IT Questions and Answers :)

Wednesday, August 28, 2019

Which of the following methods is not a secure way to connect clients to Exchange?

Which of the following methods is not a secure way to connect clients to Exchange?

  • Outlook using MAPI/RPC
  • Outlook Web Access over HTTPS
  • Outlook using RPC over HTTPS
  • Outlook using IMAP4 with SSL 
Which of the following methods is not a secure way to connect clients to Exchange?

EXPLANATION

The point they're making is that "traditional RPC" sometimes uses unusual low-level network protocols that often get blocked by corporate firewalls. Because SOAP uses HTTP, it's traffic is "indistinguishable" from normal web page views, and so is not caught out by these firewalls. Not too sure about the security point, I think they're probably implying that HTTP can easily be secured over HTTPS and that proprietary RPC protocols often don't. Of course, this is protocol dependant, not all RPC protocols will be insecure, and many of them can be tunnelled over HTTPS.

RPC over HTTP, also known as Outlook Anywhere, is a legacy method of connectivity and transport between Outlook for Windows and Exchange. In May 2014, Microsoft introduced MAPI over HTTP as a replacement for RPC over HTTP.
Starting on October 31, 2017, RPC over HTTP will no longer be a supported protocol for accessing mail data from Exchange Online. Starting on this date, the following conditions will apply:
  1. Microsoft will not provide support for RPC over HTTP issues (regular or custom).
  2. No code fixes or updates to resolve problems that are unrelated to security will be released.
Additionally, for Office versions that support MAPI over HTTP, Microsoft may elect to ignore existing registry keys that customer are using in order to force RPC over HTTP use.

 

Share:

1024 bits are equal to how many bytes?

1024 bits are equal to how many bytes?

  • 128 bytes
  • 1 byte
  • 64 bytes
  • 32 bytes 
1024 bits are equal to how many bytes?

EXPLANATION

Conversion Definitions

What is a bit (b)?

A bit is a unit used to measure digital storage and is based on "Binary multiples of bits". The symbol for bit is b. There are 8 bits in a Byte.

What is a Byte (B)?

A Byte is a unit used to measure digital storage and is based on "Binary multiples of Bytes". The symbol for Byte is B. There are 0.125 Bytes in a bit.

Conversion Formula

The formula to convert from bits to Bytes is:
Bytes = bits ÷ 8

Conversion Example

bit to Byte Conversion Example

Task: Convert 3,000 bits to Bytes (show work)

Formula:
bits ÷ 8 = Bytes

Calculations:
3,000 bits ÷ 8 = 375 Bytes

Result:
3,000 bits is equal to 375 Bytes

SOURCE

https://duckduckgo.com/?q=bit+to+bytes+conversion&t=ffcm&atb=v1-1&ia=answer

 






Share:

In PowerShell, what is "splatting"?

In PowerShell, what is "splatting"?

  • A way to pass multiple parameters to a cmdlet
  • A way to define many variables at once
  • An error state where many things failed at once
  • A way to dump the full contents of the pipeline 

EXPLANATION

Splatting to pass parameters to commands in PowerShell

Splatting is a method of passing a collection of parameter values to a command as unit. PowerShell associates each value in the collection with a command parameter. Splatted parameter values are stored in named splatting variables, which look like standard variables, but begin with an At symbol (@) instead of a dollar sign ($). The At symbol tells PowerShell that you are passing a collection of values, instead of a single value.
Splatting makes your commands shorter and easier to read. You can re-use the splatting values in different command calls and use splatting to pass parameter values from the $PSBoundParameters automatic variable to other scripts and functions.
Beginning in Windows PowerShell 3.0, you can also use splatting to represent all parameters of a command.

SYNTAX

<CommandName> <optional parameters> @<HashTable> <optional parameters>
<CommandName> <optional parameters> @<Array> <optional parameters>
To provide parameter values for positional parameters, in which parameter names are not required, use the array syntax. To provide parameter name and value pairs, use the hash table syntax. The splatted value can appear anywhere in the parameter list.
When splatting, you do not need to use a hash table or an array to pass all parameters. You may pass some parameters by using splatting and pass others by position or by parameter name. Also, you can splat multiple objects in a single command just so you pass no more than one value for each parameter.

 

Share:

Twitter is an example of what type of cloud service?

Twitter is an example of what type of cloud service?

  • SaaS
  • IaaS
  • PaaS
  • DBaaS 
Twitter is an example of what type of cloud service?

EXPLANATION

SaaS is also known as “on-demand software”. Users of SaaS rather than fully buy the license of various software hire the software at regular intervals and use it through an Internet browser. The variety of software provided by SaaS is very broad. There are a number of software used by SaaS from companies such as end users that employs in content management, human resources management, accounting, ERP, customer relationship management and other relevant areas.

The software-as-a-service type of cloud computing grows very quickly, while the largest market for software-as-a-service electricity is customer relationship management.
In this service model, the cloud-based applications are offered to the customer as a service on request. It is a single instance of the service running on remote computers “in the cloud”, owned and operated by others, and connected to the users' computers over the Internet and typically a web browser. Social networking sites like Facebook, Twitter, Flickr and Google are all examples of SaaS, although users are able to access the services through any Internet-enabled device.

 

Share:

For a software development firm, which of the following cloud benefits do they get specifically from PaaS?

For a software development firm, which of the following cloud benefits do they get specifically from PaaS?

  • Time to market
  • Vendor lock-in
  • Scalability
  • Security 


EXPLANATION

PaaS allows developers to quickly create and test applications. Getting your product to market before your competitors can give a competitive edge.
B, C, and D are incorrect. Vendor lock-in ties customers to vendor-specific solutions, but this is not a benefit of PaaS. Scalability embodies the ability to grow in a controlled manner, but it is not a distinguishing feature of PaaS as compared to other types of cloud offerings. Security does apply to cloud computing but not specifically to PaaS.







Share:

Popular Posts