IT Questions and Answers :)

Friday, January 19, 2018

When installing a new domain controller into an exisiting Windows Server 2012 R2 domain using Windows PowerShell, which cmdlet do you use?

When installing a new domain controller into an exisiting Windows Server 2012 R2 domain using Windows PowerShell, which cmdlet do you use?

  • Promote-ADSDomainController
  • Install-ADDomainController
  • Get-ADDSDomainController
  • Install-ADDSDomainController 
 
When installing a new domain controller into an exisiting Windows Server 2012 R2 domain using Windows PowerShell, which cmdlet do you use?

EXPLANATION

When installing a new domain controller into an existing AD domain, use the Install-ADDSDomainController cmdlet and the parameters that meet your needs.

SOURCE

https://technet.microsoft.com/en-us/library/hh974723%28v=wps.630%29.aspx
Share:

Thursday, January 18, 2018

What are VM snapshots intended to be used for?

What are VM snapshots intended to be used for?

  • To easily revert the VM to an earlier state
  • To shut down the server
  • As a backup tool for your VMs
  • To create albums 

 
What are VM snapshots intended to be used for?

EXPLANATION

Snapshots provide a fast and easy way to revert the virtual machine to a previous state. For this reason, virtual machine snapshots are intended mainly for use in development and test environments. Having an easy way to revert a virtual machine can be very useful if you need to recreate a specific state or condition so that you can troubleshoot a problem.
There are certain circumstances in which it may make sense to use snapshots in a production environment. For example, you can use snapshots to provide a way to revert a potentially risky operation in a production environment, such as applying an update to the software running in the virtual machine.
Many backup products use snapshots in a production environment. They create a snapshot and then processing continues from the snapshot, meanwhile they have an unchanging original to back up. Once the backup is completed the snapshot is merged back into the live environment. This allows a machine to be backed up with very little affect for the users and for them remains up 24/7.
NB: Hyper-V snapshots do not replace backups. Backup usually involves some form of duplication (so two copies of the protected data exist) but in snapshots... there is no duplication whatsoever. All data is in VHD(X) file and changes in AVHD(X) file and if the VHD(X) file is damaged/lost, the data is pretty much gone. Also with most backups you can restore a single file to an earlier state, but with Snapshots, it's all or nothing (meaning if an user wants a file from last week, you'd have to bring the whole system back a week). There are other concerns as well (there might be performance  issues with multiple snapshots, snapshots usually lose value as they age and there are issues with disk space)

SOURCE

https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1015180
 
Share:

Wednesday, January 17, 2018

The 'CAT' (Category) rating on a multimeter relates to its capability to

The 'CAT' (Category) rating on a multimeter relates to its capability to:

  • Survive in tough environments
  • Reduce user hazards
  • Maintain high accuracy
  • Provide extended battery life 

 
The 'CAT' (Category) rating on a multimeter relates to its capability to

EXPLANATION

The Category rating, typically CAT I, II, III, IV etc, relates to the ability of the meter to avoid creating a safety hazard when subjected to a massive overload, as for example when inadvertently connected directly across a supply when on a current range. It does not necessarily imply that the meter will survive the abuse. Rather, that the result should not include user injury due to fire, insulation failure, arcing or bursting open of the case.

Budget meters sold for use on small electronic projects do not typically have the protection devices (Especially, high breaking-current fuses) fitted to meters intended for measurements on distribution boards, etc. Therefore anyone intending such work should choose a meter with a suitable CAT rating.

http://support.fluke.com/find-sales/download/asset/1263690_6116_eng_h_w.pdf

SOURCE

http://support.fluke.com/find-sales/download/asset/1263690_6116_eng_h_w.pdf
Share:

Tuesday, January 16, 2018

What is the limiting factor that prevents older PCs from using a hard drive larger than 2.2 terabytes?

What is the limiting factor that prevents older PCs from using a hard drive larger than 2.2 terabytes?

  • GPT (GUID Partition Table)
  • MBR (Master Boot Record)
  • RAM (Random Access Memory)
  • UEFI (Unified EFI) 

 
What is the limiting factor that prevents older PCs from using a hard drive larger than 2.2 terabytes?

EXPLANATION

This limit arises from the maximum size of the master boot record (MBR) partitioning method used by most personal computers. BIOS systems with MBR disks use 32-bit values to describe the starting offset and length of a partition. Due to this size limit, MBR allows a maximum disk size of approximately 2.2 TB and a maximum of four primary partitions.
UEFI supports the GUID Partition Table (GPT), a more flexible partitioning scheme. GPT disks use 64-bit values to describe partitions, allowing larger partitions. GPT also fixes other issues related to MBR (data integrity, backup tables, maximum number of partitions, ...). Using 64-bit values, GPT can handle disks of up to 9.4 x 10^21 bytes or 9.4 zettabytes (ZB).

SOURCE

http://www.uefi.org/sites/default/files/resources/UEFI_Drive_Partition_Limits_Fact_Sheet.pdf
Share:

Friday, January 12, 2018

Which of the following protocols is not directly related to VOIP?

Which of the following protocols is not directly related to VOIP?

  • Real-time Transport Protocol (RTP)
  • Session Initiation Protocol (SIP)
  • File Transfer Protocol (FTP)
  • Inter-Asterisk eXchange (IAX) 

 
Which of the following protocols is not directly related to VOIP?

EXPLANATION


Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Voice over IP has been implemented in various ways using both proprietary protocols and protocols based on open standards. VoIP protocols include:
Session Initiation Protocol (SIP) H.323Media Gateway Control Protocol (MGCP) Gateway Control Protocol (Megaco, H.248) Real-time Transport Protocol (RTP) Real-time Transport Control Protocol (RTCP) Secure Real-time Transport Protocol (SRTP) Session Description Protocol (SDP) Inter-Asterisk eXchange (IAX) Jingle XMPP VoIP extensions Skype protocol

SOURCE

https://en.wikipedia.org/wiki/Voice_over_IP
Share:

What is Puppet used for?

What is Puppet used for?

  • Advanced threat management
  • Configuration management
  • Remote desktop operations
  • Backups and restores 

 
What is Puppet used for?

EXPLANATION

Puppet is an open-source configuration management tool that runs on Unix-like systems as well as on Microsoft Windows. It has its own declarative language that you can use to describe your system's configuration.
Share:

When a user computer or device (like a cell phone, tablet, or printer) is having general, odd software problems, what is the most common easy fix?

When a user computer or device (like a cell phone, tablet, or printer) is having general, odd software problems, what is the most common easy fix?

  • Turn it off and on again
  • Update the drivers
  • Attach a debugger to the port
  • Replace the flash memory 

 
When a user computer or device (like a cell phone, tablet, or printer) is having general, odd software problems, what is the most common easy fix?

EXPLANATION

Computerized devices have become extremely complex in software and hardware interactions.
The highly interwoven tangle of software dependencies will frequently cause small memory leaks, resource contentions, and other unexpected results, cascading over time. Just like a deep cleaning in the kitchen is great for a chef to maintain food quality, a reboot is oftentimes the quickest and easiest way to get a misbehaving system to clear its slate and get back into an operating state.
Sadly, since the concept is so simple and seems inane, many users will not do it when instructed. Performing this quick and basic step first thing will often correct the original issue and if it doesn't (and the user complains they did it already), it still provides the benefit of starting troubleshooting with the knowledge that you're starting from a basic system state.
Share:

Popular Posts