IT Questions and Answers :)

Tuesday, December 22, 2020

What is the Windows command line tool that allow you to add a driver package to the driver store?

What is the Windows command line tool that allow you to add a driver package to the driver store?

  • DrvUtil
  • PnPUtil
  • DrvStrUtil
  • AddD 

 
What is the Windows command line tool that allow you to add a driver package to the driver store?

EXPLANATION

PnPUtil (PnPUtil.exe) is a command line tool that lets an administrator perform the following actions on driver packages:

Adds a driver package to the driver store.

Installs a driver package on the computer.

Deletes a driver package from the driver store.

Enumerates the driver packages that are currently in the driver store. Only driver packages that are not in-box packages are listed. An in-box driver package is one which is included in the default installation of Windows or its service packs.


SOURCE

https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/pnputil

 

Share:

Friday, December 18, 2020

Which of the following is not a type of server software that is provided by VMware ?

Which of the following is not a type of server software that is provided by VMware ?

  • VMware ESXi Server
  • VMware ESX Server
  • VMware Server
  • VMware ESI Server 
 
 
Which of the following is not a type of server software that is provided by VMware ?

EXPLANATION

VMware provides three different types of server software

VMware ESX Server, VMware ESXi Server, VMware Server.  

SOURCE

https://www.searchvmware.techtarget.com/definition/VMware
Share:

Wednesday, December 16, 2020

You want to enable Remote Desktop (RDP) remotely on a Windows Client, which utility is correct?

You want to enable Remote Desktop (RDP) remotely on a Windows Client, which utility is correct?

  • ipconfig
  • Active Directory
  • Psexec (PStools)
  • ssh 
 
You want to enable Remote Desktop (RDP) remotely on a Windows Client, which utility is correct?

 

EXPLANATION

When you connect with PSexec, you can generate a command prompt and edit the registry to enable RDP.

1. psexec \\(IPadress or hostname) -u (domain\username) –p( password) cmd
example: psexec \\10.0.0.1 -u testdomain\Administrator -p password cmd
2.  reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /f /v fDenyTSConnections /T REG_DWORD /d 0
3.  shutdown –r –t 0

Share:

Friday, December 11, 2020

In Linux system, which command will print the file or folder permissions, in octal notation ?

In Linux system, which command will print the file or folder permissions, in octal notation ?

  • stat -c %a /your_file_path
  • ls -all /your_file_path
  • ls -ltr /your_file_path
  • ls -ll /your_file_path 

In Linux system, which command will print the file or folder permissions, in octal notation ?

 

EXPLANATION

If we want to view the file permissions or the folder permissions in octal notation (mean in numbers), the command will be:

linux@machine:~$ sudo stat -c %a <the file path>

Otherwise, any other command, will show us the file or the folder permissions in Letters mode.


SOURCE

https://www.linux.com/learn/understanding-linux-file-permissions

 

 

Share:

Wednesday, December 9, 2020

What CIDR Range is reserved for Network interconnectivity device benchmark testing?

What CIDR Range is reserved for Network interconnectivity device benchmark testing?

  • 14.0.0.0/8
  • 240.0.0.0/4
  • 223.255.255.0/24
  • 198.18.0.0/15 
 
What CIDR Range is reserved for Network interconnectivity device benchmark testing?


EXPLANATION

198.18.0.0/15 - This block has been allocated for use in benchmark tests of network interconnect devices. [RFC2544] explains that this range was assigned to minimize the chance of conflict in case a  testing device were to be accidentally connected to part of the Internet. Packets with source addresses from this range are not meant to be forwarded across the Internet. 


Special address blocks
Address block Address range Number of addresses Scope Description
0.0.0.0/8 0.0.0.0–0.255.255.255 16777216 Software Current network[3] (only valid as source address).
10.0.0.0/8 10.0.0.0–10.255.255.255 16777216 Private network Used for local communications within a private network.[4]
100.64.0.0/10 100.64.0.0–100.127.255.255 4194304 Private network Shared address space[5] for communications between a service provider and its subscribers when using a carrier-grade NAT.
127.0.0.0/8 127.0.0.0–127.255.255.255 16777216 Host Used for loopback addresses to the local host.[3]
169.254.0.0/16 169.254.0.0–169.254.255.255 65536 Subnet Used for link-local addresses[6] between two hosts on a single link when no IP address is otherwise specified, such as would have normally been retrieved from a DHCP server.
172.16.0.0/12 172.16.0.0–172.31.255.255 1048576 Private network Used for local communications within a private network.[4]
192.0.0.0/24 192.0.0.0–192.0.0.255 256 Private network IETF Protocol Assignments.[3]
192.0.2.0/24 192.0.2.0–192.0.2.255 256 Documentation Assigned as TEST-NET-1, documentation and examples.[7]
192.88.99.0/24 192.88.99.0–192.88.99.255 256 Internet Reserved.[8] Formerly used for IPv6 to IPv4 relay[9] (included IPv6 address block 2002::/16).
192.168.0.0/16 192.168.0.0–192.168.255.255 65536 Private network Used for local communications within a private network.[4]
198.18.0.0/15 198.18.0.0–198.19.255.255 131072 Private network Used for benchmark testing of inter-network communications between two separate subnets.[10]
198.51.100.0/24 198.51.100.0–198.51.100.255 256 Documentation Assigned as TEST-NET-2, documentation and examples.[7]
203.0.113.0/24 203.0.113.0–203.0.113.255 256 Documentation Assigned as TEST-NET-3, documentation and examples.[7]
224.0.0.0/4 224.0.0.0–239.255.255.255 268435456 Internet In use for IP multicast.[11] (Former Class D network).
240.0.0.0/4 240.0.0.0–255.255.255.254 268435455 Internet Reserved for future use.[12] (Former Class E network).
255.255.255.255/32 255.255.255.255 1 Subnet Reserved for the "limited broadcast" destination address.[3][13]

 

 

SOURCE

https://tools.ietf.org/html/rfc2544
 
Share:

Popular Posts