IT Questions and Answers :)

Tuesday, March 12, 2019

When it comes to SNMP technology, what is the range of the "Counter32" parameter?

When it comes to SNMP technology, what is the range of the "Counter32" parameter?

  • 0 to 4294967295
  • 0 to 1099511627776
  • 32 to 272
  • -100 to 100 

 
When it comes to SNMP technology, what is the range of the "Counter32" parameter?

EXPLANATION

The Counter32 class allows all the functionality of unsigned integers but is recognized as a distinct SMI type, which specifies a value that represents a count.
The range is 0 to 4294967295

https://www.webnms.com/snmp/help/snmpapi/snmpv3/using_mibs_in_applns/countr32.html

Share:

Monday, March 11, 2019

What is the fastest back-end database for OpenLDAP ?

What is the fastest back-end database for OpenLDAP ?

  • hdb
  • sql
  • mdb
  • bdb 

 

EXPLANATION

  • A file with the MDB file extension is a Microsoft Access Database file that literally stands for Microsoft Database. ...
  • MDB files contain database queries, tables, and more that can be used to link to and store data from other files, like XML and HTML, and applications, like Excel and SharePoint.

 

http://www.openldap.org/pub/hyc/mdm-paper.pdf

SOURCE

http://www.openldap.org/pub/hyc/mdm-paper.pdf
Share:

Which of these is NOT a use case of Microsoft Azure Stack?

Which of these is NOT a use case of Microsoft Azure Stack?

  • Update and extend legacy applications with modern Azure services on-premise
  • Address latency and connectivity requirements for edge and disconnected solutions
  • Develop applications and deploy in Azure or on-premises to meet regulatory and policy requirements
  • The next-gen Hyper-V platform for you to migrate your current workloads on your existing hardware 

Which of these is NOT a use case of Microsoft Azure Stack?

EXPLANATION

If you answered "next-gen Hyper-V platform for you to migrate..." then yes you're correct - that is NOT the intended use case of Microsoft Azure Stack.  Microsoft Windows Server Software Defined (WSSD)
is a better solution to implement virtualization in scale within your datacenter.   Azure Stack's three primary use cases can be found at the link provided to learn more.

SOURCE

https://azure.microsoft.com/en-us/overview/azure-stack/
Share:

Friday, March 8, 2019

CPUs have a NX flag/bit to segregate areas of memory for process instruction or data. What does NX stand for?

CPUs have a NX flag/bit to segregate areas of memory for process instruction or data. What does NX stand for?

  • NineX
  • Non-Existent
  • No-Execute
  • Near-Exact 
CPUs have a NX flag/bit to segregate areas of memory for process instruction or data. What does NX stand for?

EXPLANATION


The NX bit (no-execute) is a technology used in CPUs to segregate areas of memory for use by either storage of processor instructions (code) or for storage of data, a feature normally only found in Harvard architecture processors. However, the NX bit is being increasingly used in conventional von Neumann architecture processors, for security reasons.
An operating system with support for the NX bit may mark certain areas of memory as non-executable. The processor will then refuse to execute any code residing in these areas of memory. The general technique, known as executable space protection, is used to prevent certain types of malicious software from taking over computers by inserting their code into another program's data storage area and running their own code from within this section; one class of such attacks is known as the buffer overflow attack.
Intel markets the feature as the XD bit (execute disable). Advanced Micro Devices (AMD) uses the marketing term Enhanced Virus Protection (EVP). The ARM architecture refers to the feature, which was introduced in ARMv6, as XN (execute never).[1] The term NX bit itself is sometimes used to describe similar technologies in other processors.

SOURCE

https://en.wikipedia.org/wiki/NX_bit
Share:

You are getting a DNS lookup error when trying to access any webpage that your local DNS server has no record for, what should you check?

You are getting a DNS lookup error when trying to access any webpage that your local DNS server has no record for, what should you check?

  • The Forwarders on your DNS server
  • The Reverse Lookup Zones on your DNS server
  • The CNAME records on your DNS server for your host
  • The Forward Lookup Zones on your DNS 

 
You are getting a DNS lookup error when trying to access any webpage that your local DNS server has no record for, what should you check?

EXPLANATION

In Domain Name System (DNS) terms, a DNS forwarder is a DNS server that is used to forward DNS queries for external DNS names to DNS servers outside that network. It does it to DNS queries that it cannot resolve locally, meaning DNS queries
that it has no personal knowledge of. By using DNS forwarders you can improve the efficiency of name resolution for the computers in your network that query for DNS names outside your network (such as names on the Internet).

SOURCE

https://www.petri.com/best-practices-for-dns-forwarding
Share:

Thursday, March 7, 2019

What type of attack has a program running on your server that bypasses authorization?

What type of attack has a program running on your server that bypasses authorization?

  • Backdoor
  • DDoS
  • Phishing
  • DoS 

 
What type of attack has a program running on your server that bypasses authorization?

EXPLANATION

When a program running on a server bypasses authorization, it is obvious that a back door attack is in progress.
Key Takeaway: In a back door attack, a program or service is placed on a server to bypass normal security procedures. A back door is a program that is designed to hide itself inside a target host. It allows the installing user access to the system at a later time without using normal authorization or vulnerability exploitation.

http://www.hbs.net/blog/december-2016/bypassing-security-controls-cyber-crime
https://www.incapsula.com/web-application-security/backdoor-shell-attack.html
Share:

Wednesday, March 6, 2019

Which of the following is an IPSLA option?

Which of the following is an IPSLA option?

  • Object-tracking
  • Reachability
  • Icmp-probing
  • IGMP-Snooping 

 
Which of the following is an IPSLA option?

EXPLANATION

The correct option is reachability.  This option permits the cisco device to track connectivity to an object, and change routes
accordingly based upon failure of the primary path.

SOURCE

http://www.firewall.cx/cisco-technical-knowledgebase/cisco-routers/813-cisco-router-ipsla-basic.html
Share:

Popular Posts