IT Questions and Answers :)

Tuesday, January 29, 2019

What is the "Power Good Signal", according to the ATX specification?

What is the "Power Good Signal", according to the ATX specification?

  • -5 Volt current the motherboard generates to indicate it's functioning.
  • LED power light on the computer indicating proper function
  • Means that the power supplied to the computer power supply is ample
  • +5 volt signal generated in the power supply that is supplied to the motherboard 

What is the "Power Good Signal", according to the ATX specification?

EXPLANATION

The Power Good signal (sometimes called Power_OK or PWR_OK) is a +5 V (nominal) active high signal (with a variation from +2.4 V through +6.0 V generally being considered acceptable) that is supplied to the motherboard when the power supply has passed its internal
self-tests and the output voltages have stabilized. This typically takes place anywhere from 100 ms to 500 ms (0.1–0.5 seconds) after you turn on the power supply switch. The power supply then sends the Power_Good signal to the motherboard, where the processor timer chip that controls the reset line to the processor receives it.

SOURCE

Share:

In Group Policy, what is the default order of precedence, (not to be confused with the order in which a policy is processed,) excluding User and Computer accounts, that a policy is applied?

In Group Policy, what is the default order of precedence, (not to be confused with the order in which a policy is processed,) excluding User and Computer accounts, that a policy is applied?

  • Domain, Site, OU, Local
  • OU, Domain, Site, Local
  • Local, Site, Domain, OU
  • Site, OU, Domain, Local 

 
In Group Policy, what is the default order of precedence, (not to be confused with the order in which a policy is processed,) excluding User and Computer accounts, that a policy is applied?

EXPLANATION

The order of precedence for Group Policy is:
  • OU
  • Domain
  • Site
  • Local
However the order that the Policy is processed is just the opposite:
  • Local
  • Site
  • Domain
  • OU

SOURCE

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc757050(v=ws.10)
Share:

Wednesday, January 23, 2019

How could leaving a VMware snapshot unattended cause a server down scenario?

How could leaving a VMware snapshot unattended cause a server down scenario?

  • Known bug in ESXi 5.0. VMDK file for VM becomes locked when multiple snapshots exist for the same VM
  • All remaining storage space on the host becomes used
  • The snapshot becomes "unlocked" and causes a hostname/IP conflict
  • Trick question, snapshots are good for as long as you need them 
How could leaving a VMware snapshot unattended cause a server down scenario?

EXPLANATION

Snapshots grow in size over time.  Although the host and VMs may not actually go down, lack of sufficient space on the host would render the host and all hosted virtual machines nearly useless - similar to a CPU and/or memory utilization being maxed out.  Should this occur, access the vSphere client and delete all snapshots.  If you power down the VM, the process will take longer but you will not be able to power up the VM until the process completes.  Leaving the VM powered on will take longer to delete the snapshot but once sufficient space is gained the server(s) should start normal operation again.
Best practices for virtual machine snapshots in the VMware environment:
https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&external...
Share:

Tuesday, January 22, 2019

What does HTTP Error 451 mean?

What does HTTP Error 451 mean?

  • Proxy authentication required
  • Request timeout
  • Unavailable for legal reasons
  • Request header fields too large 
What does HTTP Error 451 mean?


EXPLANATION

HTTP 451: Unavailable For Legal Reasons is an error status code of the HTTP protocol that displays when the user requests an illegal resource, such as a web page censored by a government.  Examples of situations where an HTTP 451 error code could be displayed include web pages deemed a danger to national security, or web pages deemed to violate copyright, privacy, blasphemy laws, or any other law or court order.
The number 451 is a reference to Ray Bradbury's 1953 dystopian novel Fahrenheit 451, in which books are outlawed.
https://en.wikipedia.org/wiki/HTTP_451


Share:

What is the purpose of a "Display Server"?

What is the purpose of a "Display Server"?

  • To display the I/O logs and communication links between other servers within an infrastructure
  • To assist with graphical designers working from low-end devices remotely
  • To coordinate the I/O of its clients to and from the rest of the OS, hardware and each other
  • To watch movies on during quiet time in an office 

 
What is the purpose of a "Display Server"?

EXPLANATION

A display server or window server is a program whose primary task is to coordinate the input and output of its clients to and from the rest of the operating system, the hardware, and each other.

