IT Questions and Answers :)

Friday, April 19, 2019

what protocol should be used to send a password securely

what protocol should be used to send a password securely
  • ftp
  • smtp
  • telnet
  • ssh   
    
what protocol should be used to send a password securely

 EXPLANATION


File Transfer Protocol
The File Transfer Protocol is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is on Port 21.

Secure Shell
Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users.Secure Shell (SSH) uses TCP port 22.

telnet 
Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. Wikipedia

simple mail transfer protocol
The Simple Mail Transfer Protocol is a communication protocol for electronic mail transmission. As an Internet standard, SMTP was first defined in 1982 by RFC 821, and updated in 2008 by RFC 5321 to Extended SMTP additions, which is the protocol variety in widespread use today. Wikipedia
Standard port: 25, 587, 465

Share:

Which of the following file replication methods is now used as a standard feature since Windows Vista and Windows Server 2008?

Which of the following file replication methods is now used as a standard feature since Windows Vista and Windows Server 2008?

  • fcopy
  • xcopy
  • Robocopy
  • Dfs 
Which of the following file replication methods is now used as a standard feature since Windows Vista and Windows Server 2008?

EXPLANATION

Distributed File System (DFS) is a set of client and server services that allow an organization using Microsoft Windows servers to organize many distributed SMB file shares into a distributed file system.
DFS has two components to its service: Location transparency (via the namespace component) and Redundancy (via the file replication component). Together, these components improve data availability in the case of failure or heavy load by allowing shares in multiple different locations to be logically grouped under one folder, the "DFS root".
Microsoft's DFS is referred to interchangeably as 'DFS' and 'Dfs' by Microsoft and is unrelated to the DCE Distributed File System, which held the 'DFS' trademark[1] but was discontinued in 2005.

Share:

In a Windows environment, which command should you use in order to show the last time your machine was rebooted?

n a Windows environment, which command should you use in order to show the last time your machine was rebooted?

  • systeminfo | find "System Boot Time"
  • net stats workstation
  • uptime
  • systeminfo | find "System Uptime" 
n a Windows environment, which command should you use in order to show the last time your machine was rebooted?

EXPLANATION

systeminfo command is almost right what you need. On English Windows 7 you can also do:
systeminfo | find /i "Boot Time"
Or with the help of WMIC:


wmic os get lastbootuptime
The main difference between Windows 7 and Windows XP that in Windows 7 Microsoft can show only last boot up time. 






Share:

What is the maxiumum distance for a CAT5E Cable?

What is the maxiumum distance for a CAT5E Cable?

  • 11 Meters
  • Infinite
  • 100 Meters
  • 30 Meters 
What is the maxiumum distance for a CAT5E Cable?

EXPLANATION

1000BASE-T (also known as IEEE 802.3ab) is a standard for gigabit Ethernet over copper wiring.

Each 1000BASE-T network segment can be a maximum length of 100 meters (328 feet), and must use Category 5 cable or better (including Cat 5e and Cat 6).

 The standards for Cat 5e and Cat 6 call for a maximum run length of 90 meters or 295 feet. While you may make a longer run and get it to work, this is not recommended. Even if problems don't show up immediately, they may come up later as your computers are upgraded to transmit faster or your network is expanded. If you must make a longer run, you can either put a signal repeater in the middle of the line or you can make your long run with fiber optic cable.
If your run is between 295 and 590 feet, the repeater option may be the best option for you. A switch or hub will act as a repeater. Make sure that you locate it in such a way that both runs on either side of the repeater are within the 90 meter standard. It won't do much good to split a 500 foot run into two runs of 100 and 400 feet.

If your run is longer than 590 feet or if most of the run is outside, fiber optic may be your best option. You'll need a media converter or fiber fed switch at each end of the fiber run to convert your network signals back and forth between electrical signals on copper and light pulses on fiber. If you are running fiber optic cable underground, you'll need to protect the delicate glass fibers inside the jacket by running it through a conduit or by using armored fiber optic cable.
Share:

What are the two most common distance-vector routing protocols?

