IT Questions and Answers :)

Tuesday, November 12, 2024

What does an HTTP error 403 mean?

 What does an HTTP error 403 mean?

  • The webpage cannot be found
  • That webpage no longer exists
  • Access to the webpage is forbidden
  • The website cannot display the page


EXPLANATION


A "403 Forbidden" error indicates that the server understands the request made by the client (your web browser), but it refuses to authorize it. Here are some common reasons for encountering a 403 error:

1. **Insufficient Permissions:**
   - You might not have the necessary permissions to access the specific resource or webpage. Check if you need to log in with valid credentials, especially if it's a restricted or private page.

2. **IP Blocking:**
   - Your IP address may be blocked by the server. Ensure that you are not using a VPN or proxy that could be causing the block. If you are, try disabling it and attempt to access the page again.

3. **URL or File Restrictions:**
   - The server might have specific restrictions on the URL or file you are trying to access. Verify that the URL is correct and adheres to any access rules defined by the server.

4. **Server Misconfiguration:**
   - There may be a misconfiguration on the server side. Contact the website administrator or hosting provider to report the issue.

5. **Browser Cache and Cookies:**
   - Clear your browser's cache and cookies. Cached data might be causing conflicts. After clearing the cache, try reloading the page.

6. **Firewall or Security Software:**
   - Your firewall or security software could be blocking the request. Temporarily disable such tools and see if the error persists.

If none of these solutions resolves the issue, and you believe it's not on your end, you should contact the website administrator or support team. They can provide more specific information and assistance in resolving the 403 error.
Share:

Tuesday, January 17, 2023

Your customers are concerned about S3 storage limitations on some key buckets they are creating. Why should they not be concerned about this?

Your customers are concerned about S3 storage limitations on some key buckets they are creating. Why should they not be concerned about this?

  • There is no limit to the amount of storage for S3.
  • They can always create additional buckets.
  • There is a bucket maximum size, but there is no limit on the number of buckets.
  • AWS can offload additional storage to Dropbox if Dropbox is hosted on AWS.
Your customers are concerned about S3 storage limitations on some key buckets they are creating. Why should they not be concerned about this?

Explanation

Remember, there is a limit on the number of buckets you can create, and there is a limit to the size of an object, but when taken as a whole - there is no limit to the amount of data you can store in S3.

An Amazon S3 bucket is owned by the AWS account that created it. Bucket ownership is not transferable to another account.


When you create a bucket, you choose its name and the AWS Region to create it in. After you create a bucket, you can't change its name or Region.


When naming a bucket, choose a name that is relevant to you or your business. Avoid using names associated with others. For example, you should avoid using AWS or Amazon in your bucket name.


By default, you can create up to 100 buckets in each of your AWS accounts. If you need additional buckets, you can increase your account bucket limit to a maximum of 1,000 buckets by submitting a service limit increase. There is no difference in performance whether you use many buckets or just a few.

Source

https://docs.aws.amazon.com/AmazonS3/latest/userguide/BucketRestrictions.html


Share:

Which of the following AWS products cannot be used by CloudWatch to trigger alarms?

Which of the following AWS products cannot be used by CloudWatch to trigger alarms?

  • Auto Scaling
  • CloudSearch
  • EC2
  • Elastic Load Balancing

Which of the following AWS products cannot be used by CloudWatch to trigger alarms?

Explanation

CloudWatch uses information from Auto Scaling, Elastic Load Balancing, and EC2 instances to trigger alarms, but it does not use CloudSearch.

Amazon CloudWatch monitors your Amazon Web Services (AWS) resources and the applications you run on AWS in real time. You can use CloudWatch to collect and track metrics, which are variables you can measure for your resources and applications.

The CloudWatch home page automatically displays metrics about every AWS service you use. You can additionally create custom dashboards to display metrics about your custom applications, and display custom collections of metrics that you choose.

