Mozilla adds 'Do Not Track' to newest Firefox 4 beta

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Mozilla adds 'Do Not Track' to newest Firefox 4 beta


Mozilla adds 'Do Not Track' to newest Firefox 4 beta

Posted: 10 Feb 2011 08:47 AM PST


Mozilla has rolled out the eleventh beta of Firefox 4, adding the "Do Not Track" feature it touted three weeks ago to the browser.

Google boosts log-in protection for its users

Posted: 10 Feb 2011 07:56 AM PST


Google will offer its hundreds of millions of users the option of adding a second verification step when signing into their accounts, to complement the existing password-only authentication mechanism.

Security startup hopes it holds key for cloud encryption

Posted: 10 Feb 2011 07:17 AM PST


James Williamson, IT coordinator at the New Canadian Democratic Party (NPD), on the ups and downs of storage, data protection and regulatory compliance in the cloud.

RSA Conference 2011: Cloud security challenges dominate

Posted: 10 Feb 2011 06:17 AM PST


RSA Conference 2011 in San Francisco Feb. 14-18 will feature a number of sessions devoted to cloud security issues.

CCNA1 Final <= NEWS 2010

Posted: 18 Nov 2010 05:16 PM PST


What information is used at each hop to determine where the packet will be forwarded next?
the IP packet header
the incoming interface
the transport layer PDU
the source MAC address


Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1



Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?
straight-through cable
crossover cable
rollover cable
serial cable
Contact admin now. I will send full file with text and images for you.
Contact me at: nguyenhuuhai.it@gmail.com

IP Addressing

Posted: 30 Sep 2010 06:18 AM PDT









An IP address is a unique logical identifier for a node or host connection on an IP network. An IP address is a 32 bit binary number, and represented as 4 decimal values of 8 bits each. The decimal values range from 0 to 255. This is known as "dotted decimal" notation.
Example: 192.189.210.078
It is sometimes useful to view the values in their binary form.
192     .189     .210     .078
11000000.10111101.11010010.1001110

Every IP address consists of network identifier and node identifier. The IP network is divided based on Class of network. The class of network is determined by the leading bits of the IP address as shown below.

Address Classes

There are 5 different address classes. You can determine which class any IP
address is in by examining the first 4 bits of the IP address.
  • Class A addresses begin with 0xxx, or 1 to 126 decimal.
  • Class B addresses begin with 10xx, or 128 to 191 decimal.
  • Class C addresses begin with 110x, or 192 to 223 decimal.
  • Class D addresses begin with 1110, or 224 to 239 decimal.
  • Class E addresses begin with 1111, or 240 to 254 decimal.
Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for internal testing on a local machine. Class D addresses are reserved for multicasting. Class E addresses are reserved for future use. They should not be used for host addresses.

Now we can see how the Class determines, by default, which part of the IP address belongs to the network (N) and which part belongs to the Host/node (H).

  • Class A: NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
  • Class B: NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
  • Class C: NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
In the example, 192.189.210.078 is a Class C address so by default the Network part of the address (also known as the Network Address) is defined by the first three octets (192.189.210.XXX) and the node part is defined by the last one octets (XXX.XXX.XXX.078).

In order to specify the network address for a given IP address, the node section is set to all "0"s. In our example, 192.189.210.0 specifies the network address for 192.189.210.078. When the node section is set to all "1"s, it specifies a broadcast that is sent to all hosts on the network. 192.189.210.255 specifies the broadcast address.

Private Subnets

There are three IP network addresses reserved for private networks. The addresses are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. They can be used by anyone setting up internal IP networks, such as an intranet. Internet routers never forward the private addresses over the public Internet.

CCNA 4 Chapter 8

Posted: 26 Oct 2010 06:46 AM PDT


1. What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28?
192.168.3.32 0.0.0.7
192.168.3.32 0.0.0.15
192.168.3.40 0.0.0.7
192.168.3.40 0.0.0.15

2. Excessive broadcasts are generally a symptom of a problem at which layer?
physical
data link
network
transport


3.

Refer to the exhibit. Which three pieces of information can be determined by analyzing the output shown? (Choose three.)
A carrier detect signal is present.
Keepalives are being received successfully.
Default encapsulation is used on this serial link.
Packets passing this interface cannot exceed 1 KB in size.
The reliability of this link is very low.
The LCP negotiation phase is complete.



4. A network administrator has received complaints that users on a local LAN can retrieve e-mail from a remote e-mail server but are unable to open web pages on the same server. Services at which two layers of the OSI model should be investigated during the troubleshooting process? (Choose two.)
physical layer
data link layer
network layer
transport layer
application layer

5. When gathering symptoms for troubleshooting a network problem, which step could result in getting an external administrator involved in the process?
narrowing the scope
gathering symptoms from suspect devices
analyzing existing symptoms
determining ownership


6. Encapsulation errors from mismatched WAN protocols on a serial link between two routers indicate a problem at which OSI layer?
physical
data link
network
transport

7.