What are the two most common distance-vector routing protocols?

  • RIP and BGP
  • IS-IS and BGP
  • BGP and IGRP
  • RIP and OSPF 
What are the two most common distance-vector routing protocols?


EXPLANATION

 Distance vector routing is so named because it involves two factors: the distance, or metric, of a destination, and the vector, or direction to take to get there. Routing information is only exchanged between directly connected neighbors. This means a router knows from which neighbor a route was learned, but it does not know where that neighbor learned the route; a router can't see beyond its own neighbors. This aspect of distance vector routing is sometimes referred to as "routing by rumor." Measures like split horizon and poison reverse are employed to avoid routing loops.

Link-state routing, in contrast, requires that all routers know about the paths reachable by all other routers in the network. Link-state information is flooded throughout the link-state domain (an area in OSPF or IS-IS) to ensure all routers posses a synchronized copy of the area's link-state database. From this common database, each router constructs its own relative shortest-path tree, with itself as the root, for all known routes.
http://packetlife.net/blog/2008/oct/2/distance-vector-versus-link-state/

Routing protocols can be classified into different groups according to their characteristics. Specifically, routing protocols can be classified by their:

Purpose: Interior Gateway Protocol (IGP) or Exterior Gateway Protocol (EGP)
Operation: Distance vector protocol, link-state protocol, or path-vector protocol
Behavior: Classful (legacy) or classless protocol
For example, IPv4 routing protocols are classified as follows:

RIPv1 (legacy): IGP, distance vector, classful protocol
IGRP (legacy): IGP, distance vector, classful protocol developed by Cisco (deprecated from 12.2 IOS and later)
RIPv2: IGP, distance vector, classless protocol
EIGRP: IGP, distance vector, classless protocol developed by Cisco
OSPF: IGP, link-state, classless protocol
IS-IS: IGP, link-state, classless protocol
BGP: EGP, path-vector, classless protocol
The classful routing protocols, RIPv1 and IGRP, are legacy protocols and are only used in older networks. These routing protocols have evolved into the classless routing protocols, RIPv2 and EIGRP, respectively. Link-state routing protocols are classless by nature.

 

Share:

Thursday, April 18, 2019

Which term is used to describe an organization's presence or account on Office 365

Which term is used to describe an organization's presence or account on Office 365

  • License
  • Account
  • Subscription
  • Tenant

Which term is used to describe an organization's presence or account on Office 365

EXPLANATION

Our tenant inside of Office 365 is going to represent, well, sort of like our subscription or our account for our entire company that we're going to manage our entire organization through. The reason we don't call it a subscription or an account is because those phrases have very particular meanings inside of Office 365.
So they had to come up with a better name for it
 tenant makes quite a bit of sense if you think about it. Setting up a tendency as sort of like moving into an apartment complex, the Office 365 data center apartment complex. Yeah, you're going to be there with all of your stuff, all of your data, but you're only going to have access to management over your little apartment, your one little piece of that apartment complex.
Everyone else who's also using Office 365 is going to be there as well, with control over their little piece of it, and you're all going to share the baseline infrastructure that's underneath. So you are like a tenant in the Office 365 data center. Setting it up is really easy to do.
copied from
Microsoft-Office-365-identities-and-requirements-70-346

SOURCE

https://www.microsoftpressstore.com/articles/article.aspx?p=2419713
 
Share:

Which Port is used for Citrix Session Reliability?

Which Port is used for Citrix Session Reliability?

  • 2589
  • 2927
  • 2729
  • 2598

Which Port is used for Citrix Session Reliability?

EXPLANATION

Citrix Session Reliability allows or prevents sessions to remain open during a loss of network connectivity. Session reliability, along with auto client reconnection, allows users to automatically
reconnect to their Citrix Receiver sessions after recovering from network disruptions.

SOURCE

https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-15-ltsr/policies/reference/ica-policy-settings/session-reliability-policy-settings.html
 
Share:

Popular Posts