You can create alarms that watch metrics and send notifications or automatically make changes to the resources you are monitoring when a threshold is breached. For example, you can monitor the CPU usage and disk reads and writes of your Amazon EC2 instances and then use that data to determine whether you should launch additional instances to handle increased load. You can also use this data to stop under-used instances to save money.

With CloudWatch, you gain system-wide visibility into resource utilization, application performance, and operational health.

Source

Share:

What does AWS use when you copy an instance store–backed AMI to a different region?

What does AWS use when you copy an instance store–backed AMI to a different region?

  • EFS
  • EBS
  • S3
  • Glacier
What does AWS use when you copy an instance store–backed AMI to a different region?

Explanation

When you copy an instance store–backed Amazon Machine Image (AMI) to a region, you create an Amazon S3 bucket for the AMIs copied to that region. All instance store–backed AMIs that you copy to that region are stored in this bucket. The bucket names have the format amis-for-account-in-region-hash (for example, amis-for-123456789012-in-us-east-2-yhjmxvp6).

You can copy an Amazon Machine Image (AMI) within or across AWS Regions. You can copy both Amazon EBS-backed AMIs and instance-store-backed AMIs. You can copy AMIs with encrypted snapshots and also change encryption status during the copy process. You can copy AMIs that are shared with you.

Copying a source AMI results in an identical but distinct target AMI with its own unique identifier. You can change or deregister the source AMI with no effect on the target AMI. The reverse is also true.

With an Amazon EBS-backed AMI, each of its backing snapshots is copied to an identical but distinct target snapshot. If you copy an AMI to a new Region, the snapshots are complete (non-incremental) copies. If you encrypt unencrypted backing snapshots or encrypt them to a new KMS key, the snapshots are complete (non-incremental) copies. Subsequent copy operations of an AMI result in incremental copies of the backing snapshots.

Source


Share:

Which of the following methods is a valid way to encrypt an existing EBS volume?

Which of the following methods is a valid way to encrypt an existing EBS volume?

  • Mark the volume as encrypted in the management console
  • Export the volume with the encryption flag set
  • Create a snapshot of the unencrypted volume, copy the snapshot and encrypt it, and restore the snapshot to a new EBS volume
  • None of the above; EBS volumes do not support encryption
Which of the following methods is a valid way to encrypt an existing EBS volume?

Explanation

There is no direct way to encrypt an unencrypted EBS volume. You can use the encryption property of a snapshot, however, in order to encrypt the volume in an indirect way.

Use Amazon EBS encryption as a straight-forward encryption solution for your EBS resources associated with your EC2 instances. With Amazon EBS encryption, you aren't required to build, maintain, and secure your own key management infrastructure. Amazon EBS encryption uses AWS KMS keys when creating encrypted volumes and snapshots.

Encryption operations occur on the servers that host EC2 instances, ensuring the security of both data-at-rest and data-in-transit between an instance and its attached EBS storage.

Source

Share:

What type of queue is available in all regions with SQS?

What type of queue is available in all regions with SQS?

  • First-in, first-out delivery
  • High throughput
  • Limited throughput
  • Exactly-once processing
What type of queue is available in all regions with SQS?

Explanation

The high throughput queue is available in all regions.
Amazon SQS stores all message queues and messages within a single, highly-available AWS region with multiple redundant Availability Zones (AZs), so that no single computer, network, or AZ failure can make messages inaccessible.

Source


Share:

Your IT group maintains an application on AWS to provide development and testing platforms for your developers. Currently each environment consists of an m1.small EC2 instance. Your developers report to your group performance degradation as they increase network load in the test environment. How would you mitigate these performance issues in the test environment?

Your IT group maintains an application on AWS to provide development and testing platforms for your developers. Currently each environment consists of an m1.small EC2 instance. Your developers report to your group performance degradation as they increase network load in the test environment. How would you mitigate these performance issues in the test environment?

