IT Questions and Answers :)

Thursday, January 10, 2019

In Attribute Editor what should attribute "msExchRecipient TypeDetails" value be set to for a RemoteSharedMailbox?

In Attribute Editor what should attribute "msExchRecipient TypeDetails" value be set to for a RemoteSharedMailbox?

  • 4
  • 34359738368
  • 1
  • 2147483648 
In Attribute Editor what should attribute "msExchRecipient TypeDetails" value be set to for a RemoteSharedMailbox?

EXPLANATION

Many administrators need to convert regular User Mailboxes to a Shared Mailbox after migration to Office 365. In a Hybrid environment these need to be converted to Remote Shared Mailboxes. Converting a User mailbox to a Shared mailbox in Exchange Online is easy enough, however this does not replicate to Exchange on prem, this can be done by editing
the Attribute value for "msExchRecipient TypeDetail" in Active Directory.  RemoteSharedMailbox attribute value is 34359738368, UserMailbox is 1, SharedMailbox is 4 and RemoteUserMailbox is 2147483648.

SOURCE

https://answers.microsoft.com/en-us/msoffice/forum/msoffice_o365admin-mso_exchon-mso_o365b/recipient-type-values/7c2620e5-9870-48ba-b5c2-7772c739c651

 

Share:

Database concurrency control is important for which of the following scenarios?

Database concurrency control is important for which of the following scenarios?

  • Maintaining read integrity with multiple users
  • Maintaining integrity in a single-user environment
  • Maintaining integrity in a multi-user environment
  • Maintaining read integrity in a 1-user environment 

 
Database concurrency control is important for which of the following scenarios?

EXPLANATION

Concurrency control is a process which allows multiple people to access a shared resource, which in this case is a database. There are several different strategies when it comes to configuring your database to prevent data corruption when multiple users are accessing it at the same time that are all called concurrency controls.


Aaron W Originally Copied From

Concurrency control is important for which of the following reasons?
A.To ensure data integrity when updates occur to the database in a multiuser environment
B.To ensure data integrity when updates occur to the database in a single-user environment
C.To ensure data integrity while reading data occurs to the database in a multiuser environment
D.To ensure data integrity while reading data occurs to the database in a single-user environment


Share:

Friday, January 4, 2019

In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

  • Hub Transport Server role
  • Unified Messaging Server role
  • Edge Transport Server role
  • Mailbox Server role 
In Microsoft Exchange, which role, introduced in the 2007 release, performs anti-spam filtering and applies messaging and security policies to messages?

EXPLANATION

Deployed in a perimiter network, the Edge Transport Server role provides message protection and security. This protection is handled by various agents running on the Edge Transport
Server and act on email messages as they are processed.

Edge Transport Server Role – Edge Transport Server Roles sits at the edge of the network and it has to be installed on a standalone server. It performs a number of functions including Anti-spam and Anti-virus protection. The Edge Transport uses connection filtering, content filtering, recipient filtering, SenderID, sender and IP reputation to reduce the amount of Spam delivered to the end users inbox

SOURCE

https://technet.microsoft.com/en-us/library/mt616515(v=exchg.150).aspx
Share:

Monday, December 31, 2018

AES Encryption uses which cipher?

AES Encryption uses which cipher?

  • RC6
  • Serpent
  • Rijndael
  • Twofish 

 
AES Encryption uses which cipher?

EXPLANATION

AES (Advanced Encryption Standard) is a NIST standard for encryption using the Rijndael cipher.
The cipher selected for AES was determined through an open call for new algorithms in 1997. The finalists for selection were Rijndael, Serpent, Twofish, RC6, and MARS, with Rijndael being the winning algorithm.
Share:

Friday, December 14, 2018

What command would you use to create a row in SQL?

What command would you use to create a row in SQL?

  • INSERT
  • MAKE
  • ADD
  • CREATE 

 
What command would you use to create a row in SQL?

EXPLANATION

To create a row in a SQL database, you use the command INSERT.

If we want to insert a single row in a table emp.

Query:
insert into emp values(101,’hari’);

It will add a new row has employee id 101 and employee name ‘hari’ into th emp table.

Share:

In Windows, what do you get if you change the extension of an (unprotected) Excel file from .xlsx to .zip?

In Windows, what do you get if you change the extension of an (unprotected) Excel file from .xlsx to .zip?

  • A file that MS EXCEL cannot open
  • Nothing useful at all
  • A corrupt ZIP file
  • The original spreadsheet as a set of XML files within the ZIP 

In Windows, what do you get if you change the extension of an (unprotected) Excel file from .xlsx to .zip?

EXPLANATION

Since Office 2007 Microsoft has used Open XML to store non-password protected documents.  These are then combined into a single compressed file using
the  docx, xlsx, pptx, etc. extensions.   Even though the XML files are quite large, they compress very well.
Share:

Thursday, December 13, 2018

Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier environment?

Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier environment?

  • NoSQL databases are not vulnerable to SQL injection attacks.
  • NoSQL databases perform faster than SQL databases on the same hardware.
  • NoSQL databases encrypt sensitive information by default.
  • NoSQL databases are not vulnerable to XSRF attacks from the application server 

 
Which of the following is a security advantage of using NoSQL vs. SQL databases in a three-tier environment?

EXPLANATION

A NoSQL (originally referring to "non SQL" or "non relational")[1] database provides a mechanism for storage and retrieval 
of data that is modeled in means other than the tabular relations used in relational databases. Such databases have existed since the late 1960s, but did not obtain the "NoSQL" moniker until a surge of popularity in the early twenty-first century,[2] triggered by the needs of Web 2.0 companies such as Facebook, Google, and Amazon.com.[3][4][5] NoSQL databases are increasingly used in big data and real-time webapplications.[6] NoSQL systems are also sometimes called "Not only SQL" to emphasize that they may support SQL-like query languages.

SOURCE

https://en.wikipedia.org/wiki/NoSQL

Author Orginally copied from

http://webcache.googleusercontent.com/search?q=cache:KiyrP91akesJ:https://www.briefmenow.org/comptia/sql-databases-in-a-three-tier-environment-3/&hl=en&gl=us&strip=1&vwsrc=0



Share:

Popular Posts