IT Questions and Answers :)

Wednesday, May 15, 2019

What is the name of the shared folder that exists on all domain controllers and stores things like Group Policy objects and login scripts?

What is the name of the shared folder that exists on all domain controllers and stores things like Group Policy objects and login scripts?

  • Builtin
  • Share
  • SYSVOL
  • C$ 
What is the name of the shared folder that exists on all domain controllers and stores things like Group Policy objects and login scripts?

EXPLANATION

The System Volume (Sysvol) is a shared directory that stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain

The System Volume (Sysvol) is a shared directory that stores the server copy of the domain's public files that must be shared for common access and replication throughout a domain. The Sysvol folder on a domain controller contains the following items:

  • Net Logon shares. These typically host logon scripts and policy objects for network client computers.
  • User logon scripts for domains where the administrator uses Active Directory Users and Computers.
  • Windows Group Policy.
  • File replication service (FRS) staging folder and files that must be available and synchronized between domain controllers.
  • File system junctions.
File system junctions are used extensively in the Sysvol structure and are a feature of NTFS file system 3.0. You must be aware of the existence of junction points and how they operate so that you can avoid data loss or corruption that may occur if you modify the Sysvol structure.

 

Share:

What does CPU stand for?

What does CPU stand for?

  • Core Processing Unit
  • Custom Processing Unit
  • Central Processing Unit
  • Computer Processing Unit 
What does CPU stand for?

EXPLANATION

A central processing unit is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output operations specified by the instructions. The computer industry has used the term "central processing unit" at least since the early 1960s.Wikipedia


Share:

What allows you to deploy GPO settings without restricting users from changing them later?

What allows you to deploy GPO settings without restricting users from changing them later?

  • Group Policy Preferences
  • Group Policy Prerogative
  • Group Policy YesNoMaybe
  • Group Policy Choices 

What allows you to deploy GPO settings without restricting users from changing them later?

EXPLANATION

Group Policy is a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts. Group Policy provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. A version of Group Policy called Local Group Policy also allows Group Policy Object management on standalone and non-domain computers.

In the beginning of Group Policy evolved out of what was called "System Policies." These were what we now call the Administrative Template extension or registry-based policy settings. These settings are considered to be "true" policy settings as opposed to what was then termed "preference" settings. What is the difference between GP policy settings and preferences?

GP policy settings will:
  1. not tattoo. In other words, when a Group Policy object (GPO) goes out of scope, the policy setting is removed allowing the original configuration value to be used.
  2. supersede an application's configuration setting. In other words, when a GP policy is configured to a value, the application is aware of that value and always uses it over the configurable value.
  3. be recognized by an application. In other words, the display of the configuration item under control of a GP policy setting will be unavailable through the user interface. This is where graying out a configuration item on a menu, not displaying a dialog box, or providing a pop-up message explaining the current feature is under administrator control is used to inform the user they can't configure an option.
Preference settings will:
  1. tattoo. In other words, when a GPO goes out of scope, the preference value will remain in the registry. An administrator is responsible for making sure these values are set to disable, prior to the GPO going out of scope, if the administrator wants the preference setting removed. The preference setting will not be replaced with the original application configuration value.
  2. overwrite an application's configuration setting. This is accomplished by overwriting the original user configured-value for the application. No effort is made to retain the original value before overwriting the value with the preference setting. And, as was noted in 1, the overwritten value will not be removed when the GPO goes out of scope.
  3. not be recognized by an application. In other words, the application's user interface will allow a user to change the configuration item. Most importantly, the Group Policy engine only recognizes when a GPO changes, not when the preference value has been changed. This means the preference setting will be applied once and not automatically reapplied if the user changes the value of the configuration item.
There was a desire to create a registry-based setting that was a melding of the GP policy settings with the preference settings which became the GP preferences. Unlike, preference settings, GP preference settings' behavior is configurable to act differently than a preference setting depending on the options you select.
GP preference settings will:
  1. tattoo, by default. In other words, when a Group Policy object (GPO) goes out of scope, the GP preference setting will be remain in the registry.
    However, you can change the behavior of the GP preference setting by selecting the "Remove this item when it is no longer applied" option for a specific GP preference setting. After selecting this option, the GP preference setting will be removed when the GPO goes out of scope.
  2. overwrite an application's configuration setting. This is accomplished by overwriting the original user configured-value for the application. The original value will not be retained when the application's configuration setting is overwritten by the GP preference setting.
    If the option to "Remove this item when it is no longer applied" has been selected, the GP preference setting will be removed. The application will use the default configuration value, not a previously set user configuration value.
  3. not be recognized by an application. In other words, the application's user interface will allow a user to change the configuration item. By default, the GP preference setting will be automatically reapplied at every GP refresh, not when the application's configuration value has been changed by the user.
    Now the administrator can select the "Apply once and do not reapply" option. This will change the GP preference setting's behavior to only apply the GP preference setting value once and not apply again, even if the user has changed the application's configuration value.
When dealing with registry-based settings the differences between preference settings and GP preferences are subtle. The biggest difference I want to call out here is that while preference settings are always used in connection with registry-based settings, GP preferences can configure more than just registry-based settings. For more information check out the paper providing an overview of Group Policy preferences, http://go.microsoft.com/fwlink/?LinkId=103735.
 
Share:

In Powershell, what does the command "(get-history)[-1].commandLine | clip" do?

In Powershell, what does the command "(get-history)[-1].commandLine | clip" do?

  • Clears the entire command history in the current shell session.
  • Copies the last-issued command in the current shell session to the clipboard.
  • Clears the last-issued command in the command history in the current shell session.
  • Copies the entire command history in the current shell session to the clipboard.

