IT Questions and Answers :)

Thursday, November 23, 2017

Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

  • Admission tolerance control
  • Admission control
  • Fault tolerance
  • Startup control 

 
Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

EXPLANATION




vCenter Server uses Admission Control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. It can be set at the Host, Resource Pool, or Cluster Level (known as vSphere HA Admission Control). 
Read more here: https://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.vsphere.avail.doc_50%2FGUID-53F6938...

Share:

What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

  • 8GB
  • 16GB
  • 4GB
  • 32GB 

 What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

EXPLANATION

The maximum possible size for a file on a FAT32 volume is 4 GB minus 1 byte or 4,294,967,295 (232 − 1) bytes. This limit is a consequence of the file length entry in the directory table and would also affect huge FAT16 partitions with a sufficient sector size.[1] Large video files, DVD images and databases easily exceed this limit.
https://en.wikipedia.org/wiki/File_Allocation_Table
Share:

With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

  • MPLS
  • ICMP
  • PPP
  • LACP 

 
With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

EXPLANATION

MPLS is a scalable, protocol-independent transport. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol. The primary benefit is to eliminate dependence on a particular OSI model data link layer (layer 2) technology, such as Asynchronous Transfer Mode (ATM), Frame Relay, Synchronous Optical Networking (SONET) or Ethernet, and eliminate the need for multiple layer-2 networks to satisfy different types of traffic. MPLS belongs to the family of packet-switched networks.
MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.

SOURCE

http://it.toolbox.com/blogs/intruder-detection/mpls-and-the-osi-reference-model-where-does-mpls-fit-in-50920
Share:

What voltages should the two hot wires on a Molex connector read?

What voltages should the two hot wires on a Molex connector read?

  • Red = 5 V; Yellow = 3.3 V
  • Red = 5 V; Yellow = 12 V
  • Red - 12 V; Yellow = 5 V
  • Red = 3.3 V; Yellow = 5 V 

 
What voltages should the two hot wires on a Molex connector read?

EXPLANATION

A Molex connector's red wire should be at 5 volts. The yellow wire should be at 12 volts.

Share:

What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

  • Sh u
  • Tell router update config
  • Sh Tasks
  • fixup -t 

 
What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

EXPLANATION

The above console command allows on the fly restart of all services and processes in Lotus domino. Negating the requirement to even restart the hardware box.

Share:

Using VIM, what is the find\replace function for replacing the word 'hot' with 'cold' in an entire document?

Using VIM, what is the find\replace function for replacing the word 'hot' with 'cold' in an entire document?

  • :s/hot/cold/g
  • :%s/hot/cold/g
  • :qw! hot\cold
  • :w!/hot/cold%s 
Using VIM, what is the find\replace function for replacing the word 'hot' with 'cold' in an entire document?

 EXPLANATION

Vim provides the :s (substitute) command for search and replace.  The :substitute command searches for a text pattern, and replaces it with a text string. There are many options, but these are what you probably want:
:%s/foo/bar/g
Find each occurrence of 'foo' (in all lines), and replace it with 'bar'.
:s/foo/bar/g
Find each occurrence of 'foo' (in the current line only), and replace it with 'bar'.
:%s/foo/bar/gc
Change each 'foo' to 'bar', but ask for confirmation first.
:%s/\<foo\>/bar/gc
Change only whole words exactly matching 'foo' to 'bar'; ask for confirmation.

SOURCE

http://vim.wikia.com/wiki/Search_and_replace
Share:

In the Information Security Management Maturity Model (ISM3) what Specific Practice: Operational Management is OSP-17?

In the Information Security Management Maturity Model (ISM3) what Specific Practice: Operational Management is OSP-17?

  • Environment Hardening
  • Access Control
  • User Registration
  • Malware Protection Management 
In the Information Security Management Maturity Model (ISM3) what Specific Practice: Operational Management is OSP-17?

 

EXPLANATION

The Information Security Management Maturity Model (ISM3, or ISM-cubed) extends ISO9001 quality management principles to information security management (ISM) systems. Rather than focusing on controls, it focuses on the common processes of information security, which are shared to some extent by all organisations. (http://isms-guide.blogspot.com/2007/07/what-is-ism3.html)
OSP-17 is the Specific Practice: Operational Management (Specific Practices are the breakdown of the ISM3 systems) So this refers to the 17th Operational Management system.
Operational Management 17 - This is a set of security measures to provide protection against technical threats such as viruses, spyware, trojans, backdoors, keyloggers, rootkits and other unauthorized services.
Incidents relating to the infection of internal assets with Malware can be prevented and mitigated by an appropriate Malware protection process.

SOURCE

https://www.lean.org/FuseTalk/Forum/Attachments/ISM3_v2.00-HandBook.pdf
Share:

Popular Posts