IT Questions and Answers :)

Friday, December 22, 2017

In Cisco IOS, how do you enter into Privileged EXEC mode?

In Cisco IOS, how do you enter into Privileged EXEC mode?

  • Login
  • Enable
  • Su
  • Exec 
In Cisco IOS, how do you enter into Privileged EXEC mode?

EXPLANATION

Privileged EXEC mode is password protected, and allows the use of all EXEC mode commands available on the system. To enter privileged EXEC mode from user EXEC mode, use the enable command. Privileged EXEC mode allows access to global configuration mode through the use of the enable command. The privileged EXEC mode prompt consists of the devices's host name followed by the pound sign: Router# .
http://www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/guide/ffun_c/fcf019.html

Share:

In Unix what program notifies the user of a new mail notification by sending an alert to the tty?

In Unix what program notifies the user of a new mail notification by sending an alert to the tty?

  • biff
  • squib
  • gnub
  • ding 

 
  In Unix what program notifies the user of a new mail notification by sending an alert to the tty?

EXPLANATION


When a new mail message is delivered, the program biff alerts the recipient so they can read it immediately. The alert is sent to the tty where the recipient is logged in, and contains the Subject, From line, and first few lines of the body of the new message. The alert also includes terminal beeps to guarantee quick attention.
Notification is enabled by the command
biff yand disabled by
biff n
https://en.wikipedia.org/wiki/Biff
Share:

What is the smallest data unit in quantum computing?

What is the smallest data unit in quantum computing?

  • 1 Cubik
  • 1 Cubit
  • 1 Qubit
  • 1 Quanbit 

 
What is the smallest data unit in quantum computing?

EXPLANATION

A qubit is a quantum bit , the counterpart in quantum computing to the binary digit orbit of classical computing. Just as a bit is the basic unit of information in a classical computer, a qubit is the basic unit of information in a quantum computer
In a quantum computer, a number of elemental particles such as electrons or photons can be used, with either their charge or polarization acting as a representation of 0 and 1. In a classical system, a bit would have to be in one state or the other. However, quantum mechanics allows the qubit to be in a superposition of both states at the same time, a property which is fundamental to quantum computing.
See wikipedia entry for more information:
https://en.wikipedia.org/wiki/Qubit

Share:

If you want to create a new login on SQL Server, what is the proper syntax?

If you want to create a new login on SQL Server, what is the proper syntax?

  • CREATE LOGIN login_id WITH PASSWORD = password
  • CREATE LOGIN login_id WITH USE = password
  • CREATE LOGIN login_id USE = password
  • USE LOGIN login_id WITH PASSWORD = password 

 
If you want to create a new login on SQL Server, what is the proper syntax?

EXPLANATION

Somebody on the Microsoft team decided that this syntax – create a login with this password – made sense. Even if it's arbitrary, you can't say it isn't intuitive.
https://msdn.microsoft.com/en-us/library/ms189751.aspx
Share:

Which of the following would NOT be an ideal route information sharing method in a mixed-brand networked environment?

Which of the following would NOT be an ideal route information sharing method in a mixed-brand networked environment?

  • Static
  • EIGRP
  • RIP
  • OSPF 
Which of the following would NOT be an ideal route information sharing method in a mixed-brand networked environment?

EXPLANATION

EIGRP is a Cisco proprietary protocol that often isn't supported by all other hardware vendors.
OSPF would be the best alternative if using mixed-brand equipment since it is universally well supported.
Share:

What is the minimum number of disks required for RAID1?

What is the minimum number of disks required for RAID1?

  • 2
  • 1
  • 4 or 5

 
What is the minimum number of disks required for RAID1?

EXPLANATION

RAID 1 (mirroring) – the basic idea of such a solution is the replication (mirroring) of two or more discs. It means that while using RAID 1, an exact copy (or mirror) is created on two or more discs. Such a solution gives good read performance and reliability, but storage capacity must be compartmentalized. The reason for this is that the total storage must be equal to the capacity of the smallest disk. i.e.: in the case of an array composed of 3 discs – 250GM, 500GB and 1TB – the usable space will be equal to 250GB.
Share:

You want to link your company's Microsoft Active Directory user accounts to your cloud provider for federated identity management. What type of configuration must you create within your company?

You want to link your company's Microsoft Active Directory user accounts to your cloud provider for federated identity management. What type of configuration must you create within your company?

  • Relying party trust
  • Identity trust
  • XML provider
  • JSON provider 

You want to link your company's Microsoft Active Directory user accounts to your cloud provider for federated identity management. What type of configuration must you create within your company?

EXPLANATION

Because your company is the identity provider, you must trust the relying party offering services, so you must configure a relying party trust. The cloud provider would deal with configuring an identity trust, not you. XML and JSON are not specifically related to configuring identity federation.
Share:

Popular Posts