Refer to the exhibit. Users at Branch B are reporting trouble accessing a corporate website running on a server that is located at HQ. HQ and Branch A users can access the website. R3 is able to ping 10.10.10.1 successfully but not 10.10.10.2. The users at Branch B can access servers at Branch A. Which two statements are true aboutthe troubleshooting efforts? (Choose two.)
The web server should be tested for an application layer problem.
Frame Relay at R3 and R2 should be tested to narrow the scope of the problem.
The fact that users at Branch A are working normally proves that there is no problem at R2.
An ACL entry error could cause the failure at Layer 4 in either R3 or R2.
The successful ping from R3 to R1 proves that the WAN is functioning normally. Therefore, the problem has to be in the upper layers.

8. Which troubleshooting approach is suggested for dealing with a complex problem that is suspected of being caused by faulty network cabling?
bottom up
top down
divide and conquer
middle out

9. Users are complaining of very long wait times to access resources on the network. The show interface command reveals collision counts far above the network baseline. At which OSI layer should the administrator begin troubleshooting?
application
transport
network
data link
physical

10.

Refer to the exhibit. Users on the Internal LAN are unable to connect to the www server. The network administrator pings the server and verifies that NAT is functioning correctly. Which OSI layer should the administrator begin to troubleshoot next?
physical
data link
network
application

11. Which two statements are true concerning logical networking models? (Choose two.)
TCP/IP splits the lowest layer of the OSI model into two separate layers.
The top layer of the TCP/IP model combines the functions of the top three OSI layers.
Troubleshooting with the TCP/IP model requires different techniques than with the OSI model.
The network access layer is responsible for exchanging packets between devices on a TCP/IP network.
The Internet layer provides communication between applications, such as FTP, HTTP, and SMTP on separate hosts.
The TCP/IP network access layer corresponds to the OSI physical and data link layers.

12.

Refer to the exhibit. Which two steps should be taken during the process of creating network documentation? (Choose two.)
Record the information about the devices discovered in the Campus network only.
Record the information about the devices discovered in the entire network, including the remote locations.
Transfer any information about the devices from the network configuration table that corresponds to a component of the topology diagram.
Transfer only the Layer 2 and Layer 3 information about the devices from the network configuration table that corresponds to a component of the topology diagram.
Transfer the recorded information about the devices from the network configuration table gathered during peak network utilization that corresponds to a component of the topology diagram.

13. What is one example of a physical layer problem?
incorrect encapsulation
incorrect STP configuration
incorrect ARP mapping
incorrect clock rate

14. Clients across the company are reporting poor performance across all corporate applications running in the data center. Internet access and applications running across the corporate WAN are performing normally. The network administrator observes a continual broadcast of random meaningless traffic (jabber) on the application server LAN in the data center on a protocol analyzer. How should the administrator start troubleshooting?
The jabber in the data center indicates a local physical layer problem. Use the protocol analyzer to determine the source of the jabber, and then check for a recent NIC driver update or bad cabling.
Because all clients are experiencing application problems, the administrator should use a top-down approach with the application servers in the data center.
The scope of the problem indicates a likely routing or spanning-tree problem. Begin by checking routing tables, and follow up using appropriate STP show commands to find a loop if routing is working normally.
Poll the staff to determine if any recent changes have been made. Back out all the changes one by one until the error condition is fixed.

15. A technician has been asked to make several changes to the configuration and topology of a network and then determine the outcome of the changes. What tool can be used to determine the overall effect caused by the changes?
baselining tool
knowledge base
protocol analyzer
cable tester

16. A technician has been asked to troubleshoot an existing switched network but is unable to locate documentation for the VLAN configuration. Which troubleshooting tool allows the technician to map and discover VLAN and port assignments?
cable analyzer
network analyzer
protocol analyzer
knowledge base

17. Which two pieces of information are typically found on a logical network diagram? (Choose two.)
cable types
connector types
interface identifiers
DLCI for virtual circuits
operating system versions

18. Which two components should be taken into consideration when establishing a network baseline? (Choose two.)
information about the network design
IP addressing allocation on the network
requirements about the service provider setup
requirements for access control lists to regulate traffic
expected performance under normal operating conditions

19. Which three approaches should be used when attempting to gather data from users for troubleshooting? (Choose three.)
Determine fault.
Get to know the user to build trust.
Obtain information by asking simple pertinent questions.
Impress the user with use of technical language and skills.
Determine if the problem is related to time or a specific event.
Determine if the user can re-create the problem or events leading to the problem.

