IT Questions and Answers :)

Wednesday, January 26, 2022

Which of the following is a text based e-mail client for Unix

Which of the following is a text based e-mail client for Unix

  • goat
  • moo
  • puss
  • mutt      
Which of the following is a text based e-mail client for Unix


EXPLANATION

Mutt is a text-based email client for Unix-like systems. It was originally written by Michael Elkins in 1995 and released under the GNU General Public License version 2 or any later version

The Mutt slogan is "All mail clients suck. This one just sucks less."

www.mutt.org 



SOURCE

http://www.mutt.org/         
Share:

Thursday, December 2, 2021

At what layer of the OSI model does IPsec operate?

At what layer of the OSI model does IPsec operate?

  • Network
  • Data Link
  • Transport
  • Session 
At what layer of the OSI model does IPsec operate?

EXPLANATION

Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications that works by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host).[1] Internet Protocol security (IPsec) uses cryptographic security services to protect communications over Internet Protocol (IP) networks. IPsec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection.

SOURCE

https://en.wikipedia.org/wiki/IPsec

 
Share:

Wednesday, October 6, 2021

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?

  • 180 days
  • 30 days
  • 6 months
  • 24 hours  

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?


EXPLANATION

Tombstone lifetime is the amount of time a deleted directory object remains in storage before it is permanently deleted.  This value is unique in the forest.

For new Active Directory forests, the default Tombstone Lifetime (TSL) is 180 days.

While some may point out that the default value can be 60 days, this only is true for existing forests whose original forest root Domain Controller was created while running Windows Server 2003 R2 SP1 or earlier operating systems.  Certainly, at the time of this writing, nobody would be creating a new forest using Windows Server 2003 R2 SP1.


SOURCE

Share:

Monday, September 27, 2021

When two systems first connect using SSH they exchange their....

When two systems first connect using SSH they exchange their....

  • Public key
  • Private key
  • Passphase
  • Password      

When two systems first connect using SSH they exchange their....


EXPLANATION

When two systems first connect using SSH they exchange their public keys with each other.

SOURCE

Share:

Friday, September 3, 2021

Which target attribute is used with links to force the web browser to open the link in a new tab or window?

Which target attribute is used with links to force the web browser to open the link in a new tab or window?

  • _new
  • _reload
  • _top
  • _blank               
Which target attribute is used with links to force the web browser to open the link in a new tab or window?


EXPLANATION

The target attribute specifies where the linked document will open when the link is clicked. The default is the current window. If target="_blank", the linked document will open in a new tab or (on older browsers) a new window.  

Share:

Thursday, August 12, 2021

In which layer of the OSI model does the ICA protocol from Citrix operate?

In which layer of the OSI model does the ICA protocol from Citrix operate?

  • Transport
  • Application
  • Presentation
  • Physical               

In which layer of the OSI model does the ICA protocol from Citrix operate?


EXPLANATION

 The Independent Computing Architecture (ICA) protocol operates at the presentation layer of the OSI model, that is, the 6th layer. ICA is a Windows presentation services protocol from Citrix that provides the foundation for turning any client device-thin or fat-into the ultimate thin client. In the case of the ICA protocol, the 6th layer or the presentation layer is responsible for making sure the data can be presented to the application layer, in other words, the presentation layer prepares/formats the data making it ready to be passed up to the application layer.

SOURCE

http://s3.amazonaws.com/legacy.icmp/additional/ica_acceleration_0709a.pdf
Share:

In a ISA type system, what DMA channel was always assigned to the system board?

In a ISA type system, what DMA channel was always assigned to the system board?

  • 3
  • 0
  • 7
  • 5               

In a ISA type system, what DMA channel was always assigned to the system board?



EXPLANATION

http://www.pchell.com/hardware/irqs.shtml

SOURCE

http://www.pchell.com/hardware/irqs.shtml
Share:

Popular Posts