  • Upgrade the m1.small to a larger instance type.
  • Add an additional ENI to the test instance.
  • Use the EBS optimized option to offload EBS traffic.
  • Configure Amazon CloudWatch to provision more network bandwidth when network utilization exceeds 80 percent.
Your IT group maintains an application on AWS to provide development and testing platforms for your developers. Currently each environment consists of an m1.small EC2 instance. Your developers report to your group performance degradation as they increase network load in the test environment. How would you mitigate these performance issues in the test environment?

Explanation

Note that the EBS optimized option is not available for this EC2 instance.
An Amazon EBS-optimized instance uses an optimized configuration stack and provides additional, dedicated capacity for Amazon EBS I/O. This optimization provides the best performance for your EBS volumes by minimizing contention between Amazon EBS I/O and other traffic from your instance

Source

Share:

You have a customer expecting massive IOPS needs (15,000 IOPS) in a critical business application. What type of storage should you consider?

 You have a customer expecting massive IOPS needs (15,000 IOPS) in a critical business application. What type of storage should you consider?

  • SSD
  • Provisioned IOPS
  • Turbo IOPS
  • Optimized networking
You have a customer expecting massive IOPS needs (15,000 IOPS) in a critical business application. What type of storage should you consider?


Explanation

Provisioned IOPS can support up to 20,000 IOPS.
Provisioned IOPS volumes, backed by solid-state drives (SSDs), are the highest performance Elastic Block Store (EBS) storage volumes designed for your critical, IOPS-intensive and throughput-intensive workloads that require low latency.
Share:

Your company maintains part of its services in a local data center and part in the AWS cloud. Which of the following cloud types best describes your company’s cloud implementation?

Your company maintains part of its services in a local data center and part in the AWS cloud. Which of the following cloud types best describes your company’s cloud implementation?

  • Private
  • Hybrid
  • Public
  • Community 
Your company maintains part of its services in a local data center and part in the AWS cloud. Which of the following cloud types best describes your company’s cloud implementation?

Explanation

A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services, with orchestration between the two platforms.
AWS Storage Gateway is a set of hybrid cloud storage services that provide on-premises applications with access to virtually unlimited cloud storage.

Share:

Your engineer is concerned about high CPU utilization on several of your EC2 instances. What service should you use to monitor this?

Your engineer is concerned about high CPU utilization on several of your EC2 instances. What service should you use to monitor this?

  • Service Catalog
  • CloudWatch
  • Trusted Advisor
  • Config
Your engineer is concerned about high CPU utilization on several of your EC2 instances. What service should you use to monitor this?

Explanation

CloudWatch is the primary monitoring tool in AWS.
Amazon CloudWatch monitors your Amazon Web Services (AWS) resources and the applications you run on AWS in real time. You can use CloudWatch to collect and track metrics, which are variables you can measure for your resources and applications.
CloudWatch enables you to monitor your complete stack (applications, infrastructure, network, and services) and use alarms, logs, and events data to take automated actions and reduce mean time to resolution (MTTR). This frees up important resources and allows you to focus on building applications and business value.
Share:

____ is the type of billing used in for AWS?

 ____ is the type of billing used in for AWS?

  • Pay-as-you-terminate
  • Pay-for-reservations
  • Pay-as-you-go
  • Pay-as-you-estimate
____ is the type of billing used in for AWS?

Explanation

AWS uses a pay-as-you-go pricing model.

AWS offers you a pay-as-you-go approach for pricing for the vast majority of our cloud services. With AWS you pay only for the individual services you need, for as long as you use them, and without requiring long-term contracts or complex licensing.

There are three fundamental drivers of cost with AWS: compute, storage, and outbound data transfer.

Share:

Which would not be considered a major benefit of IaaS?

Which would not be considered a major benefit of IaaS?

  • Eliminating security concerns
  • Reducing CapEx
  • Increasing speed and agility
  • Leveraging AWS expertise
Which would not be considered a major benefit of IaaS?

