Wednesday, April 17, 2019
Which protocol is most reliable?
Which protocol is most reliable?
- DHCP
- UDP
- IP
- TCP
EXPLANATION
TCP is considered to be the most reliable connection. Both the sender and client check the connection and trust before making data transmission. UDP is not reliable. It does not authorize and check the connection.UDP provides an unreliable connection. It does not authorize peer and not even check the connection before sending the data.
What windows command will clear the client DNS buffer?
What windows command will clear the client DNS buffer?
- nslookup -A -clear
- cleardns /all
- ipconfig /flushdns
- NetWare --reset
EXPLANATION
If this for a DNS server, use the command "dnscmd" with options.
eg: dnscmd dnssvr1.contoso.com /clearcache
To clear DNS Cache in client, do the following:
1. Start
2. Run
3. Type "cmd" and press enter
4. In the command window type "ipconfige /flushdns"
5.a If done correctly it should say "Successfully flushed the DNS Resolver Cache."
5.b If you receive an error "Could not flush the
DNS Resolver Cache: Function failed during execution.", follow the
Microsoft KB Article 919746 to enable the cache. The cache will be
empty; however, this will allow successful cache-flush in future.
How to enable kerberos authentication type for live migration in hyper-v by using Powershell cmdlet ?
How to enable kerberos authentication type for live migration in hyper-v by using Powershell cmdlet ?
- set-vmhost -authenticatiuontype kerberos
- install-vmhost -virtualmachinemigrationauthenticatiuontype kerberos
- set-vmhost -virtualmachinemigrationauthenticatiuon type kerberos
- install-vmhost -authenticatiuontype kerberos
EXPLANATION
Use Windows PowerShell to set up the source and destination computers for live migration
Three cmdlets are available for configuring live migration on non-clustered hosts: Enable-VMMigration, Set-VMMigrationNetwork, and Set-VMHost. This example uses all three and does the following:- Configures live migration on the local host
- Allows incoming migration traffic only on a specific network
- Chooses Kerberos as the authentication protocol
PS C:\> Enable-VMMigration
PS C:\> Set-VMMigrationNetwork 192.168.10.1
PS C:\> Set-VMHost -VirtualMachineMigrationAuthenticationType Kerberos
SOURCE
https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/set-up-hosts-for-live-migration-without-failover-clustering
Which of these Email protocoles is known to be linked to the Autodiscover Service?
- OWA
- POP3
- MAPI
- IMAP
EXPLANATION
Messaging Application Programming Interface is a messaging architecture and a Component Object Model based API for Microsoft Windows. MAPI allows client programs to become messaging-enabled, -aware, or -based by calling MAPI subsystem routines that interface with certain messaging servers.
https://docs.microsoft.com/en-us/Exchange/architecture/client-access/autodiscover?view=exchserver-2019
Which of the following mnemonicss can be used to remember the order of the OSI layer levels ?
Which of the following mnemonicss can
be used to remember the order of the OSI layer levels ?
- Please Don't Say Anything No Talking Period.
- Please Do Not Throw Sausage Pizza Away
- Not All People Pretend Talk Scooby Doo
- Don't Stick Apple Pips To Peoples Noses
EXPLANATION
Application Set
- Layer 7: Application - This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities.
- Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.
- Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.
Transport Set
- Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application's data into a single stream for the physical network.
- Layer 3: Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here.
- Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined.
- Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing.
SOURCE
https://computer.howstuffworks.com/osi1.htm
What TCP port is SFTP or Secure File Transfer Protocol commonly used on?
What TCP port is SFTP or Secure File Transfer Protocol commonly used on?
- 22
- 21
- 7777
- 69
EXPLANATION
Secure File Transfer Protocol is commonly placed on 22 as it is also known as File Transfer Protocol on SSH. Not to be confused with File Transfer Protocol over TLS/SSL or FTPS, as there are no answers for ports 989 or 990.For more information, see:
https://support.apple.com/en-us/HT202944
https://www.infobyip.com/tcpportchecker.php
