IT Questions and Answers :)

Thursday, November 23, 2017

A static virtual local area network (VLAN) assigns VLANs to which of the following?

A static virtual local area network (VLAN) assigns VLANs to which of the following?

  • Trunks
  • Physical ports
  • IP addresses
  • MAC addresses 

 
A static virtual local area network (VLAN) assigns VLANs to which of the following?

EXPLANATION

Static VLANs assign VLANs to physical ports. Assigning each port to a VLAN means that whatever computer plugs into that port, it will always be a member of that port's VLAN.
Dynamic VLANs assign VLANs based on MAC addresses

Share:

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

  • 500 feet
  • 200 meters
  • 100 meters
  • 100 feet 

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

EXPLANATION

The maximum length for a cable segment is 100 meters. If longer runs are required, the use of active hardware such as a repeater or network switch is necessary.
https://en.wikipedia.org/wiki/Category_5_cable
Share:

On Windows, what is the MMC.exe?

On Windows, what is the MMC.exe?

  • Microsoft Management Console
  • Microsoft Managed Console
  • Microsoft Management Control
  • Microsoft Managed Control 

 
On Windows, what is the MMC.exe?

EXPLANATION

MMC.exe is the Microsoft Management Console application and is used to display various management plug-ins accessed from the Control Panel, such as the Device Manager.

Share:

In MS Exchange, which of the following is NOT an Exchange Recipient type?

In MS Exchange, which of the following is NOT an Exchange Recipient type?

  • Distribution mailbox
  • Room mailbox
  • Legacy mailbox
  • User mailbox 
In MS Exchange, which of the following is NOT an Exchange Recipient type?

 

EXPLANATION

The following are all Exchange Recipient types in MS Exchange.
User mailbox: This mailbox is created for an individual user to store mails, calendar items, contacts, tasks, documents, and other business data.

Linked mailbox: This mailbox is created for an individual user in a separate, trusted forest. For example AD account is created in A.COM and Mailbox is created in B.COM Exchange Server.

Shared mailbox: This mailbox is not primarily associated with a single user and is generally configured to allow logon access for multiple users.

Legacy mailbox: This mailbox is resides on a server running Exchange Server 2003 or Exchange 2000 Server. See here: https://support.microsoft.com/en-us/help/931747/a-mailbox-that-is-located-on-an-exchange-server-2007...

Room mailbox: This mailbox is created for a meeting location, such as a meeting or conference room, auditorium, or training room. When we create this mailbox, by default a disabled user object account is created.

Equipment mailbox: A resource mailbox is created for a non-location specific resource, such as a portable computer projector, microphone, or a company car. When we create this mailbox, by default a disabled user object account is created. Equipment mailboxes provide a simple and efficient way for users to use resources in manageable way.

SOURCE

https://technet.microsoft.com/en-us/library/bb201680(v=exchg.150).aspx
Share:

What was the Java programming language originally named?

What was the Java programming language originally named?

  • Oak
  • Green
  • Mocha
  • Blue 
What was the Java programming language originally named?

 

EXPLANATION

"The language was initially called Oak after an oak tree that stood outside Gosling's office. Later the project went by the name Green and was finally renamed Java, from Java coffee."

Related: History of programming languages:

SOURCE

http://www.javaworld.com/article/2077265/core-java/so-why-did-they-decide-to-call-it-java-.html
Share:

Which of the following is not a primary biometric authentication?

Which of the following is not a primary biometric authentication?

  • Body scanner
  • Voice
  • Fingerprint
  • Iris pattern 
Which of the following is not a primary biometric authentication?

 

EXPLANATION

Body scanners are soft biometrics. Soft biometrics traits are physical, behavioral or human characteristics that have been derived from the way human beings normally distinguish their peers (such as height, gender, and hair color). They are used to complement the identity information provided by the primary biometric identifiers .
https://en.wikipedia.org/wiki/Biometrics#Soft_biometrics 

Share:

In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

  • Virtual LAN
  • Virtual Network
  • Virtual switch
  • Virtual PBX 
In Hyper-V, which of the following features enables two VMs hosted on the same physical machine to communicate without going outside the host system?

 

EXPLANATION

Hypervisors come with virtual switching capabilities, which enable the VMs to communicate without going outside of the host system. Depending on your hypervisor, this virtual switch can do everything you'd expect from a typical managed Layer 2 switch.

SOURCE

http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/
Share:

Popular Posts