SOURCE

https://en.wikipedia.org/wiki/Display_server
Share:

Friday, January 11, 2019

VMware introduced Stretch Clusters in vSAN 6.6. Which of the following is NOT true about Stretch Clusters?

VMware introduced Stretch Clusters in vSAN 6.6. Which of the following is NOT true about Stretch Clusters?

  • Stretched clusters use fault domains to provide redundancy and failure protection across sites.
  • You can use a witness virtual appliance as the witness host in a stretched cluster.
  • The witness host can run VMs.
  • A vSAN stretched cluster can tolerate one link failure at a time without data becoming unavailable. 

VMware introduced Stretch Clusters in vSAN 6.6. Which of the following is NOT true about Stretch Clusters?

EXPLANATION

The witness host cannot run VMs.
The witness host can be a physical host or an ESXi host running inside a VM. The VM witness host does not provide other types of functionality, such as storing or running VMs.
Multiple witness hosts can run as VMs on a single physical server. For patching and basic networking and monitoring configuration, the VM witness host works in the same way as a typical ESXi host. You can manage it with vCenter Server, patch it and update it by using esxcli or vSphere Update Manager, and monitor it with standard tools that interact with ESXi hosts.

SOURCE

https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.virtualsan.doc/GUID-1BDC7194-67A7-4E7C-BF3A-3A0A32AEECA9.html
Share:

Thursday, January 10, 2019

In Attribute Editor what should attribute "msExchRecipient TypeDetails" value be set to for a RemoteSharedMailbox?

In Attribute Editor what should attribute "msExchRecipient TypeDetails" value be set to for a RemoteSharedMailbox?

  • 4
  • 34359738368
  • 1
  • 2147483648 
In Attribute Editor what should attribute "msExchRecipient TypeDetails" value be set to for a RemoteSharedMailbox?

EXPLANATION

Many administrators need to convert regular User Mailboxes to a Shared Mailbox after migration to Office 365. In a Hybrid environment these need to be converted to Remote Shared Mailboxes. Converting a User mailbox to a Shared mailbox in Exchange Online is easy enough, however this does not replicate to Exchange on prem, this can be done by editing
the Attribute value for "msExchRecipient TypeDetail" in Active Directory.  RemoteSharedMailbox attribute value is 34359738368, UserMailbox is 1, SharedMailbox is 4 and RemoteUserMailbox is 2147483648.

SOURCE

https://answers.microsoft.com/en-us/msoffice/forum/msoffice_o365admin-mso_exchon-mso_o365b/recipient-type-values/7c2620e5-9870-48ba-b5c2-7772c739c651

 

Share:

Database concurrency control is important for which of the following scenarios?

Database concurrency control is important for which of the following scenarios?

  • Maintaining read integrity with multiple users
  • Maintaining integrity in a single-user environment
  • Maintaining integrity in a multi-user environment
  • Maintaining read integrity in a 1-user environment 

 
Database concurrency control is important for which of the following scenarios?

EXPLANATION

Concurrency control is a process which allows multiple people to access a shared resource, which in this case is a database. There are several different strategies when it comes to configuring your database to prevent data corruption when multiple users are accessing it at the same time that are all called concurrency controls.


Aaron W Originally Copied From

Concurrency control is important for which of the following reasons?
A.To ensure data integrity when updates occur to the database in a multiuser environment
B.To ensure data integrity when updates occur to the database in a single-user environment
C.To ensure data integrity while reading data occurs to the database in a multiuser environment
D.To ensure data integrity while reading data occurs to the database in a single-user environment


Share:

Friday, January 4, 2019

In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

  • Hub Transport Server role
  • Unified Messaging Server role
  • Edge Transport Server role
  • Mailbox Server role 
In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

EXPLANATION

Deployed in a perimiter network, the Edge Transport Server role provides message protection and security. This protection is handled by various agents running on the Edge Transport
Server and act on email messages as they are processed.

Edge Transport Server Role – Edge Transport Server Roles sits at the edge of the network and it has to be installed on a standalone server. It performs a number of functions including Anti-spam and Anti-virus protection. The Edge Transport uses connection filtering, content filtering, recipient filtering, SenderID, sender and IP reputation to reduce the amount of Spam delivered to the end users inbox

SOURCE

https://technet.microsoft.com/en-us/library/mt616515(v=exchg.150).aspx
Share:

Popular Posts