Mohinder

36 posts

Mohinder

Mohinder

@mohinder_tech

Katılım Mart 2025
15 Takip Edilen0 Takipçiler
Mohinder
Mohinder@mohinder_tech·
Why we need Terraform when there is tool like Ansible available ?
English
0
0
0
3
NOVA
NOVA@Its_Nova1012·
What was your first Linux distro? - Fedora - Ubuntu - Arch Linux - Debian - Kali Linux And what are you using now?
English
786
10
432
45K
Hackademy
Hackademy@hacka_demy·
If you are into cybersecurity Say “HI”
English
115
6
135
5.4K
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
What technology prioritizes critical network traffic over browsing and social media? A. VPN B. TLS C. VLANs D. QoS
English
44
14
156
16.7K
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Which protocol is used by the ping utility to test reachability and report errors? A) TCP B) UDP C) ICMP D) ARP
English
75
21
237
31.3K
Mohinder
Mohinder@mohinder_tech·
Notes: Winget installs the 64-bit CLI on 64-bit OS by default now. If you have used the 32-bit CLI before, please follow this guide to migrate to 64-bit version: #migrate-to-64-bit-azure-cli" target="_blank" rel="nofollow noopener">learn.microsoft.com/cli/azure/inst…
English
0
0
1
4
Mohinder
Mohinder@mohinder_tech·
To Quickstart the #Microsoft Azure CLI Journey - 1️⃣ Install Azure CLI winget install Microsoft.AzureCLI 2️⃣ Restart PowerShell 3️⃣ Verify installation az version 4️⃣ Login to Azure az login @Azure
English
1
0
1
6
Mohinder
Mohinder@mohinder_tech·
winget cmdlet will automatically add the Environment variable.
English
0
0
0
5
Mohinder
Mohinder@mohinder_tech·
Quick Guide to Install Terraform on Windows ⚡ 1️⃣ Install via winget winget install HashiCorp.Terraform 2️⃣ Verify installation terraform -version 3️⃣ Start using Terraform terraform init terraform plan terraform apply
English
1
0
1
6
Mohinder
Mohinder@mohinder_tech·
@CyberRacheal VLAN @grok while other options like Switch , Router , Firewall will be considered as physical option for network segmentation
English
1
0
1
9
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Which of the following is defined as a network segmentation technology that allows devices on a network to be logically grouped, even if they are in different locations? A. Firewall B. VLAN C. Switch D. Router
English
54
8
172
19.4K
Mohinder
Mohinder@mohinder_tech·
🔹 OLTP → Handles real-time transactions (banking, orders) 🔹 OLAP → Used for analytics and business intelligence OLTP = operational databases (MySQL, PostgreSQL) OLAP = data warehouses (Redshift, BigQuery) Understanding this is key for modern data systems. #DataEngineering
English
0
0
0
6
Mohinder
Mohinder@mohinder_tech·
ACID is a set of rules that ensure reliable database transactions. ACID = A → Atomicity C → Consistency I → Isolation D → Durability These properties make sure data remains correct even if failures happen.
English
0
0
0
4
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
A technician is troubleshooting a "Limited Connectivity" error. The computer has an IP address of 169.254.10.55. Which service is likely unavailable? A) DNS B) NAT C) DHCP D) ARP
English
69
11
206
30.7K
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Which of these is a valid "Private" IP address that would not be routable on the public internet?  A) 8.8.4.4 B) 172.20.15.5 C) 200.10.1.1 D) 11.0.0.1
English
34
10
126
14.1K
Mohinder
Mohinder@mohinder_tech·
Azure Point-to-Site (P2S) VPN Point(Right Side) -Users Site (Left) - IT +OT Gateway(Center) - Authenticates the client and let them in tunnel
Mohinder tweet media
English
0
0
1
20
Mohinder
Mohinder@mohinder_tech·
@elormkdaniel A. Worm → Focuses on self-propagation,not persistent outbound C2 traffic B. Trojan → Trojan is a delivery method C. Backdoor - Stealing data, or remote control sessions, Lateral movements / C2 connection.☠️ D. Ransomware → In this attack encryption will be done by attacker
English
0
0
2
8
Elorm Daniel
Elorm Daniel@elormkdaniel·
A security analyst detects unusual outbound traffic to an unknown IP address on port 4444. 
Which type of malware is most likely responsible? A. Worm 
B. Trojan 
C. Backdoor 
D. Ransomware
English
47
11
188
22.2K
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Which of these is an example of a MAC address? A. 10.23.19.49 B. 2001 : db8: 3333 : 4444 : 5555 : 6666 : 7777 : 8888 C. 00-51-02-1F-58-F6 D. 0051021f58
English
72
6
158
12K
Mohinder
Mohinder@mohinder_tech·
Azure File Sync turns your local Windows Server into a high-speed cache for the cloud. Cloud Endpoint - Azure File Share itself. Server Endpoint - Windows servers Folder path Storage Sync Service- Sync data b/w File share and Server Endpoint. #Cloud #Serverless #Microsoft #azure
English
0
0
0
19