IT Questions and Answers :)

Tuesday, September 25, 2018

Which type of RAID configuration requires minimum six drives?

Which type of RAID configuration requires minimum six drives?

  • RAID 50 (RAID 5 + 0)
  • RAID 100 (RAID 10+0)
  • RAID 6
  • RAID 60 (RAID 6 + 0) 

 
Which type of RAID configuration requires minimum six drives?

EXPLANATION

RAID 50, also called RAID 5+0, combines the straight block-level striping of RAID 0 with the distributed parity of RAID 5.[3] As a RAID 0 array striped across RAID 5 elements, minimal RAID 50 configuration requires six drives.

SOURCE

https://en.wikipedia.org/wiki/Nested_RAID_levels
Share:

In sql, which of the following is applicable to the CHAR datatype?

In sql, which of the following is applicable to the CHAR datatype?

  • CHAR stores alphanumeric characters of fixed size
  • Stores alphanumeric characters of variable length
  • to create scripts containing infinite characters
  • Type as many characters as you want 

 
In sql, which of the following is applicable to the CHAR datatype?

EXPLANATION

The only difference between CHAR and VARCHAR2 is that CHAR stores fixed-length alphanumeric characters, between 1 and 2000 bytes or characters. If you are stored in the JUNIOR surname in a CHAR (50) column, a column will contain a JUNIOR string + 44 whitespaces that are automatically added to the total column volume.

SOURCE

http://www.fabioprado.net/2011/08/qual-tipo-de-dado-devo-usar-char.html

Share:

Which of the following is NOT a computer programming language?

Which of the following is NOT a computer programming language?

  • Lisp
  • Occam
  • SNOBOL
  • Modal

EXPLANATION

MODAL isn't a programming language but is used in computer applications, especially within websites. It is a graphical window control element, subordinate to an application's main window.
SNOBOL (StriNg Oriented and symBOlic Language), is a text-string-oriented language developed by AT&T Bell Labs in the 1960s.
LISP, developed in the 1950s, is one of the oldest high-level programming languages and is only pre-dated by the likes of FORTRAN.
OCCAM was one of the earliest Concurrent programming languages, developed by INMOS as the native programming language for their Transputer Microprocessors.

SOURCE

https://en.wikipedia.org/wiki/List_of_programming_languages
 
Share:

Friday, September 21, 2018

Access management is most affected by which of these aspects of cloud computing?

Access management is most affected by which of these aspects of cloud computing?

  • Internet Service Provider
  • Virtualization
  • Federated Identity
  • Cloud backup 

 
Access management is most affected by which of these aspects of cloud computing?

EXPLANATION

Federated Identity allows you to use a central identity store both inside and outside of your organization. Cloud backup and Internet Service Provider have to do with IT service continuity management, not access management. Virtualization affects all IT processes, but not as much as identity federation.
Share:

Tuesday, September 18, 2018

Which of the following events would you NOT expect to see in the Windows security log?

Which of the following events would you NOT expect to see in the Windows security log?

  • Successful login attempts
  • User account deleted
  • Hardware driver failures
  • Shutdown events 

 
Which of the following events would you NOT expect to see in the Windows security log?

EXPLANATION

All of the above events will be logged in the Windows event log, however there are several different types of log that each contain relevant information.
Application log - contains logging information of events generated by applications.
Security log - contains information related to logon attempts, password changes, group membership, etc.
System log - contains information related to Windows system components, such as driver failures. These logs are predetermined by Windows.
Setup log - contains events related to application setup
ForwardedEvents log - used to store events collected from remote computers

The above alerts appear in the Windows security log as:
Event ID 4624 -  An account was successfully logged on
Event ID 4609 - Windows is shutting down
Event ID 4726 - User account was deleted
Hardware driver failures will appear in the system log




SOURCE

https://technet.microsoft.com/en-us/library/cc722404(v=ws.11).aspx
Share:

Monday, September 17, 2018

Which layer of the OSI model does a packet exist on?

Which layer of the OSI model does a packet exist on?

  • 3
  • 1
  • 2
Which layer of the OSI model does a packet exist on?

 

EXPLANATION

Packets exist on the third, or Network, layer of the OSI model. The following are the counterparts for packets on the other layers: Layer 1 (Physical): bits; Layer 2 (Data Link): frames; Layer 4 (Transport): segments.

SOURCE

https://en.wikipedia.org/wiki/OSI_model#Description_of_OSI_layers
Share:

Friday, September 14, 2018

To send someone a secure e-mail message using PGP, you should use which of the following?

To send someone a secure e-mail message using PGP, you should use which of the following?

  • The recipient's private key
  • Your public key
  • Your private key
  • The recipient's public key 

To send someone a secure e-mail message using PGP, you should use which of the following?

EXPLANATION

Pretty good privacy (PGP) can be used to send messages confidentially. For this, PGP combines symmetric-key encryption and public-key encryption. The message is encrypted using a symmetric
encryption algorithm, which requires a symmetric key. Each symmetric key is used only once and is also called a session key. The message and its session key are sent to the receiver. The session key must be sent to the receiver so they know how to decrypt the message, but to protect it during transmission, it is encrypted with the receiver's public key. Only the private key belonging to the receiver can decrypt the session key.
https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Share:

Popular Posts