IT Questions and Answers :)

Friday, May 17, 2019

When it comes to virtualization, what does VDI stand for?

When it comes to virtualization, what does VDI stand for?

  • Video display interface
  • Virtual device infrastructure
  • Virtual desktop interface
  • Virtual desktop infrastructure 

When it comes to virtualization, what does VDI stand for?

EXPLANATION

Desktop virtualization
Desktop virtualization is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.
What is VDI? Virtual Desktop Infrastructure , or VDI, refers to the process of running a user desktop inside a virtual machine that lives on a server in the datacenter. It's a powerful form of desktop virtualization because it enables fully personalized desktops for each user with all the security and simplicity of centralized management.

 

Share:

The majority of the Linux Kernel is written in which language?

The majority of the Linux Kernel is written in which language?

  • Perl
  • C++
  • C
  • Pascal 
The majority of the Linux Kernel is written in which language?

EXPLANATION

Programming language. The Linux kernel is written in the version of the C programming language supported by GCC (which has introduced a number of extensions and changes to standard C), together with a number of short sections of code written in the assembly language (in GCC's "AT&T-style" syntax) of the target architecture.

The Linux kernel is an open-source monolithic Unix-like computer operating system kernel. The Linux family of operating systems is based on this kernel and deployed on both traditional computer systems such as personal computers and servers, usually in the form of Linux distributions, and on various embedded devices such as routers, wireless access points, PBXes, set-top boxes, FTA receivers, smart TVs, PVRs, and NAS appliances.

 

Share:

What feature of IPSec ensures data integrity during transmission?

What feature of IPSec ensures data integrity during transmission?

  • Anti-replay
  • Non-repudiation
  • Encryption
  • Authentication 
 What feature of IPSec ensures data integrity during transmission?

EXPLANATION

Internet Protocol Security (IPSec)

Cisco IOS uses the industry-standard IPSec protocol suite to enable advanced VPN features. The PIX IPSec implementation is based on the Cisco IOS IPSec that runs in Cisco routers.
IPSec acts at the network layer, protecting and authenticating IP packets between a PIX Firewall and other participating IPSec devices (peers), such as other PIX Firewalls, Cisco routers, the Cisco Secure VPN Client, the VPN 3000 Concentrator series, and other IPSec-compliant products.
IPSec enables the following Cisco IOS VPN features:
  • Data confidentiality—The IPSec sender can encrypt packets before transmitting them across a network.
  • Data integrity—The IPSec receiver can authenticate packets sent by the IPSec sender to ensure that the data has not been altered during transmission.
  • Data origin authentication—The IPSec receiver can authenticate the source of the IPSec packets sent. This service is dependent upon the data integrity service.
  • Antireplay—The IPSec receiver can detect and reject replayed packets.

Share:

What does DNS stand for?

What does DNS stand for?

  • Domain Name Service
  • Destination Notation System
  • Domain Name System
  • Dynamic Naming Server 
What does DNS stand for?

EXPLANATION

Domain Name System
The Domain Name System is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating

 

Share:

Which authentication method uses a secret shared key to ensure authentication?

Which authentication method uses a secret shared key to ensure authentication?

  • Certificates
  • Kerberos v5
  • Windows Authentication
  • Pre-shared keys 
Which authentication method uses a secret shared key to ensure authentication?

EXPLANATION

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.. Key. To build a key from shared secret, the key derivation function is typically used

Pre-Shared Keys in IPsec. The following section is related to site-to-site VPNs only and NOT to remote access VPNs. The pre-shared key is merely used for authentication, not for encryption! IPsec tunnels rely on the ISAKMP/IKE protocols to exchange the keys for encryption, etc.

 

Share:

Which protocol provides encapsulation for IPSec in transport mode?

Which protocol provides encapsulation for IPSec in transport mode?

  • L2TP
  • PAP
  • PPTP
  • PPP 
Which protocol provides encapsulation for IPSec in transport mode?

EXPLANATION


PAP - Passes cleartext username and password during authentication and is NOT Secure.

In computer networking, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy.

Share:

Two-factor authentication can include something you have and one of the following:

Two-factor authentication can include something you have and one of the following:

  • Something you make up
  • Something unique
  • Something encrypted
  • Something you know 
Two-factor authentication can include something you have and one of the following:

EXPLANATION

Multi-factor authentication is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence to an authentication mechanism: knowledge, possession, and inherence.

Authentication is the first step in access control, and there are three common factors used for authentication: something you know, something you have, and something you are. This article provides you with good understanding of the three factors of authentication and how they can be used together with multifactor authentication.
Share:

Popular Posts