Explanation

Even when you engage in Infrastructure as a Service (IaaS)with AWS, you are still responsible for aspects of securing the infrastructure.


Share:

What is the default duration of time that CloudFront will keep files at Edge Locations?

What is the default duration of time that CloudFront will keep files at Edge Locations?

  • 6 hours
  • 12 hours
  • 24 hours
  • 48 hours

What is the default duration of time that CloudFront will keep files at Edge Locations?

Explanation

By default, if no cache control header is set, each Edge Location checks for an updated version of your file whenever it receives a request more than 24 hours after the previous time it checked the origin for changes to that file. This is called the “expiration period.” You can set this expiration period to be as short as 0 seconds or as long as you’d like by setting the cache control headers on your files in your origin. Amazon CloudFront uses these cache control headers to determine how frequently it needs to check the origin for an updated version of the file. For an expiration period set to 0 seconds, Amazon CloudFront will revalidate every request with the origin server. If your files don’t change very often, it is best practice to set a long expiration period and implement a versioning system to manage updates to your files.

Share:

Sunday, January 15, 2023

Common questions and answers asked to L1 VMware/Network Engineer & Administrator or Admin

Common questions and answers asked to L1 VMware/Network Engineer & Administrator or Admin

What are the layers of the OSI reference model and What is its job?

What are the layers of the OSI reference model and What is its job?

There are 7 OSI layers: 

1) Physical Layer, 

2) Data Link Layer, 

3) Network Layer, 

4) TransportLayer, 

5) Session Layer, 

6) Presentation Layer, and 

7) Application Layer.


The Network layer is responsible for data routing, packet switching, and control of network

congestion. Routers operate under this layer.


What are routers? 

Routers can connect two or more network segments. These are intelligent network devices that store information in their routing tables, such as paths, hops, and bottlenecks. With this info, they can determine the best path for data transfer. Routers operate at the OSI Network Layer.


What is a VPN? 

VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network such as the Internet. For example, VPNs allow you to establish a secure dial-up connection to a remote server.


Briefly describe NAT

NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share a single connection to the Internet. 


What are proxy servers, and how do they protect computer networks? 

Proxy servers primarily prevent external users who are identifying the IP addresses of an internal network. Without knowledge of the correct IP address, even the physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users.


How can you identify the IP class of a given IP address? 

By looking at the first octet of any given IP address, you can identify whether it’s Class A, B, or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with bits 10 then that address is a Class B address. If it begins with 110, then it’s a Class C network.


What is the disadvantage of a star topology? 

One major disadvantage of star topology is that once the central Hub or switch gets damaged, the entire network becomes unusable.


What is the main job of the ARP? 

The main task of the ARP or Address Resolution Protocol is to map a known IP address to a MAC layer address.


What protocol can be applied when you want to transfer files between different platforms, such as UNIX systems and Windows servers? 

Use FTP (File Transfer Protocol) for file transfers between such different servers. This is possible because FTP is platform-independent


What is ICMP? 

ICMP is an Internet Control Message Protocol. It provides messaging and communication for protocols within the TCP/IP stack. This is also the protocol that manages error messages that are used by network tools such as PING


What is SMTP? 

SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all internal mail and provides the necessary mail delivery services on the TCP/IP protocol stack.


What is one basic requirement for establishing VLANs? 

A VLAN is required because at the switch level. There is only one broadcast domain. It means whenever a new user is connected to switch. This information is spread throughout the network. VLAN on switch helps to create a separate broadcast domain at the switch level. It is used for security purposes.


What are the different types of VPN?

 Access VPN: Access VPN is used to provide connectivity to remote mobile users and telecommuters. It serves as an alternative to dial-up connections or ISDN (Integrated Services Digital Network) connections. It is a low-cost solution and provides a wide range of connectivity. 

