IT Questions and Answers :)

Thursday, April 12, 2018

You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

  • GRE not enabled or blocked on the firewall.
  • Port forward of UDP 1723 missing.
  • No static routes configured on the firewall.
  • Port forward of UDP 500 missing.
You setup your server to accept PPTP VPN client connections. You accurately port forward TCP 1723 on the firewall to the server, but clients still cannot connect. Of the below options, what would be the most likely reason?

EXPLANATION

GRE is an encapsulation protocol required by some PPTP VPN connections, notably Microsoft's implementation. Some cheaper and consumer level firewall/routers do not support or have an option for GRE, or if it does it might be disabled or blocked.
UDP 500 is specific to IPSEC.
Along with the citation, also see...
http://whp-aus1.cold.extweb.hp.com/pub/networking/software/ProCurve-SR-dl-GRE-Config-Guide.pdfhttp://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/118361-technote-gre-0....
https://en.wikipedia.org/wiki/Generic_Routing_Encapsulation

SOURCE

https://blogs.technet.microsoft.com/rrasblog/2009/08/12/troubleshooting-common-vpn-related-errors/
Share:

Convert 101101 from binary to decimal!

Convert 101101 from binary to decimal!

  • 44
  • 61
  • 45
  • 41 

Convert 101101 from binary to decimal!

EXPLANATION

Each 1 represents a power of 2, so this is equivalent to 2^5 + 2^3 + 2^2 + 2^0, or 32 + 8 + 4 + 1 = 45.

1 x 1 = 1
0 x 2 = 0
1 x 4 = 4
1 x 8 = 8
0 x 16 = 0
1 x 32 = 32

1 + 4 + 8 + 32 = 45
Share:

Wednesday, April 11, 2018

What's a stealthy and continuous computer hacking process often targeted at a specific entity?

What's a stealthy and continuous computer hacking process often targeted at a specific entity?

  • Shadow ninja attack
  • Advanced persistent threat
  • Advanced malware attack
  • Silent and deadly attack 

 
What's a stealthy and continuous computer hacking process often targeted at a specific entity?

EXPLANATION

An advanced persistent threat (APT) uses multiple phases to break into a network, avoid detection, and harvest valuable information over the long term. The intention of an APT attack is to steal data rather than to cause damage to the network or organization. APTs require a high degree of covertness over an extended period of time.
Share:

Tuesday, April 10, 2018

Which of these cloud distribution models delivers a licensed application to customers over the Internet as an on-demand service?

Which of these cloud distribution models delivers a licensed application to customers over the Internet as an on-demand service?

  • Platform as a service
  • Infrastructure as a service
  • Security as a service
  • Software as a service 

Which of these cloud distribution models delivers a licensed application to customers over the Internet as an on-demand service?


EXPLANATION

Software as a service, or "software on demand," is a software licensing and delivery model where a vendor hosts an application and allows you to download it for a set period of time.
This can be handy if your business wants access to a particular application without the upfront costs of purchasing a full license or dealing with maintenance.
Share:

Monday, April 9, 2018

In which OSI layer does the UDP protocol operate?

In which OSI layer does the UDP protocol operate?

  • Data link
  • Network
  • Session
  • Transport
 
In which OSI layer does the UDP protocol operate?

EXPLANATION




Both TCP and UDP are transport protocols, belonging to the transport layer of the OSI model. Both TCP and UDP run on top of IP, which operates at the network layer.
 
 
Share:

In PowerShell, what cmdlet corresponds to the "FL" alias?

In PowerShell, what cmdlet corresponds to the "FL" alias?

  • Format-Line
  • Format-List
  • For-Loop
  • Folder-Limit 

 
In PowerShell, what cmdlet corresponds to the "FL" alias?

EXPLANATION

Format-List is the long form of the "FL" command. This command is used to change the layout of list items when they are output to the console.
For-Loop, Folder-Limit, and Format-Line are not PowerShell commands.

Share:

Thursday, April 5, 2018

Which of the following would be your first EIGRPv6 command in a new cisco router?

Which of the following would be your first EIGRPv6 command in a new cisco router?

  • interface config: ipv6 eigrp 1
  • global config: ipv6 unicast-routing
  • global config: ipv6 router eigrp 1
  • interface config: ipv6 unicast 

 
Which of the following would be your first EIGRPv6 command in a new cisco router?

EXPLANATION


EIGRPv6 involves the following configuration steps:
- Enable IPv6 routing using the ipv6 unicast-routing command.
- Create an EIGRPv6 process using ipv6 router eigrp asn command.
- Assign an EIGRPv6 router ID using the eigrp router-id router-id command in router configuration mode.
- Enable EIGRPv6 on interfaces using the ipv6 eigrp asn command in interface configuration mode

Share:

Popular Posts