IT Questions and Answers :)

Thursday, April 22, 2021

For an IBM i user profile, what authority could be considered "keys to the kingdom"?

 For an IBM i user profile, what authority could be considered "keys to the kingdom"?

  • *IOSYSCFG
  • *SECOFR
  • *ALLOBJ
  • *ALLAUT            
For an IBM i user profile, what authority could be considered "keys to the kingdom"?


EXPLANATION

*ALLOBJ authority on a user profile grants a user access to everything on the system. Although the profile may not have the ability to directly do system functions like hardware configuration or system saves, *ALLOBJ grants the profile access to objects that do have those privileges. *ALLOBJ authority is often granted to all profiles on a system to make up for poor security planning and is a dangerous practice.

SOURCE

https://www.itjungle.com/2017/04/24/state-ibm-security-seven-areas-demand-attention/
   
Share:

Tuesday, April 20, 2021

How many Kilobytes in 1 Gigabit?

 How many Kilobytes in 1 Gigabit?

  • 125000
  • 1000000
  • 100000
  • 122070     
          
How many Kilobytes in 1 Gigabit?

EXPLANATION

Bits and Bytes are different by a factor of 8.  A lot of times people mistaken these, which can lead to disastrous consequences when talking about IT contracts.  Make sure you dot your i's, cross your t's, and check your bits & bytes!!

SOURCE

https://bit-calculator.com/
Share:

Monday, April 19, 2021

What do Java and JavaScript have in common?

 What do Java and JavaScript have in common?

  • None of these
  • Both are compiled to bytecode
  • Both use prototypes
  • Both use JAR files               
What do Java and JavaScript have in common?

EXPLANATION

Java and JavaScript share very little in common, despite both using C-style syntax and misleading name similarity

SOURCE

https://en.wikipedia.org/wiki/Java_(programming_language)




Share:

In Unix/Linux, there is FSCK. What is its equivalent in Windows?

 In Unix/Linux, there is FSCK. What is its equivalent in Windows?

  • TRACERT
  • CHKDSK
  • FDISK
  • FSUTIL               
In Unix/Linux, there is FSCK. What is its equivalent in Windows?


EXPLANATION

The system utility fsck (file system consistency check) is a tool for checking the consistency of a file system in Unix and Unix-like operating systems, such as Linux, macOS, and FreeBSD. A similar command, CHKDSK exists in Microsoft Windows.

SOURCE

https://en.wikipedia.org/wiki/Fsck

Share:

Tuesday, April 13, 2021

In Linux, what is the result of this command: tar -xvf public_html.tar

In Linux, what is the result of this command: tar -xvf public_html.tar

  • Untar or extract public_html.tar to /home/public_html
  • Create a new public_html.tar archive using the files in the current directory
  • Untar or extract public_html.tar to the current directory
  • Untar or extract public_html.tar to /root             

In Linux, what is the result of this command: tar -xvf public_html.tar


EXPLANATION

To untar or extract a tar file, just issue following command using option x (extract). For example the below command will untar the file public_html.tar in present working directory:

# tar -xvf public_html.tar

SOURCE

Share:

Monday, April 12, 2021

What is the minimum Domain Functional Level required to use DFSR to replicate SYSVOL?

 What is the minimum Domain Functional Level required to use DFSR to replicate SYSVOL?

  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Server 2003
  • Windows Server 2008
What is the minimum Domain Functional Level required to use DFSR to replicate SYSVOL?

EXPLANATION

The domain functional level needed to be Windows server 2008 to support DFS Replication of SYSVOL. 

SOURCE

https://techcommunity.microsoft.com/t5/storage-at-microsoft/streamlined-migration-of-frs-to-dfsr-sysvol/ba-p/425405
               
Share:

Friday, April 9, 2021

A security analyst received a compromised workstation. Its hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

 A security analyst received a compromised workstation. Its hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

  • Use write blockers.
  • Make a copy of the hard drive.
  • Install it on a different machine and explore the content.
  • Run rm R command to create a hash.         
A security analyst received a compromised workstation. Its hard drive may contain evidence of criminal activities. Which of the following is the FIRST thing the analyst must do to ensure the integrity of the hard drive while performing the analysis?

EXPLANATION

If you try to make a copy of the disk without the write blockers, you run risk of adding more data than already is into the hard drive. 

SOURCE

https://comptiaexamtest.com/CySA+CS0-001/comptia-cysa-cs0-001-question010/
      
Share:

Popular Posts