IT Questions and Answers :)

Sunday, November 17, 2019

The Betamax was to VHS, as

The Betamax was to VHS, as

  • Terminate and Stay Resident is to Internal OS Commands
  • Switching is to Routing
  • Token-Ring is to Ethernet
  •  DASD is to SAN
The Betamax was to VHS, as

EXPLANATION

One one time in the 1980s Ethernet and Token-Ring were very competitive, vying for the same customers and networks,
replacing Arcnet (similar to Token-Ring) an older network topology.  Speed and reliability of Ethernet versus Token-Ring was the difference maker, and eventually Token-Ring is no longer used nor supported.

SOURCE

http://www.eweek.com/networking/30-years-ago-networking-in-the-1980s-meant-ethernet-vs.-token-ring

Share:

Friday, November 15, 2019

In terms of Internet Security, what is CEO Fraud?

In terms of Internet Security, what is CEO Fraud?

  • A Phishing email directed at a CEO or executive within a CEO's office
  • When a CEO embezzles from their company
  • A criminal who impersonates a supervisor or other high ranking individual in a phishing attempt
  • A CEO who impersonates someone to attain private information 

In terms of Internet Security, what is CEO Fraud?

EXPLANATION

Cyber criminals have developed a new attack called CEO Fraud, also known as Business Email Compromise (BEC).
In these attacks, a cyber criminal pretends to be a CEO or other senior executive from your organization. The criminals send an email to staff members like yourself that try to trick you into doing something you should not do. These types of attacks are extremely effective because the cyber criminals do their research. They search your organization’s website for information, such as where it is located, who your executives are, and other organizations you work with. The cyber criminals then learn everything they can about your coworkers on sites like LinkedIn, Facebook, or Twitter. Once they know your organization’s structure, they begin to research and target specific employees.

SOURCE

https://securingthehuman.sans.org/resources/national-cyber-security-awareness-month

Share:

Monday, November 11, 2019

What does this PowerShell command do: Get-Service *spool* | Restart-Service

What does this PowerShell command do: Get-Service *spool* | Restart-Service

  • Restarts any service that has "spool" in its name
  • Restarts the print spooler on the computer [No Custom Service This would be correct]
  • Restarts all services on the computer
  • Restarts the print spooler on the print server 
What does this PowerShell command do: Get-Service *spool* | Restart-Service

EXPLANATION


PS C:\Windows\system32> Get-Service *spool*

Status   Name               DisplayName
------   ----               -----------
Running  Spooler            Print Spooler
 

PS C:\Windows\system32> Get-Service *spool* | Restart-Service

Share:

What did .msi originally stand for?

What did .msi originally stand for?

  • Multi-Stacked Interface
  • Microsoft Installer
  • Multi-Segmented Installer
  • Multi-Socketed Icon 
What did .msi originally stand for?


EXPLANATION

MSI is an installer package file format used by Windows. Its name comes from the program's original title, Microsoft Installer, which has since changed to Windows Installer. MSI files are used for installation, storage, and removal of programs.

 

Share:

What Does ASCII stand for?

What Does ASCII stand for?

  • A System Corrected Interfaced Icon
  • A Sorry Computer I Inherited
  • Asyncronus Computer Interlinked Interface
  • American Standard Code for Information Interchange 

What Does ASCII stand for?


EXPLANATION

ASCII stands for American Standard Code for Information Interchange. Below is the ASCII character table, including descriptions of the first 32 characters.

Share:

Popular Posts