Site-to-Site VPN: A Site-to-Site or Router-to-Router VPN is commonly used in large companies having branches in different locations to connect the network of one office to another in different locations. There are 2 sub-categories as mentioned below:  

Intranet VPN: Intranet VPN is useful for connecting remote offices in different geographical locations using shared infrastructure (internet connectivity and servers) with the same accessibility policies as a private WAN (wide area network). 

Extranet VPN: Extranet VPN uses shared infrastructure over an intranet, suppliers, customers, partners, and other entities and connects them using dedicated connections.


Topology: All the nodes are connected using the central link known as the bus. It is useful to connect a smaller number of devices. If the main cable gets damaged, it will damage the whole network.

Star Topology: All the nodes are connected to one single node known as the central node. It is more robust. If the central node fails the complete network is damaged. Easy to troubleshoot. Mainly used in home and office networks.

Ring Topology: Each node is connected to exactly two nodes forming a ring structure. If one of the nodes are damaged, it will damage the whole network. It is used very rarely as it is expensive and hard to install and manage.

Mesh Topology: Each node is connected to one or many nodes. It is robust as failure in one link only disconnects that node. It is rarely used and installation and management are difficult.

Tree Topology: A combination of star and bus topology also know as an extended bus topology. All the smaller star networks are connected to a single bus. If the main bus fails, the whole network is damaged.

Hybrid: It is a combination of different topologies to form a new topology. It helps to ignore the drawback of a particular topology and helps to pick the strengths from other.


What are Unicasting, Anycasting, Multicasting and Broadcasting?

Unicasting: If the message is sent to a single node from the source then it is known as unicasting. This is commonly used in networks to establish a new connection.

Anycasting: If the message is sent to any of the nodes from the source then it is known as anycasting. It is mainly used to get the content from any of the servers in the Content Delivery System. 

Multicasting: If the message is sent to a subset of nodes from the source then it is known as multicasting. Used to send the same data to multiple receivers.

Broadcasting: If the message is sent to all the nodes in a network from a source then it is known as broadcasting. DHCP and ARP in the local network use broadcasting.


What happens when you enter google.com in the web browser?

If not, the browser checks if the IP of the URL is present in the cache (browser and OS) if not then request the OS to do a DNS lookup using UDP to get the corresponding IP address of the URL from the DNS server to establish a new TCP connection.

A new TCP connection is set between the browser and the server using three-way handshaking.

An HTTP request is sent to the server using the TCP connection.

The web servers running on the Servers handle the incoming HTTP request and send the HTTP response.

The browser process the HTTP response sent by the server and may close the TCP connection or reuse the same for future requests.

If the response data is cacheable then browsers cache the same. • Browser decodes the response and renders the conten


What is SNMP architecture? 

SNMP has a simple architecture based on a client-server model.

The servers, called managers, collect and process information about devices on the network.

The clients, called agents, are any type of device or device component connected to the network. They can include not just computers, but also network switches, phones, printers, and so on.


What are the different memories used in a CISCO router?

NVRAM: stores the startup configuration file.

DRAM: stores the configuration file that is being executed.

ROM It is the bootstrap software that runs and maintains instructions for POST diagnostics.

Flash Memory: stores the Cisco IOS.


Differentiate User Mode from Privileged Mode 

User Mode is used for regular task when using a CISCO router, such as to view system information, connecting to remote devices, and checking the status of the router. On the other hand, privileged mode includes all options that are available for User Mode, plus more. You can use this mode in order to make configurations on the router, including making tests and debugging.


Differentiate full-duplex from half-duplex.

 In full-duplex, both the transmitting device and the receiving device can communicate simultaneously, that is, both can be transmitting and receiving at the same time. In the case of half-duplex, a device cannot receive while it is transmitting, and vice versa.


In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM? 

erase startup-config


What Is The Location Of The Active Directory Database? 

C:windows\Ntds\Ntds.dit.


Name the default protocol used in directory services? 

LDAP (Lightweight Directory Access Protocol).


