IT Questions and Answers :)

Thursday, August 1, 2019

A higher end laser printer is making odd marks even when you print the printer config. What is the best way to find the culprit? And you can't tell or your guess was wrong based on the mark spacing and relating to the roller size.

A higher end laser printer is making odd marks even when you print the printer config. What is the best way to find the culprit? And you can't tell or your guess was wrong based on the mark spacing and relating to the roller size.

  • Use a half stop test.
  • Try printing using another computer or driver.
  • Reboot the computer
  • Throw it out because you don't want to fix it. 
A higher end laser printer is making odd marks even when you print the printer config. What is the best way to find the culprit? And you can't tell or your guess was wrong based on the mark spacing and relating to the roller size.

EXPLANATION

 Printer problem, it may be caused by an outdated or a faulty printer driver. Outdated printer drivers cause major compatibility issues and render your device useless.

Or restart the spooler service

net stop spooler
net start spooler
exit

 

Share:

DHCP does not work on subnets attached to a router that don't have a DHCP server on them. What is the most probable cause?

DHCP does not work on subnets attached to a router that don't have a DHCP server on them. What is the most probable cause?

  • No DHCP relay is set on the router interfaces
  • The DHCP server is down
  • You need a DHCP server for every subnet and vlan
  • This is not possible 

EXPLANATION

Dynamic Host Configuration Protocol (DHCP) servers provide configuration parameters to DHCP clients. DHCP supplies network settings, including the host IP address, the default gateway, and a DNS server. When DHCP clients and associated servers do not reside on the same IP network or subnet, a DHCP relay agent can transfer DHCP messages between them. The DHCP relay agent operates as the interface between DHCP clients and the server. It listens for client requests and adds vital configuration data, such as the client's link information, which is needed by the server to allocate the address for the client. When the DHCP server responds, the DHCP relay agent forwards the reply back to the DHCP client.  

SOURCE

 https://www.cisco.com/c/en/us/td/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA4_1_0/configuration/rtg_brdg/guide/rtbrgdgd/dhcp.pdf 

 

Share:

Wednesday, July 31, 2019

What is VOIP?

What is VOIP?

  • A method of delivering voice and multimedia communications over the internet
  • A method of segregating multiple networks over the same physical infrastructure
  • A platform that allows you to manage virtual machine on a host
  • A telephone answering machine and call returning service offered by telecoms providers

EXPLANATION

Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
The terms Internet telephony, broadband telephony, and broadband phone service specifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN).

SOURCE

https://en.wikipedia.org/wiki/Voice_over_IP
Share:

Tuesday, July 30, 2019

In a database, cardinality refers to:

In a database, cardinality refers to:

  • Which command gets executed first
  • How many columns a table contains
  • How many rows a table contains
  • How many unique values are in a column of a table 
 
In a database, cardinality refers to:
 

EXPLANATION

In databases, cardinality refers to the how many unique data values each column contains. High cardinality columns contain unique data values. Low cardinality columns contain few unique values.

SOURCE

http://www.sqlservercentral.com/blogs/matthew-mcgiffen-dba/2017/06/20/statistics-and-cardinality-estimation/
Share:

Wednesday, July 24, 2019

What wireless attack is able to trick devices/users into connecting to it by appearing as trusted network that they have connected to in the past.

What wireless attack is able to trick devices/users into connecting to it by appearing as trusted network that they have connected to in the past.

  • Spoofing
  • Evil Twin
  • Replay
  • Disassociation 
What wireless attack is able to trick devices/users into connecting to it by appearing as trusted network that they have connected to in the past.

EXPLANATION

Evil Twin is the correct answer. Disassociation (or deauth) attacks send special packets to kick a client device off a network and can be used to help connect a target to the evil twin.
Replay attacks are replaying previously captured packets on a network. And though the attacker is spoofing the name of a trusted network the attack is referred to as an evil twin.

SOURCE

https://en.wikipedia.org/wiki/Evil_twin_(wireless_networks)
Share:

Popular Posts