IT Questions and Answers :)

Thursday, October 11, 2018

What is the maximum number of devices that you can connect to a single USB 2.x controller?

What is the maximum number of devices that you can connect to a single USB 2.x controller?

  • 255
  • 31
  • 63
  • 127

What is the maximum number of devices that you can connect to a single USB 2.x controller?

EXPLANATION

Technically, a USB network is capable of supporting 128 nodes, though the USB controller itself is also a node.
In addition, any USB hubs, self-powered or bus-powered, count as additional nodes and reduce the number of nodes you can connect to the controller.
https://en.wikipedia.org/wiki/USB_hub#Physical_layout
 
Share:

Which of the following is NOT a daemon in Postfix?

Which of the following is NOT a daemon in Postfix?

  • qmgr
  • master
  •  crond
  • smtpd 

 
Which of the following is NOT a daemon in Postfix?

EXPLANATION

The crond daemon is a Linux daemon, not a Postfix daemon.
The master daemon is the brain of the Postfix mail system. It spawns all other daemons. The smtpd daemon (server) handles incoming connections. The qmgr daemon is the heart of the Postfix mail system. It processes and controls all messages in the mail queues.


Share:

Friday, September 28, 2018

At a Windows command prompt that is set to the root of the drive, which of the following commands will search the entire drive for all occurrences of the "Testing.docx" file?

At a Windows command prompt that is set to the root of the drive, which of the following commands will search the entire drive for all occurrences of the "Testing.docx" file?

  • DIR /ALL Testing.docx
  • DIR Testing.docx
  • DIR /S Testing.docx
  • DIR /R Testing.docx 

 
At a Windows command prompt that is set to the root of the drive, which of the following commands will search the entire drive for all occurrences of the "Testing.docx" file?

EXPLANATION

The directory command allows many flags, including the recursive search flag "/S".
This flag searches the current folder and all sub folders.
Share:

Thursday, September 27, 2018

What IEEE standard was Wired Equivalent Privacy first introduced?

What IEEE standard was Wired Equivalent Privacy first introduced?

  • 802.1x
  • 801.1a
  • 802
  • 802.11 


EXPLANATION

IEEE introduced WEP in the 802.11 standard but updated it in the 802.1x.

SOURCE

https://www.giac.org/paper/gsec/4214/wireless-security-ieee-80211-standards/106760
Share:

Wednesday, September 26, 2018

An initialization vector should be which of the following?

An initialization vector should be which of the following?

  • Repeatable and random
  • Unique and predictable
  • Unique and unpredicatable
  • Repeatable and unique 

 
An initialization vector should be which of the following?

EXPLANATION

An initialization vector (IV) should be unique and unpredictable. To prevent an attack,
an IV must not be repeated with a given key and should appear random.

SOURCE

https://en.wikipedia.org/wiki/Initialization_vector
Share:

Popular Posts