Thursday, November 12, 2020
Wednesday, November 11, 2020
What we use to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime in vSphere setting
What we use to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime in vSphere setting
EXPLANATION
VMware vSphere hot add is a feature that allows an administrator to
increase the random access memory (RAM) capacity of a running virtual
machine (VM) without downtime
VSphere hot add can be enabled during the configuration of VMware VMs
running hardware version 7 and newer, on compatible OSes and with the
use of VMware Tools. Because vSphere hot add is disabled by default, and
VMs must be powered off to enable it, administrators should consider
enabling hot add from the start if there's a possibility that a VM will
need more resources at any point.
SOURCE
https://searchvmware.techtarget.com/definition/vSphere-hot-addWhich of these is an NSA Type-1 Programmable Encryption Device used primarily by the Department of Defense for linux-based tracking systems?
Which of these is an NSA Type-1 Programmable Encryption Device used primarily by the Department of Defense for linux-based tracking systems?
- SKL
- ANCD
- KGV-72
- RT-1523
EXPLANATION
The KGV-72 Type-1 Programmable Encryption Device features a modular architecture with the programmability and scalability to accommodate a wide range of link and Internet Protocol (IP) in-line network encryption applications. Developed as part of the Force XXI Battle Command, Brigade-and-Below (FBCB2) Type-1 Encryption Device (T1ED) Program, the KGV-72 is a high-grade security solution that is compatible with existing and future Blue Force Tracking (BFT) terminals and transceivers. Its flexible, software-upgradeable design supports both legacy FBCB2 L-band/BLOS link communications and evolving IP standards. The KGV-72 is secured with the programmable National Security Agency (NSA)-certified Sierra II™ encryption module,
which meets all requirements of the NSA’s Cryptographic Modernization initiative. Programming of Suite-A and Suite-B algorithms is also supported, allowing the KGV-72 to be used for a wide range of in-line network applications. The KGV-72 operates seamlessly with installed FBCB2 remote computers and provides high-grade traffic data encryption. For easy operation, the KGV-72 front panel features only a single knob and LED. Tested to MIL-STD-810F requirements, the KGV-72 is a military-rugged encryption device in a compact, form factor package ideal for secure force tracking applications.
Tuesday, November 10, 2020
What is the name of the file that Imagex or DISM if you wish to exclude folders from sysprep and capture?
What is the name of the file that Imagex or DISM if you wish to exclude folders from sysprep and capture?
- wimscript.inf
- wimconf.ini
- sysexclude.inf
- WimScript.ini
EXPLANATION
The Deployment Image Servicing and Management (DISM) tool is a command-line tool that you can use to capture and apply Windows images. You can create a configuration list file to determine the following:
Which files and folders must be excluded from the capture process when you use the /Capture-Image option with the DISM tool.
Which folders, files, and file types must be excluded from the compression process when you use the /Compress argument.
The /ConfigFile argument enables you to customize specific compression, capture, and boundary alignment actions for each file and folder when you capture an image using DISM.exe. You can create a configuration list (.ini) file by using a text editor, such as Notepad.
SOURCE
https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-configuration-list-and-wimscriptini-files-winnextFriday, November 6, 2020
What category of Basic Input/Output System (BIOS) settings should you look for if you wanted to enable or disable Trusted Platform Module (TPM) on the host operating system?
What category of Basic Input/Output System (BIOS) settings should you look for if you wanted to enable or disable Trusted Platform Module (TPM) on the host operating system?
- Power management
- Memory
- Security
- Virtualisation
EXPLANATION
Responsive design is an approach to web design aimed at crafting sites to provide an optimal viewing and interactive experience across a wide range of devices (from desktop computer monitors to mobile phones). Responsive design is becoming more important as mobile traffic now accounts for more internet traffic.
Thursday, November 5, 2020
In the NMAP program, if you are running a port scan which switch will save your output to the different formats, .nmap, .xml, and .gmap?
In the NMAP program, if you are running a port scan which switch will save your output to the different formats, .nmap, .xml, and .gmap?
- -A
- -oA
- -sT
- -sV
EXPLANATION
In the NMAP port scanner, you can save your portscan as a
nmap file, xml file, and a gmap file . If you want to save your one of
each you can use the -oA switch. The gmap file extension can come in
handy as this is a grepable file.
If you were going to scan a network
with the command nmap -p-oA initial 10.0.0.0/24 you could use the grep
command to find a host in the network utilizing a specific port. Perhaps
your goal is to find FTP servers. In this case you might run the
command grep output.gmap for the ftp service.
SOURCE
https://nmap.org/book/man-output.htmlWednesday, November 4, 2020
What Is The Maximum Number Of Network Adapters Allowed For NIC Teaming In Windows Server 2012 / R2 or Windows Server 2016?
What Is The Maximum Number Of Network Adapters Allowed For NIC Teaming In Windows Server 2012 / R2 or Windows Server 2016?
- 32
- 20
- 16
- 24
EXPLANATION
NIC Teaming allows you to group between one and thirty-two physical
Ethernet network adapters into one or more software-based virtual
network adapters.
These virtual network adapters provide fast
performance and fault tolerance in the event of a network adapter
failure.
Information source: Microsoft TechNet: NIC Teaming