IT Questions and Answers :)

Wednesday, November 11, 2020

What we use to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime in vSphere setting

What we use to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime in vSphere setting

  • memory hot-add
  • cpu-hotplug
  • drive hot-plug
  • cpu hot-add 

 

What we use to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime in vSphere setting

 

EXPLANATION

VMware vSphere hot add is a feature that allows an administrator to increase the random access memory (RAM) capacity of a running virtual machine (VM) without downtime

VSphere hot add can be enabled during the configuration of VMware VMs running hardware version 7 and newer, on compatible OSes and with the use of VMware Tools. Because vSphere hot add is disabled by default, and VMs must be powered off to enable it, administrators should consider enabling hot add from the start if there's a possibility that a VM will need more resources at any point.

SOURCE

https://searchvmware.techtarget.com/definition/vSphere-hot-add
 
Share:

Which of these is an NSA Type-1 Programmable Encryption Device used primarily by the Department of Defense for linux-based tracking systems?

Which of these is an NSA Type-1 Programmable Encryption Device used primarily by the Department of Defense for linux-based tracking systems?

  • SKL
  • ANCD
  • KGV-72
  • RT-1523 

 

Which of these is an NSA Type-1 Programmable Encryption Device used primarily by the Department of Defense for linux-based tracking systems?

EXPLANATION

 The KGV-72 Type-1 Programmable Encryption Device features a modular architecture with the programmability and scalability to accommodate a wide range of link and Internet Protocol (IP) in-line network encryption applications. Developed as part of the Force XXI Battle Command, Brigade-and-Below (FBCB2) Type-1 Encryption Device (T1ED) Program, the KGV-72 is a high-grade security solution that is compatible with existing and future Blue Force Tracking (BFT) terminals and transceivers. Its flexible, software-upgradeable design supports both legacy FBCB2 L-band/BLOS link communications and evolving IP standards. The KGV-72 is secured with the programmable National Security Agency (NSA)-certified Sierra II™ encryption module, which meets all requirements of the NSA’s Cryptographic Modernization initiative. Programming of Suite-A and Suite-B algorithms is also supported, allowing the KGV-72 to be used for a wide range of in-line network applications. The KGV-72 operates seamlessly with installed FBCB2 remote computers and provides high-grade traffic data encryption. For easy operation, the KGV-72 front panel features only a single knob and LED. Tested to MIL-STD-810F requirements, the KGV-72 is a military-rugged encryption device in a compact, form factor package ideal for secure force tracking applications.

Share:

Tuesday, November 10, 2020

What is the name of the file that Imagex or DISM if you wish to exclude folders from sysprep and capture?

What is the name of the file that Imagex or DISM if you wish to exclude folders from sysprep and capture?

  • wimscript.inf
  • wimconf.ini
  • sysexclude.inf
  • WimScript.ini 

 

What is the name of the file that Imagex or DISM if you wish to exclude folders from sysprep and capture?

EXPLANATION

The Deployment Image Servicing and Management (DISM) tool is a command-line tool that you can use to capture and apply Windows images. You can create a configuration list file to determine the following:

Which files and folders must be excluded from the capture process when you use the /Capture-Image option with the DISM tool.

Which folders, files, and file types must be excluded from the compression process when you use the /Compress argument.

The /ConfigFile argument enables you to customize specific compression, capture, and boundary alignment actions for each file and folder when you capture an image using DISM.exe. You can create a configuration list (.ini) file by using a text editor, such as Notepad.


SOURCE

https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/dism-configuration-list-and-wimscriptini-files-winnext
Share:

Friday, November 6, 2020

What category of Basic Input/Output System (BIOS) settings should you look for if you wanted to enable or disable Trusted Platform Module (TPM) on the host operating system?

What category of Basic Input/Output System (BIOS) settings should you look for if you wanted to enable or disable Trusted Platform Module (TPM) on the host operating system?

  • Power management
  • Memory
  • Security
  • Virtualisation 

What category of Basic Input/Output System (BIOS) settings should you look for if you wanted to enable or disable Trusted Platform Module (TPM) on the host operating system?

 

EXPLANATION

Responsive design is an approach to web design aimed at crafting sites to provide an optimal viewing and interactive experience across a wide range of devices (from desktop computer monitors to mobile phones). Responsive design is becoming more important as mobile traffic now accounts for more internet traffic.

 

Share:

Thursday, November 5, 2020

In the NMAP program, if you are running a port scan which switch will save your output to the different formats, .nmap, .xml, and .gmap?

In the NMAP program, if you are running a port scan which switch will save your output to the different formats, .nmap, .xml, and .gmap?

  • -A
  • -oA
  • -sT
  • -sV 

 

In the NMAP program, if you are running a port scan which switch will save your output to the different formats, .nmap, .xml, and .gmap?

EXPLANATION

In the NMAP port scanner, you can save your portscan as a nmap file, xml file, and a gmap file . If you want to save your one of each you can use the -oA switch. The gmap file extension can come in handy as this is a grepable file. If you were going to scan a network with the command nmap -p-oA initial 10.0.0.0/24 you could use the grep command to find a host in the network utilizing a specific port. Perhaps your goal is to find FTP servers. In this case you might run the command grep output.gmap for the ftp service.

SOURCE

https://nmap.org/book/man-output.html
Share:

Wednesday, November 4, 2020

What Is The Maximum Number Of Network Adapters Allowed For NIC Teaming In Windows Server 2012 / R2 or Windows Server 2016?

What Is The Maximum Number Of Network Adapters Allowed For NIC Teaming In Windows Server 2012 / R2 or Windows Server 2016?

  • 32
  • 20
  • 16
  • 24

What Is The Maximum Number Of Network Adapters Allowed For NIC Teaming In Windows Server 2012 / R2 or Windows Server 2016?

 

EXPLANATION

NIC Teaming allows you to group between one and thirty-two physical Ethernet network adapters into one or more software-based virtual network adapters. These virtual network adapters provide fast performance and fault tolerance in the event of a network adapter failure.

Information source:  Microsoft TechNet: NIC Teaming

 

Share:

Tuesday, November 3, 2020

In the C# Programming Language, how would you write a "Line" of text to the Console?

In the C# Programming Language, how would you write a "Line" of text to the Console?

Share:

Popular Posts