IT Questions and Answers :)

Friday, April 19, 2019

Which of the following are link state protocols?


Which of the following are link state protocols?
  • RIP
  • EIGRP
  • OSPF
  • BGP

Which of the following are link state protocols?


EXPLANATION

Routing Information Protocol

The Routing Information Protocol is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The largest number of hops allowed for RIP is 15, which limits the size of networks that RIP can support.

Enhanced Interior Gateway Routing Protocol

Enhanced Interior Gateway Routing Protocol is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration. The protocol was designed by Cisco Systems as a proprietary protocol, available only on Cisco routers. Partial functionality of EIGRP was converted to an open standard in 2013 and was published with informational status as in 2016.

Open Shortest Path First

Open Shortest Path First is a routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior gateway protocols, operating within a single autonomous system. It is defined as OSPF Version 2 in RFC 2328 for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340. OSPF supports the Classless Inter-Domain Routing addressing model.

Border Gateway Protocol

Border Gateway Protocol is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems on the Internet. The protocol is classified as a path vector protocol

SOURCE
https://learningnetwork.cisco.com/docs/DOC-17431
Share:

How much native data you can store on a LTO-8 tape

How much native data you can store on a LTO-8 tape
  • 24000 GB
  • 12800 GB
  • 12000 GB
  • 25600 GB


EXPLANATION

LTO-8 offers a compressed storage capacity of 30TB (12TB native) using a 2.5:1 ratio, and a compressed transfer rate of 750 MB/sec. (360MB/sec. native). In addition, the new LTO-8 drives are backward compatible with LTO-7 tape media, allowing users to read/write any LTO-7 media. LTO-8 tape, like LTO-7, supports LTFS, WORM (Write Once Read Many) and AES 256-bit hardware encryption.

SOURCE

https://spectralogic.com/features/lto-8/
Share:

What does SMTP stand for


What does SMTP stand for
  • Simple Mail Transfer Protocol
  • Smack Toilet Paper
  • RAAAAAAAAAAAR!
  • Small Mail Telemetry Pass

What does SMTP stand for


EXPLANATION

SMTP stands for Simple Mail Transfer Protocol. This is the generally accepted protocol. for outgoing e-mail. Use of SMTP. SMTP service is the side of e-mail that allows clients to send outgoing e-mail messages. to any valid e-mail address.

SMTP, is a protocol used to transmit email messages over the internet. The standard itself was first published in 1981, and it has been improved continuously to adapt to changes in technology and user needs


Share:

All of these are general ports used for email except which one?

All of these are general ports used for email except which one?
  • 25
  • 22
  • 587
  • 110           

All of these are general ports used for email except which one?

EXPLANATION

Common port numbers
The Internet Assigned Numbers Authority (IANA) is responsible for the global coordination of the DNS Root, IP addressing, and other Internet protocol resources. This includes the registration of commonly used port numbers for well-known Internet services.
The port numbers are divided into three ranges: the well-known ports, the registered ports, and the dynamic or private ports.
The well-known ports (also known as system ports) are those from 0 through 1023. The requirements for new assignments in this range are stricter than for other registrations, examples include:
The registered ports are those from 1024 through 49151. IANA maintains the official list of well-known and registered ranges. The dynamic or private ports are those from 49152 through 65535. One common use for this range is for ephemeral ports

SOURCE

https://en.wikipedia.org/wiki/Port_(computer_networking)

Share:

what protocol should be used to send a password securely

what protocol should be used to send a password securely
  • ftp
  • smtp
  • telnet
  • ssh   
    
what protocol should be used to send a password securely

 EXPLANATION


File Transfer Protocol
The File Transfer Protocol is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is on Port 21.

Secure Shell
Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users.Secure Shell (SSH) uses TCP port 22.

telnet 
Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. Wikipedia

simple mail transfer protocol
The Simple Mail Transfer Protocol is a communication protocol for electronic mail transmission. As an Internet standard, SMTP was first defined in 1982 by RFC 821, and updated in 2008 by RFC 5321 to Extended SMTP additions, which is the protocol variety in widespread use today. Wikipedia
Standard port: 25, 587, 465

Share:

Which of the following file replication methods is now used as a standard feature since Windows Vista and Windows Server 2008?

Which of the following file replication methods is now used as a standard feature since Windows Vista and Windows Server 2008?

  • fcopy
  • xcopy
  • Robocopy
  • Dfs 
Which of the following file replication methods is now used as a standard feature since Windows Vista and Windows Server 2008?

EXPLANATION

Distributed File System (DFS) is a set of client and server services that allow an organization using Microsoft Windows servers to organize many distributed SMB file shares into a distributed file system.
DFS has two components to its service: Location transparency (via the namespace component) and Redundancy (via the file replication component). Together, these components improve data availability in the case of failure or heavy load by allowing shares in multiple different locations to be logically grouped under one folder, the "DFS root".
Microsoft's DFS is referred to interchangeably as 'DFS' and 'Dfs' by Microsoft and is unrelated to the DCE Distributed File System, which held the 'DFS' trademark[1] but was discontinued in 2005.

Share:

In a Windows environment, which command should you use in order to show the last time your machine was rebooted?

n a Windows environment, which command should you use in order to show the last time your machine was rebooted?

  • systeminfo | find "System Boot Time"
  • net stats workstation
  • uptime
  • systeminfo | find "System Uptime" 
n a Windows environment, which command should you use in order to show the last time your machine was rebooted?

EXPLANATION

systeminfo command is almost right what you need. On English Windows 7 you can also do:
systeminfo | find /i "Boot Time"
Or with the help of WMIC:


wmic os get lastbootuptime
The main difference between Windows 7 and Windows XP that in Windows 7 Microsoft can show only last boot up time. 






Share:

Popular Posts