20. Information about which OSI layers of connected Cisco devices can be verified with the show cdp neighbors command?
All layers
Layer 1, Layer 2, and Layer 3
Layer 1, Layer 2, Layer 3, and Layer 4
Layer 6 and Layer 7

CCNA 4 Final Exam V4.0 2010

Posted: 28 Dec 2010 05:20 PM PST


1. What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?
define which addresses can be translated
define which addresses are assigned to a NAT pool
define which addresses are allowed out the router
define which addresses can be accessed from the inside network

2. Which three guidelines would help contribute to creating a strong password policy? (Choose three.)
Once a good password is created, do not change it.
Deliberately misspell words when creating passwords.
Create passwords that are at least 8 characters in length.
Use combinations of upper case, lower case, and special characters.
Write passwords in locations that can be easily retrieved to avoid being locked out.
Use long words found in the dictionary to make passwords that are easy to remember.


3. Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode. What is a possible problem?
There is insufficient RAM for the IOS to load on this router.
A password recovery process should be done on this router.
The bootstrap version and the version of the IOS are different.
The IOS image is damaged and must be reloaded using tftpdnld.
The configuration register is set to ignore the startup configuration.



4. Which option correctly defines the capacity through the local loop guaranteed to a customer by the service provider?
BE
DE
CIR
CBIR

5. Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP server. The output of the debug ip dhcp server command shows "DHCPD: there is no address pool for 10.1.1.1". What is the problem?
The 10.1.1.1 address is already configured on Fa0/0.
The default router for the 10Network pool is incorrect.
The ip helper-address must be added to Fa0/0 interface.
The pool of addresses for the 10Network pool is incorrect.



6. Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?
ATM
Frame Relay
HDLC
PPP
SDLC

7. Refer to the exhibit. Which statement correctly describes how Router1 processes an FTP request that enters interface s0/0/0 and is destined for an FTP server at IP address 192.168.1.5?
The router matches the incoming packet to the statement that was created by the access-list 201 deny icmp 192.168.1.0 0.0.0.255 any command, continues comparing the packet to the remaining statements in ACL 201 to ensure that no subsequent statements allow FTP, and then the router drops the packet.
The router reaches the end of ACL 101 without matching a condition and drops the packet because there is no statement that was created by the access-list 101 permit ip any any command.
The router matches the incoming packet to the statement that was created by the access-list 101 permit ip any 192.168.1.0 0.0.0.255 command and allows the packet into the router.
It matches the incoming packet to the statement that was created by the access-list 201 permit ip any any command and allows the packet into the router.

8. Compared with IDS systems, what can IPS systems do to provide further protection of computer systems?
detect potential attacks
stop the detected attack from executing
update OS patches for computer systems
scan computer systems for viruses and spyware

9. Which IEEE 802.16 broadband wireless technology allows users to connect to the ISP at speeds comparable to DSL and cable?
Wi-Fi
satellite
WiMAX
Metro Ethernet

10. A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?
Conduct a performance test and compare with the baseline that was established previously.
Interview departmental secretaries and determine if they think load time for web pages has improved.
Determine performance on the intranet by monitoring load times of company web pages from remote sites.
Compare the hit counts on the company web server for the current week to the values that were recorded in previous weeks.

11. Refer to the exhibit. What is the meaning of the term dynamic in the output of the command?
The bandwidth capability of the interface increases and decreases automatically based on BECNs.
The Serial0/0/1 interface acquired 172.16.3.1 from a DHCP server.
The mapping between DLCI 100 and 172.16.3.1 was learned through Inverse ARP.
DLCI 100 will automatically adapt to changes in the Frame Relay cloud.

12. Which type of ACL will permit traffic inbound into a private network only if an outbound session has already been established between the source and destination?
extended
reflexive
standard
time-based

13. Which two statements are true about IPv6 link local addresses? (Choose two.)
They begin with the 2000::/3 prefix.
They begin with the FE80::/10 prefix.
They are assigned by IANA to an organization.
They must be manually configured by the administrator.
They are assigned to a host by a stateless autoconfiguration process.

14. A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide compared to a shared Frame Relay solution? (Choose two.)
reduced jitter
reduced costs
reduced latency
the ability to burst above guaranteed bandwidth
the ability to borrow unused bandwidth from the leased lines of other customers

15. Refer to the exhibit. A network administrator is trying to connect R1 remotely to make configuration changes. Based on the exhibited command output, what will be the result when attempting to connect to R1?
failure to connect due to Telnet not being enabled
failure to connect due to incomplete configuration for Telnet
a successful connection and ability to make configuration changes
a successful connection but inability to make configuration changes because of the absence of an enable secret password

16. What are two effective measures for securing routers? (Choose two.)
Protect all active router interfaces by configuring them as passive interfaces.
Configure remote administration through VTY lines for Telnet access.
Use quotes or phrases to create pass phrases.
Disable the HTTP server service.
Enable SNMP traps.

