IT Questions and Answers :)

Thursday, November 23, 2017

Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

  • [a-zA-Z]
  • [a-zA-Z0-9]
  • [a-zA-Z_]
  • [a-zA-Z0-9_] 

 
Which of the following RegEx character sets does the '\w' meta-character most closely represent in Perl-compatible Regular Expression implementations?

EXPLANATION

The "word" meta-character \w in RegEx will match the full alpha-numeric range, basically the full alphabet as well as number characters, and includes underscores.

Note that it matches more alphabet characters than the standard a through z: pretty much any alphabet character, such as 'ñ', also match.

http://www.w3schools.com/jsref/jsref_regexp_wordchar.asp 
Share:

In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

  • 10
  • 3
  • 2

 
In a Windows security log, which of the following logon type codes is produced by someone logging on from a local keyboard?

EXPLANATION

The correct answer is 2. While Event ID 4624 shows a successful logon, you need to look at the event code to see the specific nature of that logon. You’ll see type 2 logons when a user attempts to log on at the local keyboard and screen, whether with a domain account or a local account from the computer’s local SAM.  Code 10 is for remote access, code 3 is from the network (for things such as accessing shares), and code 5 is used when a service starts up. For more information, See the source

SOURCE

http://www.windowsecurity.com/articles-tutorials/misc_network_security/Logon-Types.html
Share:

Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

  • Admission tolerance control
  • Admission control
  • Fault tolerance
  • Startup control 

 
Which vSphere feature will prevent virtual machines from starting in a cluster if there are not enough redundant compute resources?

EXPLANATION




vCenter Server uses Admission Control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. It can be set at the Host, Resource Pool, or Cluster Level (known as vSphere HA Admission Control). 
Read more here: https://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.vsphere.avail.doc_50%2FGUID-53F6938...

Share:

What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

  • 8GB
  • 16GB
  • 4GB
  • 32GB 

 What is the maximum possible file size (to the nearest gigabyte) for a file on a FAT32 volume?

EXPLANATION

The maximum possible size for a file on a FAT32 volume is 4 GB minus 1 byte or 4,294,967,295 (232 − 1) bytes. This limit is a consequence of the file length entry in the directory table and would also affect huge FAT16 partitions with a sufficient sector size.[1] Large video files, DVD images and databases easily exceed this limit.
https://en.wikipedia.org/wiki/File_Allocation_Table
Share:

With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

  • MPLS
  • ICMP
  • PPP
  • LACP 

 
With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

EXPLANATION

MPLS is a scalable, protocol-independent transport. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol. The primary benefit is to eliminate dependence on a particular OSI model data link layer (layer 2) technology, such as Asynchronous Transfer Mode (ATM), Frame Relay, Synchronous Optical Networking (SONET) or Ethernet, and eliminate the need for multiple layer-2 networks to satisfy different types of traffic. MPLS belongs to the family of packet-switched networks.
MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.

SOURCE

http://it.toolbox.com/blogs/intruder-detection/mpls-and-the-osi-reference-model-where-does-mpls-fit-in-50920
Share:

What voltages should the two hot wires on a Molex connector read?

What voltages should the two hot wires on a Molex connector read?

  • Red = 5 V; Yellow = 3.3 V
  • Red = 5 V; Yellow = 12 V
  • Red - 12 V; Yellow = 5 V
  • Red = 3.3 V; Yellow = 5 V 

 
What voltages should the two hot wires on a Molex connector read?

EXPLANATION

A Molex connector's red wire should be at 5 volts. The yellow wire should be at 12 volts.

Share:

What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

  • Sh u
  • Tell router update config
  • Sh Tasks
  • fixup -t 

 
What console command would you use to reload the routing tables and reboot Lotus Domino on the fly without rebooting the host?

EXPLANATION

The above console command allows on the fly restart of all services and processes in Lotus domino. Negating the requirement to even restart the hardware box.

Share:

Popular Posts