IT Questions and Answers :)

Wednesday, April 17, 2019

What model do the terms, Session, Application Layer, Presentation Layer belong to?

What model do the terms, Session, Application Layer, Presentation Layer belong to?

  • SOI Model
  • Network and Connectivity Model
  • OSI Model
  • ISO Model 
What model do the terms, Session, Application Layer, Presentation Layer belong to?
 

EXPLANATION

  • Layer 7 - Application
  • Layer 6 - Presentation
  • Layer 5 - Session
  • Layer 4 - Transport
  • Layer 3 - Network
  • Layer 2 - Data Link
  • Layer 1 - Physical

 OSI network model, TCP/IP also has a network model. TCP/IP was on the path of development when the OSI standard was published and there was interaction between the designers of OSI and TCP/IP standards. The TCP/IP model is not same as OSI model.


OSI is a seven-layered standard, but TCP/IP is a four layered standard. The OSI model has been very influential in the growth and development of TCP/IP standard, and that is why much OSI terminology is applied to TCP/IP. The following figure compares the TCP/IP and OSI network models.


Share:

What tool can be used to identify listening ports and bindings?

What tool can be used to identify listening ports and bindings?

  • netstat
  • ntdsutil
  • nslookup
  • netsh 

 
What tool can be used to identify listening ports and bindings?

EXPLANATION

 netstat In computing, netstat is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics

ntdsutil is used to transfer FSMO roles.


nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System to obtain domain name or IP address mapping or for any other specific DNS record.

 In computing, netsh, or network shell, is a command-line utility included in Microsoft's Windows NT line of operating systems beginning with Windows 2000. It allows local or remote configuration of network devices such as the interface.

 


Share:

On the Web, what is a "dark pattern"?

On the Web, what is a "dark pattern"?

  • A subtle way to manipulate the user.
  • Another name for "dark mode".
  • A pattern that reveals hacker activity.
  • A type of encryption algorithm. 

On the Web, what is a "dark pattern"?

EXPLANATION

Dark pattern In graphic and web design, a dark pattern is "a user interface that has been carefully crafted to trick users into doing things, such as buying insurance with their purchase or signing up for recurring bills." The neologism dark pattern was coined by Harry Brignull in August 2010 with the registration of darkpatterns.org, a "pattern library with the specific goal of naming and shaming deceptive user interfaces."

SOURCE

https://www.quora.com/What-are-some-subtle-ways-that-people-manipulate-each-other

Share:

How many attempts does it take to plug in a USB flash drive?

How many attempts does it take to plug in a USB flash drive?

  • 2
  • 3
  • 1

How many attempts does it take to plug in a USB flash drive?

EXPLANATION

No Explanation for this question if your good at computer no second attempt is required to plug the thumb drive.

 


Share:

Which protocol is most reliable?

Which protocol is most reliable?

  • DHCP
  • UDP
  • IP
  • TCP
 
Which protocol is most reliable?

EXPLANATION

TCP is considered to be the most reliable connection. Both the sender and client check the connection and trust before making data transmission. UDP is not reliable. It does not authorize and check the connection.
UDP provides an unreliable connection. It does not authorize peer and not even check the connection before sending the data.

Share:

What windows command will clear the client DNS buffer?

What windows command will clear the client DNS buffer?

  • nslookup -A -clear
  • cleardns /all
  • ipconfig /flushdns
  • NetWare --reset 
What windows command will clear the client DNS buffer?

EXPLANATION


If this for a DNS server, use the command "dnscmd" with options.
eg: dnscmd dnssvr1.contoso.com /clearcache
To clear DNS Cache in client, do the following: 
1. Start
2. Run
3. Type "cmd" and press enter
4. In the command window type "ipconfige /flushdns"
5.a If done correctly it should say "Successfully flushed the DNS Resolver Cache."
5.b If you receive an error "Could not flush the DNS Resolver Cache: Function failed during execution.", follow the Microsoft KB Article 919746 to enable the cache. The cache will be empty; however, this will allow successful cache-flush in future. 



Share:

How to enable kerberos authentication type for live migration in hyper-v by using Powershell cmdlet ?

How to enable kerberos authentication type for live migration in hyper-v by using Powershell cmdlet ?

  • set-vmhost -authenticatiuontype kerberos
  • install-vmhost -virtualmachinemigrationauthenticatiuontype kerberos
  • set-vmhost -virtualmachinemigrationauthenticatiuon type kerberos
  • install-vmhost -authenticatiuontype kerberos

How to enable kerberos authentication type for live migration in hyper-v by using Powershell cmdlet ?

EXPLANATION

Use Windows PowerShell to set up the source and destination computers for live migration

Three cmdlets are available for configuring live migration on non-clustered hosts: Enable-VMMigration, Set-VMMigrationNetwork, and Set-VMHost. This example uses all three and does the following:
  • Configures live migration on the local host
  • Allows incoming migration traffic only on a specific network
  • Chooses Kerberos as the authentication protocol
Each line represents a separate command.


PS C:\> Enable-VMMigration  

PS C:\> Set-VMMigrationNetwork 192.168.10.1  

PS C:\> Set-VMHost -VirtualMachineMigrationAuthenticationType Kerberos 
 

SOURCE

https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/set-up-hosts-for-live-migration-without-failover-clustering

 
Share:

Popular Posts