IT Questions and Answers :)

Wednesday, April 17, 2019

Which protocol is most reliable?

Which protocol is most reliable?

  • DHCP
  • UDP
  • IP
  • TCP
 
Which protocol is most reliable?

EXPLANATION

TCP is considered to be the most reliable connection. Both the sender and client check the connection and trust before making data transmission. UDP is not reliable. It does not authorize and check the connection.
UDP provides an unreliable connection. It does not authorize peer and not even check the connection before sending the data.

Share:

What windows command will clear the client DNS buffer?

What windows command will clear the client DNS buffer?

  • nslookup -A -clear
  • cleardns /all
  • ipconfig /flushdns
  • NetWare --reset 
What windows command will clear the client DNS buffer?

EXPLANATION


If this for a DNS server, use the command "dnscmd" with options.
eg: dnscmd dnssvr1.contoso.com /clearcache
To clear DNS Cache in client, do the following: 
1. Start
2. Run
3. Type "cmd" and press enter
4. In the command window type "ipconfige /flushdns"
5.a If done correctly it should say "Successfully flushed the DNS Resolver Cache."
5.b If you receive an error "Could not flush the DNS Resolver Cache: Function failed during execution.", follow the Microsoft KB Article 919746 to enable the cache. The cache will be empty; however, this will allow successful cache-flush in future. 



Share:

How to enable kerberos authentication type for live migration in hyper-v by using Powershell cmdlet ?

How to enable kerberos authentication type for live migration in hyper-v by using Powershell cmdlet ?

  • set-vmhost -authenticatiuontype kerberos
  • install-vmhost -virtualmachinemigrationauthenticatiuontype kerberos
  • set-vmhost -virtualmachinemigrationauthenticatiuon type kerberos
  • install-vmhost -authenticatiuontype kerberos

How to enable kerberos authentication type for live migration in hyper-v by using Powershell cmdlet ?

EXPLANATION

Use Windows PowerShell to set up the source and destination computers for live migration

Three cmdlets are available for configuring live migration on non-clustered hosts: Enable-VMMigration, Set-VMMigrationNetwork, and Set-VMHost. This example uses all three and does the following:
  • Configures live migration on the local host
  • Allows incoming migration traffic only on a specific network
  • Chooses Kerberos as the authentication protocol
Each line represents a separate command.


PS C:\> Enable-VMMigration  

PS C:\> Set-VMMigrationNetwork 192.168.10.1  

PS C:\> Set-VMHost -VirtualMachineMigrationAuthenticationType Kerberos 
 

SOURCE

https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/deploy/set-up-hosts-for-live-migration-without-failover-clustering

 
Share:

Which of these Email protocoles is known to be linked to the Autodiscover Service?

 Which of these Email protocoles is known to be linked to the Autodiscover Service?
  •     OWA
  •     POP3
  •     MAPI
  •     IMAP

Which of these Email protocoles is known to be linked to the Autodiscover Service?


EXPLANATION

Client connectivity in Exchange 2016 and Exchange 2019 is like Exchange 2013 and differs from Exchange 2010. In Exchange 2016 and 2019, MAPI over HTTP is enabled by default, when previously Outlook clients used Outlook Anywhere (RPC over HTTP). Exchange 2016 and 2019 require fewer name spaces for site-resilient solutions than Exchange 2010, reducing to two from the previously required seven namespaces. To read more about namespace and Exchange Server, see the blog Namespace Planning in Exchange 2016.


Messaging Application Programming Interface is a messaging architecture and a Component Object Model based API for Microsoft Windows. MAPI allows client programs to become messaging-enabled, -aware, or -based by calling MAPI subsystem routines that interface with certain messaging servers.

SOURCE

https://docs.microsoft.com/en-us/Exchange/architecture/client-access/autodiscover?view=exchserver-2019
Share:

Which of the following mnemonicss can be used to remember the order of the OSI layer levels ?


Which of the following mnemonicss can be used to remember the order of the OSI layer levels ?
  • Please Don't Say Anything No Talking Period.
  • Please Do Not Throw Sausage Pizza Away
  • Not All People Pretend Talk Scooby Doo
  • Don't Stick Apple Pips To Peoples Noses 

Which of the following mnemonicss can be used to remember the order of the OSI layer levels ?

EXPLANATION

Application Set

  • Layer 7: Application - This is the layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities.
  • Layer 6: Presentation - Layer 6 takes the data provided by the Application layer and converts it into a standard format that the other layers can understand.
  • Layer 5: Session - Layer 5 establishes, maintains and ends communication with the receiving device.

Transport Set

  • Layer 4: Transport - This layer maintains flow control of data and provides for error checking and recovery of data between the devices. Flow control means that the Transport layer looks to see if data is coming from more than one application and integrates each application's data into a single stream for the physical network.
  • Layer 3: Network - The way that the data will be sent to the recipient device is determined in this layer. Logical protocols, routing and addressing are handled here.
  • Layer 2: Data - In this layer, the appropriate physical protocol is assigned to the data. Also, the type of network and the packet sequencing is defined.
  • Layer 1: Physical - This is the level of the actual hardware. It defines the physical characteristics of the network such as connections, voltage levels and timing.



SOURCE

https://computer.howstuffworks.com/osi1.htm
Share:

What TCP port is SFTP or Secure File Transfer Protocol commonly used on?

What TCP port is SFTP or Secure File Transfer Protocol commonly used on?

  • 22
  • 21
  • 7777
  • 69 

 
What TCP port is SFTP or Secure File Transfer Protocol commonly used on?

EXPLANATION

Secure File Transfer Protocol is commonly placed on 22 as it is also known as File Transfer Protocol on SSH. Not to be confused with File Transfer Protocol over TLS/SSL or FTPS, as there are no answers for ports 989 or 990.
 For more information, see:
https://support.apple.com/en-us/HT202944
https://www.infobyip.com/tcpportchecker.php
Share:

Tuesday, April 16, 2019

In Windows Server, which command line command can you use to determine your logon server?

In Windows Server, which command line command can you use to determine your logon server?

  • ipconfig /logonserver
  • find /logon_server
  • echo %logonserver%
  • echo %logon_server% 
In Windows Server, which command line command can you use to determine your logon server?

EXPLANATION

the DC you use as the logonserver may be one of several in the domain. Your PC will determine the “best” DC to use based on how your AD sites are setup.
If you are in a situation where you need to discover which DC the PC you're using has used to logon you can do this using the echo %logonserver% cmd.

Share:

Popular Posts