IT Questions and Answers :)

Tuesday, September 18, 2018

Which of the following events would you NOT expect to see in the Windows security log?

Which of the following events would you NOT expect to see in the Windows security log?

  • Successful login attempts
  • User account deleted
  • Hardware driver failures
  • Shutdown events 

 
Which of the following events would you NOT expect to see in the Windows security log?

EXPLANATION

All of the above events will be logged in the Windows event log, however there are several different types of log that each contain relevant information.
Application log - contains logging information of events generated by applications.
Security log - contains information related to logon attempts, password changes, group membership, etc.
System log - contains information related to Windows system components, such as driver failures. These logs are predetermined by Windows.
Setup log - contains events related to application setup
ForwardedEvents log - used to store events collected from remote computers

The above alerts appear in the Windows security log as:
Event ID 4624 -  An account was successfully logged on
Event ID 4609 - Windows is shutting down
Event ID 4726 - User account was deleted
Hardware driver failures will appear in the system log




SOURCE

https://technet.microsoft.com/en-us/library/cc722404(v=ws.11).aspx
Share:

Monday, September 17, 2018

Which layer of the OSI model does a packet exist on?

Which layer of the OSI model does a packet exist on?

  • 3
  • 1
  • 2
Which layer of the OSI model does a packet exist on?

 

EXPLANATION

Packets exist on the third, or Network, layer of the OSI model. The following are the counterparts for packets on the other layers: Layer 1 (Physical): bits; Layer 2 (Data Link): frames; Layer 4 (Transport): segments.

SOURCE

https://en.wikipedia.org/wiki/OSI_model#Description_of_OSI_layers
Share:

Friday, September 14, 2018

To send someone a secure e-mail message using PGP, you should use which of the following?

To send someone a secure e-mail message using PGP, you should use which of the following?

  • The recipient's private key
  • Your public key
  • Your private key
  • The recipient's public key 

To send someone a secure e-mail message using PGP, you should use which of the following?

EXPLANATION

Pretty good privacy (PGP) can be used to send messages confidentially. For this, PGP combines symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric
encryption algorithm, which requires a symmetric key. Each symmetric key is used only once and is also called a session key. The message and its session key are sent to the receiver. The session key must be sent to the receiver so they know how to decrypt the message, but to protect it during transmission, it is encrypted with the receiver's public key. Only the private key belonging to the receiver can decrypt the session key.
https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Share:

Wednesday, September 12, 2018

In SQL, which of the following is the generally preferred way to handle the case where a transaction in progress terminates abnormally?

In SQL, which of the following is the generally preferred way to handle the case where a transaction in progress terminates abnormally?

  • Rollforward
  • Rollback
  • Switch to duplicate database
  • Reprocess transactions 

 
In SQL, which of the following is the generally preferred way to handle the case where a transaction in progress terminates abnormally?

EXPLANATION

A transaction is a logical unit of work that contains one or more SQL statements. A transaction is an atomic unit. The effects of all the SQL statements in a transaction can be either all committed (which means that they applied to the database) or all 
rolled back (undone from the database). So, if a transaction terminates abnormally, perform a rollback.

Share:

Tuesday, September 11, 2018

What VMware vSphere feature allows guest VMs to restart on another host in the event that their host fails?

What VMware vSphere feature allows guest VMs to restart on another host in the event that their host fails?

  • DRS
  • High availability
  • Storage DRS
  • Fault tolerance 

 
What VMware vSphere feature allows guest VMs to restart on another host in the event that their host fails?

EXPLANATION

VMware's High Availability (known to us lazy people as HA) allows guest VMs to restart on another host in the event of host failure. For example, if you have two hosts, both with VMs, and the first host has a hardware failure and becomes unresponsive, the VMs that were running on the failed host restart on the other host (provided it has the capacity to run them).
Read more here: https://www.vmware.com/products/vsphere/features/high-availability

Share:

Thursday, September 6, 2018

Which of the following is NOT a Linux distro?

Which of the following is NOT a Linux distro?

  • BSD
  • Ubuntu
  • Mint
  • Red Hat 

Which of the following is NOT a Linux distro?

EXPLANATION

Berkeley Software Distribution (BSD) is a Unix operating system derivative developed and distributed by the Computer Systems Research Group 
(CSRG) of the University of California, Berkeley, from 1977 to 1995. Today the term "BSD" is often used non-specifically to refer to any of the BSD descendants which together form a branch of the family ofUnix-like operating systems. Operating systems derived from the original BSD code remain actively developed and widely used.
Share:

Wednesday, September 5, 2018

By default, what is the lowest permission needed to join computers to an Active Directory domain?

By default, what is the lowest permission needed to join computers to an Active Directory domain?

  • Schema Admin
  • Domain Admins
  • Authenticated Users
  • Enterprise Admins 

 

EXPLANATION

By default any Authenticated User can add up to 10 computers to a domain.  The risk with this could be that a user sets up a new workstation and give themselves an admin account on the computer, then add it to the domain using their domain account. 
With these elevated permissions they could do many things.  Most notably, but not limited to, the higher chance of getting a virus on the system to an inexperienced user.

SOURCE

https://technet.microsoft.com/en-us/library/cc976452.aspx
Share:

Popular Posts