a
  • netstat -y
  • netstat -p 

 
Which of these commands could you use to view the status of the system's ports?

EXPLANATION

You can use the netstat -a command to list the ports used by the system and whether they are open and listening.
Share:

Popular Posts