Explain Emulation Drivers? 

The emulation drivers are mainly devices that imitate another program. In simple terms, emulation drivers are a trick to fool the device that it is some other sort of a device.


What Are Synthetic Drivers? 

Synthetic drives are different and better than the emulation ones in their functions. They don’t imitate another program but, create another hardware complex device on a virtual platform.


What Is Desktop Virtualization? 


Desktop virtualization is a logical procedure to isolate and extract the OS or system from the client that is ready to access it. There are many types of desktop virtualizations some of which include virtual machines while some do not

What Is Dac? 

Microsoft Dynamic Access Control or DAC is a data governance tool in Windows Server 2012 that allows administrators control access settings. It uses centralized policies to permit administrators to review who has access to individual files. Files can be classified manually or automatically.

Define SYSVOL? 

The SysVOL file keeps the server’s copy of the domain’s public files. The fillings such as users, group policy.

What is Kerberos? 

Kerberos is a verification protocol for the network. It is built to present secure verification for client applications by using secret-key cryptography.

What do you mean by organizational units? 

The Organizational Unit is a serious design factor impacting policy, security, competence and the charge of administration. Organizational Units are a kind of LDAP (X.500) pot. It can be a reflection of as a sub-domain element with comparable properties to domains.

What do you mean by Active Directory Recycle Bin? 

Active Directory Recycle bin is a characteristic of Windows Server 2008 AD. It helps to re-establish by chance deleted Active Directory objects without using a backed-up AD database, rebooting area controller.

Do we use clustering in Active Directory? …. Why? 

No one installs Active Directory in a bunch. There is no need for clustering a field controller. Active Directory provides total joblessness with two or more servers.

What is child DC?

Child DC is a sub-area controller under the root domain controller which share a namespace.

Tell me the port no of LDAP?

 The port no of LDAP is 389

If I try to look schema, how can I do that?

 c:\windows\system32>regsvr32 schmmgmt.dll
Open mmc --> add snapin --> add Active directory schema
name it as schema.msc Open administrative tool --> schema.msc

Define Native Mode? 


When all domain controllers in a given area are consecutively Windows 2000 Server, this way permits organizations to take the lead of new Active Directory features such as worldwide groups, inter-domain group membership and nested group membership.

What is VMware and what are their benefits? 

VMware provides different applications and software for virtualization. VMware products are categorized into two levels, desktop applications, and Server applications. It is useful for: • Running multiple operating systems and applications on a single computer • Consolidate hardware to get vastly higher productivity from fewer servers • Save more of total cost spend on IT • It simplifies IT management and speeds up the deployment of new applications

Explain what is hypervisor 


A hypervisor is a program that enables multiple operating systems to share a single hardware host. Each operating system has the host’s processor, memory and other resources all to itself. The hypervisor controls the resources and host processor, allocating what is required for each operating system in turn and make sure that the guest operating system cannot disrupt each other.

Explain VMware DRS? 

VMware DRS stands for Distributed Resource Scheduler; it dynamically balances resources across various host under a cluster or resource pool. It enables users to determine the rules and
policies which decide how virtual machines deploy resources, and these resources should be prioritized to multiple virtual machines

What are the storage and availability in vCloud Suite? 

Storage DRS:It place and load balance virtual machines based on storage capacity and I/O latency
Storage vMotion:It employs proactive, non-disruptive storage migration to reduce virtual machine storage I/O bottlenecks and free up valuable storage capacity 
Application HA:It gains high availability that is bound to specific applications
Data Protection: Based on EMC avamar, it deploys a back-up and recovery tool

What is the difference between VMware HA and Vmware FT? 


VMware FT is enabled per VM basis while VMware is enabled per cluster 

In the case of ESX host failure, virtual machines are the failed host and are re-started and powered-on the other active hosts in HA cluster. But FT-enabled virtual machines; there is no downtime. In the case of a host failure, the secondary VM will be activated, and it becomes primary and continue to run from the exact point where the primary VM is failed or left off.

