IT Questions and Answers :)

Thursday, December 7, 2017

What is the command to force Knowledge Consistency Checker (KCC) on targeted domain controllers to immediately recalculate the inbound replication topology.

What is the command to force Knowledge Consistency Checker (KCC) on targeted domain controllers to immediately recalculate the inbound replication topology.

  • Repadmin -replicate
  • Repadmin -prp
  • Repadmin -showutdvec
  • Repadmin -kcc 
 
What is the command to force Knowledge Consistency Checker (KCC) on targeted domain controllers to immediately recalculate the inbound replication topology.

EXPLANATION

This command helps repair broken connections between domain controllers by rebuilding the active connection.

SOURCE

https://technet.microsoft.com/en-us/library/cc770963(v=ws.11).aspx



Share:

Wednesday, December 6, 2017

What is the difference between TACACS+ and RADIUS?

What is the difference between TACACS+ and RADIUS?

  •  TACACS+ encrypts the entire packet and RADIUS does not.
  • TACACS+ uses UDP transport protocol and RADIUS uses TCP.
  • RADIUS is defined by Cisco and TACACS+ is RFC 2865.
  • RADIUS encrypts the entire packet and TACACS+ does not. 
What is the difference between TACACS+ and RADIUS?

 

EXPLANATION


TACACS+ uses Transmission Control Protocol (TCP) port 49 to communicate between the TACACS+ client and the TACACS+ server. An example is a Cisco switch authenticating and authorizing administrative access to the switch’s IOS CLI. The switch is the TACACS+ client, and Cisco Secure ACS is the server.
One of the key differentiators of TACACS+ is its ability to separate authentication, authorization and accounting as separate and independent functions. This is why TACACS+ is so commonly used for device administration, even though RADIUS is still certainly capable of providing device administration AAA.
Device administration can be very interactive in nature, with the need to authenticate once, but authorize many times during a single administrative session in the command-line of a device. A router or switch may need to authorize a user’s activity on a per-command basis. TACACS+ is designed to accommodate that type of authorization need.   As the name describes, TACACS+ was designed for device administration AAA, to authenticate and authorize users into mainframe and Unix terminals, and other terminals or consoles.
TACACS+ communication between the client and server uses different message types depending on the function. In other words, different messages may be used for authentication than are used for authorization and accounting. Another very interesting point to know is that TACACS+ communication will encrypt the entire packet.

SOURCE

http://www.networkworld.com/article/2838882/radius-versus-tacacs.html
Share:

Tuesday, December 5, 2017

By default, which of the following is NOT a legitimate Linux run level?

By default, which of the following is NOT a legitimate Linux run level?

  • 6: Reboot system
  • 1: Single-user mode
  • 4: Normal mode
  • 3: Multi-user mode with networking 

By default, which of the following is NOT a legitimate Linux run level?

EXPLANATION

A Linux run level defines the state of the system after boot. Conventionally, seven run levels exist, numbered from zero to six. They include:
0: Halt system
1: Single-user mode
2: Basic multi-user mode without NFS
3: Multi-user mode with networking
4: Unused
5: Multi-user mode with GUI

6: Reboot system

Share:

Monday, December 4, 2017

Which of the following would provide secure communications if your organization uses an application that authenticates with Active Directory Domain Services (AD DS) through simple BIND?

Which of the following would provide secure communications if your organization uses an application that authenticates with Active Directory Domain Services (AD DS) through simple BIND?

  • SAML
  • XTACACS
  • TACACS+
  • Secure LDAP 

Which of the following would provide secure communications if your organization uses an application that authenticates with Active Directory Domain Services (AD DS) through simple BIND?

EXPLANATION

Secure LDAP, or LDAPS, protects authentication sessions when an application authenticates with AD DS through simple BIND.
Share:

Friday, December 1, 2017

Which of the following does a DNS MX record provide for a given domain?

Which of the following does a DNS MX record provide for a given domain?

  • The name of the inbound email server for that domain
  • The web server details of the domain
  • Outgoing email server for the domain
  • Microsoft Exchange related information for the domain 

 
Which of the following does a DNS MX record provide for a given domain?

EXPLANATION

Mail eXchanger (MX) records specify a mail server responsible for accepting email messages on behalf of a recipient's domain,
and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).

SOURCE

https://en.wikipedia.org/wiki/MX_record
Share:

What is the first program that the Linux kernel runs once it's booted in a normal boot process?

What is the first program that the Linux kernel runs once it's booted in a normal boot process?


  • init
  • dmesg
  • lilo
  • rc             
What is the first program that the Linux kernel runs once it's booted in a normal boot process?

EXPLANATION

The Linux kernel runs init as the first program; init then runs, via various scripts, other programs. The dmesg program is a user diagnostic and information tool not part of startup. The rc program is a script that some versions of init call during startup sequence but its not the first program the kernel runs. The lilo command installs the boot loader to MBR. The boot loader runs before the
Share:

In PowerShell, what is "splatting"?

Which of the following does a DNS MX record provide for a given domain?

  • The name of the inbound email server for that domain
  • The web server details of the domain
  • Outgoing email server for the domain
  • Microsoft Exchange related information for the domain 

 
In PowerShell, what is "splatting"?

EXPLANATION

When you have multiple parameters to give to a single cmdlet, you can use a "splat", also known as "splatting".  This is where you build a hash table where each key is a parameter name, and each key's value is the value that you will pass to that parameter.  Once created, you can pass the entire hash table to the cmdlet by calling it with @ instead of $.
Example:
$ADUserSplat = @{
    Department = "IT Department";
    Description = "Person in IT";
    City = "Awesometown";
}

Set-ADUser -Identity ituser @ADUserSplat
Since the splat is actually a hash table, it can be modified, added to, and removed from as a hash table, allowing more programmatic (logic based) constructions of commands, such as "only change the department if they're in one of these three groups", without having to have multiple calls to the same cmdlet in a complex if/elseif/else chain.
Share:

Popular Posts