IT Questions and Answers :)

Wednesday, March 6, 2019

Which of the following is an IPSLA option?

Which of the following is an IPSLA option?

  • Object-tracking
  • Reachability
  • Icmp-probing
  • IGMP-Snooping 

 
Which of the following is an IPSLA option?

EXPLANATION

The correct option is reachability.  This option permits the cisco device to track connectivity to an object, and change routes
accordingly based upon failure of the primary path.

SOURCE

http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/813-cisco-router-ipsla-basic.html
Share:

In T-SQL, which of the following is NOT a requirement to define a table expression?

In T-SQL, which of the following is NOT a requirement to define a table expression?

  • All columns must have a name
  • Column names must be unique
  • Must be preceded by WITH
  • Cannot use ORDER BY to guarantee presentation order 

 
In T-SQL, which of the following is NOT a requirement to define a table expression?

 

EXPLANATION

Table expressions in SQL Server are named query expressions that represent a valid relational table. SQL Server supports four types of table expressions: Common Table Expressions (CTEs), Derived Tables, Views and In-line Table-Valued Functions. Only a CTE definition needs to be preceded by WITH.

T-SQL allows the ORDER BY clause in conjunction with TOP, OFFSET or FOR XML for processing purposes, but this does not guarantee presentation order in an outer query that references the table expression.


SOURCE

https://www.microsoftpressstore.com/articles/article.aspx?p=2233323
Share:

What's the basic unit of virtualization that contains an OS, its apps, and resources?

What's the basic unit of virtualization that contains an OS, its apps, and resources?

  • Virtual app
  • Virtual machine
  • Virtual reality
  • Virtual OS 

 
What's the basic unit of virtualization that contains an OS, its apps, and resources?

EXPLANATION

A virtual machine (VM) is a type of container you can assign resources to, like processing cores, memory, and storage. You can install an operating system in a VM and the OS will behave as if it's actually running on a physical computer.

Virtual machines

Another form of virtual machine is one that allows us to run multiple operating systems concurrently, sharing access to the physical machine resources. With this for of virtual machine, we can partition one computer to act like several computers, each with its own operating system (and IP address on the network). We can also migrate an entire OS (along with all of its applications) from one machine to another.
To understand how this form of virtualization works, we need to consider what an operating system does. Basically, it provides a set of interfaces (system calls) that applications use to access system resources (file system, network, semaphores, etc.). The operating system is just a program. It spends its time doing table look-ups, copying blocks of data, formatting network packet headers, and other mundane tasks. Every once in a while, however, it needs to access system hardware: to configure the memory management unit, set a timer, set the task register, and perform certain types of input and output. These instructions are called privileged instructions, in contrast to all the other instructions on the processor, which are unprivileged. To execute them, the operating system kernel runs in privileged, or supervisor mode, while regular processes do not. If a regular application attemts to execute a privileged instruction, it will generate a trap on many architectures.

Share:

Friday, March 1, 2019

Which statement is not true about SQL Injection?

Which statement is not true about SQL Injection?

  • Boosts database performace.
  • The placement of malicious code in SQL statements
  • A code injection technique that might destroy your database.
  • One of the most common web hacking techniques. 

 
Which statement is not true about SQL Injection?

EXPLANATION

SQL Injection does not boost database performance.

SQL injection is the placement of malicious code in SQL
statements, via web page input. SQL in Web Pages SQL injection usually occurs when you ask a user for input, like their username/userid, and instead of a name/id, the user gives you an SQL statement that you will unknowingly run on your database.

SOURCE

https://www.w3schools.com/sql/sql_injection.asp
Share:

What port is recommended for secure SMTP communications between client and mailserver.

What port is recommended for secure SMTP communications between client and mailserver.

  • 587
  • 965
  • 465
  • 25 

 
What port is recommended for secure SMTP communications between client and mailserver.

EXPLANATION

Port 465 was never recognized by the IETF (Internet Engineering Task Force), as an official port for SMTP and has been assigned to another service.
Port 25 can be used but alot of ISP's block this due to the prevalence of unsecured mail servers on this port and the spam sending capabilities this exposes. Port 965 is your POP3 (receive) port, so while it is the correct POP3 port it shouldn't be used for SMTP (send).

SOURCE

https://www.jscape.com/blog/smtp-ports
Share:

Popular Posts