IT Questions and Answers :)

Friday, June 7, 2019

If i wanted to find the Windows 10 Spotlight Lock Screen Pictures... Where would you find them?

If i wanted to find the Windows 10 Spotlight Lock Screen Pictures... Where would you find them?

  • C:\Windows\Web\Wallpaper
  • C:\ProgramData\Microsoft\Windows\SystemData
  • C:\Windows\Web\Screen
  • C:\Users\[USERNAME]\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager\LocalState\Asset 

If i wanted to find the Windows 10 Spotlight Lock Screen Pictures... Where would you find them?

EXPLANATION

C:\Users\[USERNAME]\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager\LocalState\Asset is the correct answer... given 100 characters to work with. Since the backgrounds are downloaded, stored and overwritten.. they are stored here.
C:\ProgramData\Microsoft\Windows\SystemData is where the lock screen can be changed or overwritten, given permission.
C:\Windows\Web\Screen is the location of the windows prelogin screen background.
And C:\Windows\Web\Wallpaper is where default windows 7 wallpapers for your desktop are saved.

SOURCE

https://www.laptopmag.com/articles/find-windows-10-lock-screen-pictures
Share:

Thursday, June 6, 2019

Which type of authorization provides a mechanism to validate both sender and receiver?

Which type of authorization provides a mechanism to validate both sender and receiver?

  • Kerberos
  • Anonymous
  • RADIUS
  • TACACS 
Which type of authorization provides a mechanism to validate both sender and receiver?

EXPLANATION

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. The protocol was named after the character Kerberos from Greek mythology, the ferocious three-headed guard dog of Hades. Kerberos An access control system that was developed at MIT in the 1980s. Turned over to the IETF for standardization in 2003, it was designed to operate in both small companies and large enterprises with multiple domains and authentication servers.

 

Share:

Which of these fire extinguishers is best for putting out burning wires?

Which of these fire extinguishers is best for putting out burning wires?

  • Carbon dioxide
  • Sodium chloride
  • Copper powder
  • Foam 

EXPLANATION

If a small and contained fire breaks out – for example, if an extension cord begins to smolder -- you could successfully douse it with baking soda. That's right: baking soda, just like the kind you use in the kitchen. Baking soda contains sodium bicarbonate, which just happens to be the substance contained in Class C fire extinguishers, which are best suited for electrical fires. Baking soda produces water, which will effectively cool and smother a small fire.
Class C fires involve electrical equipment, such as appliances, wiring, circuit breakers and outlets. Never use water to extinguish class C fires - the risk of electrical shock is far too great! Class C extinguishers do not have a numerical rating. The C classification means the extinguishing agent is non-conductive. Geometric symbol (blue circle)
CO2 extinguishers have an advantage over dry chemical extinguishers since they don't leave a harmful residue - a good choice for an electrical fire on a computer or other favorite electronic device such as a stereo or TV.

Share:

If an organization takes a full backup every Sunday morning and a daily differential backup each morning, what is the fewest number of backups that need to be restored after a disaster on Friday?

If an organization takes a full backup every Sunday morning and a daily differential backup each morning, what is the fewest number of backups that need to be restored after a disaster on Friday?

  • 7
  • 6
  • 1
If an organization takes a full backup every Sunday morning and a daily differential backup each morning, what is the fewest number of backups that need to be restored after a disaster on Friday?

EXPLANATION

Your network uses the following backup strategy: full backups every Sunday night and Differential backups Monday through Saturday nights. Thursday morning the storage system fails. How many restore operations will you need to perform to recover all of the data?
Answer 2

Share:

Which of the following algorithms is used by MD5?

Which of the following algorithms is used by MD5?

  • Block cipher algorithm
  • Asymmetric encryption algorithm
  • Cryptographic algorithm
  • Hashing algorithm 
Which of the following algorithms is used by MD5?

EXPLANATION

MD5 which stands for Message Digest algorithm 5 is a widely used cryptographic hash function that was invented by Ronald Rivest in 1991. The idea behind this algorithm is to take up a random data (text or binary) as an input and generate a fixed size “hash value” as the output. The input data can be of any size or length, but the output “hash value” size is always fixed.


Share:

Popular Posts