EXPLANATION

Get-History - Get a list of the commands entered during the current session.  Returns a HistoryInfo object for each history item that it gets.
Powershell About Arrays - "Negative numbers count from the end of the array. For example, '-1' refers to the last element of the array."
HistoryInfo.CommandLine Property - Returns the command line string that was issued for that command history item
clip -  Windows Vista included a tiny command line utility called clip. All it does is paste its stdin onto the clipboard.  (Not actually a Powershell command so can be used in Command Prompt as well.

SOURCE

https://ss64.com/ps/get-history.html
Share:

What is the maximum RAM that can be used by a virtual machine in Vmware Vsphere 6.5?

What is the maximum RAM that can be used by a virtual machine in Vmware Vsphere 6.5?

  • 2 TB
  • 4 TB
  • 1 TB
  • 6 TB

What is the maximum RAM that can be used by a virtual machine in Vmware Vsphere 6.5?

EXPLANATION

The maximum memory for each virtual machine has increased from 4 TB in Vsphere 60o to 6 TB in Vshere 6.5.

Platform Services Controller Maximums
Powered-on VMs per vCenter Server2500010000
RAM per host12TB6TB *some exceptions
RAM per VM6128GB4080GB
Registered VMs per vCenter Server3500015000

SOURCE

https://www.vmware.com/pdf/vsphere6/r65/vsphere-65-configuration-maximums.pdf

 

Share:

Tuesday, May 14, 2019

A single Unified Threat Management (UTM) appliance is not capable of which of the following?

A single Unified Threat Management (UTM) appliance is not capable of which of the following?

  • Firewall
  • Anti-virus capabilities
  • Load balancing
  • High availability 


EXPLANATION

Unified Threat Management (UTM)

It started in 2003 when vendors started launching “all-in-one” security products and called them UTMs. Since then the term remains in use.
Nowadays, UTMs is a common thing that incorporates many security services. The need to deploy multiple separate devices is no more required.

Difference UTM Firewall & UTM Appliance

Firewalls come in the form of a software-based or as a hardware-based network security tool to deliver protection against security threats. The basic function of any firewall is to follow a set of standard rules. It checks the incoming and outgoing data flow with the archived records to check if the content is malicious or free of malware. If they are found malware free, they are permitted to pass through the network for the required user to access the data.
However, if the data is found malicious, the firewall filters off the malware from the data content. The default firewall is installed in almost all the PCs which is mainly software-based firewalls and are implemented to protect against the security threats. Sometimes firewalls come attached to different types of routers to provide protection. Hardware-based firewalls are also known to perform routing functions.

 

Share:

The linux admin inadvertently changed permissions on /usr/bin/ls, a 64-bit ELF executable, from 755 to 511. Which users are now authorized to execute "ls" from the command line?

The linux admin inadvertently changed permissions on /usr/bin/ls, a 64-bit ELF executable, from 755 to 511. Which users are now authorized to execute "ls" from the command line?

  • Only the owner and members of the group associated with the file.
  • User root, and only user root.
  • All users.
  • The owner, and only the owner. 
The linux admin inadvertently changed permissions on /usr/bin/ls, a 64-bit ELF executable, from 755 to 511. Which users are now authorized to execute "ls" from the command line?

EXPLANATION

How to change your file to 511 or -r-x--x--x using chmod

Chmod is a well known command line utility, that's used to manage file permissions on MacOS, Linux and other Unix like operating systems. While there are multiple ways to use chmod, on this site, we have chosen to focus exclusively on using chmod with Octal Notation. The following examples illustrate exactly how to change your desired file to permissions matching "511 or -r-x--x--x" using the command line and chmod. If you're lost on how to manually manage file permissions, see our guide - How Do I Change File Permissions Using chmod?

From your terminal run the following command, within a directory containing the file you wish to change permissions on. In this case the filename is "yourfile.txt"
$ chmod 511 yourfile.txt
Confirming your change, your file's symbolic permissions should now be "-r-x--x--x"
$ ls -l

# your output will be similar to the following
-r-x--x--x 14 root root 4096 Jun 22 07:36 yourfile.txt

 

/usr/bin/ls is an ELF 64-bit executable and "r"ead access in not required by the kernel to execute it.
$  ## Determine the current user, group, and supplementary groups
$ id
uid=1001(terry) gid=100(users) groups=100(users),600(ftpaccess),601(terry),1001(mktg),1002(acctg),1004(family)

$ ## Determine the file type of /usr/bin/ls
$ file /usr/bin/ls  
/usr/bin/ls: executable, regular file, no read permission

$ ## Show the permissions, owner, group of /usr/bin/ls 
$ ls -l /usr/bin/ls
-r-x--x--x 1 root root 110272 Mar 17  2014 /usr/bin/ls

$ ##  Try to run the ls command as user terry, group users
$ ls -l /tmp/Test
total 12
drwxr-xr-x 3 root root 4096 Aug 11  2015 a
-rw-r--r-- 1 root root 8003 Feb 22  2016 known_hosts
Note that if a file is a shell script, read permission is required, in addition to execute, because the user's shell must be able to read a script in order to run it.  This is not the case with binary executable files, where only the "x" bit needs set.
Aside:  In the case of a shell script, a script file with read, but not execute permission, can be passed to the shell as an argument to be run, eg.  "bash  script.sh"
See "Execute Permission of a file" at http://www.grymoire.com/Unix/Permissions.html#TOC

SOURCE

http://www.grymoire.com/Unix/Permissions.html#TOC
Share:

Popular Posts