What is Fault Tolerant Logging? 

The communication between two ESXI host is known as Fault logging when FT is configured between them.

Explain vSS 

vSS stands for Virtual Standard Switch is responsible for communication of VMs hosted on a single physical host. It automatically detects a VM which wants to communicate with other VM on the same physical server

What are pluggable devices which can be added while Virtual Machine is running? 

You can add HDDs and NIC while Virtual Machine is running.

What is Cold and Hot Migration? 

When you migrate powered off or suspended, it is known as cold migration. When you migrate your running power on virtual machines, it is known as hot migration.

Explain the importance of snapshot in VMWare

A VMWare snapshot is a copy of a virtual machine disk file which is used to restore a VM to a specific point in time when the system fails, or system error occurs.

Explain Cluster in VMware 

Cluster in VMware is a logical grouping of multi ESXi hosts. It allows you to add or delete the host from the cluster. It also provides a feature like HA, DRS, on the cluster.

Disadvantages of the VMware virtualization platform

It requires a considerable investment to buy the resources
High-end server needs which increase the cost. 
Different technologies are required for its implementation

Can we do vMotion between two data centers? 

Yes, we can do vMotion between two datacenters. However, for this VM should be powered off.

What is RDM? 

RDM is a sort form of Raw Device Mapping. It is a file stored in VMFS volume which acts as a proxy for a raw physical device. It allows you to store virtual machine data directly on LUN.

What is NFS? 

NFS is a Network file system. It is a file sharing protocol which ESXI host used to communicate with the NAS device. It is a specialized store device which connects to a network.

What is VMKernel? 

Why is it important? The VMkernel is the interface between virtual machines (VMs) and the physical hardware of the system. The responsibility of VMkernel is to scheduling CPUs, allocating memory and providing other hardware abstraction with other operating system (OS) services.

How can I differentiate between virtual machine port groups and VMkernel ports? 

The big difference between a Virtual Machine port group and a VMkernel port group is the sort of traffic it’s passing. As you’ll see, a VMkernel port is passing traffic specific to VMware vSphere. A virtual machine port group is simply passing your garden variety virtual machine traffic.

How does vMotion work in the background? 

The Virtual Machine Memory state is copied over the Vmotion Network from the source Host to the Target Host. users still access the virtual machine and potentially update pages in memory. A list of modified pages in memory is kept during a memory Bitmap on the source Host.

What happens if VMotion fails? 

VMotion will fail if the target host does not have enough memory to satisfy the reservation of the virtual machine. If you want to fix this, migrate the virtual machine to another ESXi host that can provide the guaranteed memory for the VM or reduce the memory reservation of the virtual machine.

What’s iSCSI in VMware? 

iSCSI may be a protocol which uses the TCP to move SCSI commands and also enables the utilization of the prevailing TCP/IP networking infrastructure as a cargo area Network.

What’s the difference between FC and FCoE? 

FCOE maps Fiber Channel over full duplex Ethernet networks based on IEEE 802.3 standard. and therefore the other hand, Fiber Channel or FC may be a serial data transfer protocol and standard for high-speed enterprise-grade storage networking. It accelerates to 128 Gbps and delivers storage data over fast optical networks.

What’s the utilization of snapshots in VMware? 

The VMware snapshot is used to preserve the state and data of the Virtual machine at the present point in time so once you are done testing, you’ll quickly revert the VM back to a desired state. In VMware, VMware snapshots are easy and quick thanks to saving the state of a virtual machine before you test a software update, patch or other change.

What’s the complete sort of LUN? 

LUN stands for Logical Unit Number.

What’s the difference between RDM and VMDK? 

RDM is additionally referred to as a pass-through disk, and may be a mapping file that acts as a proxy for a physical device like a LUN. On the opposite side VMDK may be a file that appears as a tough drive to the guest OS . Fundamentally it’s a virtual disk drive.

What’s the difference between SAN and vSAN? 

SAN leverages storage protocols like FCP and iSCSI while vSAN only works with ESXi hosts. Within the case of SAN, storage administrators are required to pre-allocate storage on different systems although vSAN automatically converts local storage resources into one storage pool.

What’s a vSphere client?

The vSphere Client is an application software that permits management of a vSphere installation. The vSphere Client provides an administrator with access to the key functions of vSphere without the necessity to access a vSphere server directly.

What’s the max number of virtual machines per host? 

Maximum number of virtual machines per host is 100

What are the 2 reasons why a virtual machine might fail to power on? 

The virtual machine is running on an ESXi host which has an expired license. 
The virtual machine is running on a data-store which has insufficient disc space for the .vswp file.

What’s the utilization of vCenter server? 

vCenter is employed to manage multiple ESXi hosts, virtual machines and every one dependent component from one centralized location.

What are the services in vCenter server? 

The vCenter Server services are vCenter Server, vSphere Web Client, Inventory Service, vSphere Auto Deploy, vSphere ESXi Dump Collector, VMware vSphere Syslog Collector on Windows and VMware Sphere Syslog Service for the vCenter Server Appliance.
Share:

Wednesday, January 26, 2022

Which of the following is a text based e-mail client for Unix

Which of the following is a text based e-mail client for Unix

  • goat
  • moo
  • puss
  • mutt      
Which of the following is a text based e-mail client for Unix


EXPLANATION

Mutt is a text-based email client for Unix-like systems. It was originally written by Michael Elkins in 1995 and released under the GNU General Public License version 2 or any later version

The Mutt slogan is "All mail clients suck. This one just sucks less."

www.mutt.org 



SOURCE

http://www.mutt.org/         
Share:

Thursday, December 2, 2021

At what layer of the OSI model does IPsec operate?

At what layer of the OSI model does IPsec operate?

  • Network
  • Data Link
  • Transport
  • Session 
At what layer of the OSI model does IPsec operate?

EXPLANATION

Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications that works by authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host).[1] Internet Protocol security (IPsec) uses cryptographic security services to protect communications over Internet Protocol (IP) networks. IPsec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection.

SOURCE

https://en.wikipedia.org/wiki/IPsec

 
Share:

Wednesday, October 6, 2021

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?

  • 180 days
  • 30 days
  • 6 months
  • 24 hours  

Which of the following is a default value for the tombstone lifetime for a new Active Directory forest?


EXPLANATION

Tombstone lifetime is the amount of time a deleted directory object remains in storage before it is permanently deleted.  This value is unique in the forest.

For new Active Directory forests, the default Tombstone Lifetime (TSL) is 180 days.

While some may point out that the default value can be 60 days, this only is true for existing forests whose original forest root Domain Controller was created while running Windows Server 2003 R2 SP1 or earlier operating systems.  Certainly, at the time of this writing, nobody would be creating a new forest using Windows Server 2003 R2 SP1.


SOURCE

Share:

Monday, September 27, 2021

When two systems first connect using SSH they exchange their....

When two systems first connect using SSH they exchange their....

  • Public key
  • Private key
  • Passphase
  • Password      

When two systems first connect using SSH they exchange their....


EXPLANATION

When two systems first connect using SSH they exchange their public keys with each other.

SOURCE

Share:

Friday, September 3, 2021

Which target attribute is used with links to force the web browser to open the link in a new tab or window?

Which target attribute is used with links to force the web browser to open the link in a new tab or window?

  • _new
  • _reload
  • _top
  • _blank               
Which target attribute is used with links to force the web browser to open the link in a new tab or window?


EXPLANATION

The target attribute specifies where the linked document will open when the link is clicked. The default is the current window. If target="_blank", the linked document will open in a new tab or (on older browsers) a new window.  

Share:

Popular Posts