17. An issue of response time has recently arisen on an application server. The new release of a software package has also been installed on the server. The configuration of the network has changed recently. To identify the problem, individuals from both teams responsible for the recent changes begin to investigate the source of the problem. Which statement applies to this situation?
Scheduling will be easy if the network and software teams work independently.
It will be difficult to isolate the problem if two teams are implementing changes independently.
Results from changes will be easier to reconcile and document if each team works in isolation.
Only results from the software package should be tested as the network is designed to accommodate the proposed software platform.

18. Refer to the exhibit. From the output of the show interfaces and ping commands, at which layer of the OSI model is a fault indicated?
application
transport
network
data link
physical

19. Which technology is used to dynamically map next hop, network layer addresses to virtual circuits in a Frame Relay network?
Inverse ARP
LMI
DLCI
FECN

20. An administrator learns of an e-mail that has been received by a number of users in the company. This e-mail appears to come from the office of the administrator. The e-mail asks the users to confirm their account and password information. Which type of security threat does this e-mail represent?
cracking
phishing
phreaking
spamming

21. Refer to the exhibit. Which data transmission technology is being represented?
TDM
PPP
HDLC
SLIP

22. Refer to the exhibit. Results of the show vlan and show vtp status commands for switches S1 and S2 are displayed in the exhibit. VLAN 11 was created on S1. Why is VLAN 11 missing from S2?
There is a Layer 2 loop.
The VTP domain names do not match.
Only one switch can be in server mode.
S2 has a higher spanning-tree priority for VLAN 11 than S1 does.

23. What is the result of adding the global command service password-encryption to the configuration of a router?
Line passwords are encrypted with type 7 encryption.
Enable passwords are encrypted with type 5 encryption.
All services must provide an encrypted password to function.
Only encrypted messages are allowed for router communication.

24. While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows "up, line protocol up". The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?
application layer
network layer
data link layer
physical layer

25. Where does a service provider assume responsibility from a customer for a WAN connection?
local loop
DTE cable on router
demarcation point
demilitarized zone

26. What will be the result of adding the command ip dhcp excluded-address 192.168.24.1 192.168.24.5 to the configuration of a local router that has been configured as a DHCP server?
Traffic that is destined for 192.168.24.1 and 192.168.24.5 will be dropped by the router.
Traffic will not be routed from clients with addresses between 192.168.24.1 and 192.168.24.5.
The DHCP server will not issue the addresses ranging from 192.168.24.1 to 192.168.24.5.
The router will ignore all traffic that comes from the DHCP servers with addresses 192.168.24.1 and 192.168.24.5.

27. Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router Router1 are shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which action will correct the problem but still restrict other traffic between the two networks?
Apply the ACL in the inbound direction.
Apply the ACL on the FastEthernet 0/0 interface.
Reverse the order of the TCP protocol statements in the ACL.
Modify the second entry in the list to permit tcp host 172.16.10.10 any eq telnet .

28. Refer to the exhibit. The corporate network that is shown has been assigned network 172.16.128.0/19 for use at branch office LANs. If VLSM is used, what mask should be used for addressing hosts at Branch4 with minimal waste from unused addresses?
/19
/20
/21
/22
/23
/24

29. Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not received any RIP routing updates. What will fix the issue?
Enable RIP authentication on R2.
Issue the ip directed-broadcast command on R2.
Change the subnet masks to 10.11.12.0/8 and 172.16.40.0/16 on R2.
Enable CDP on R2 so that the other routers will receive routing updates.

30. Refer to the exhibit. This serial interface is not functioning correctly. Based on the output shown, what is the most likely cause?
improper LMI type
interface reset
PPP negotiation failure
unplugged cable

31. Which statement is true about PAP in the authentication of a PPP session?
PAP uses a two-way handshake.
The password is unique and random.
PAP conducts periodic password challenges.
PAP uses MD5 hashing to keep the password secure.

32. An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
When IPv4 and IPv6 are configured on the same interface, all IPv4 addresses are over-written in favor of the newer technology.
Incorrect IPv4 addresses are entered on the router interfaces.
RIPng is incompatible with dual-stack technology.
IPv4 is incompatible with RIPng.

33. What is tunneling?
using digital certificates to ensure that data endpoints are authentic
creating a hash to ensure the integrity of data as it traverses a network
using alternate paths to avoid access control lists and bypass security measures
encapsulating an entire packet within another packet for transmission over a network

34. Which statement is true about NCP?
Link termination is the responsibility of NCP.
Each network protocol has a corresponding NCP.
NCP establishes the initial link between PPP devices.
NCP tests the link to ensure that the link quality is sufficient.

35. Refer to the exhibit. A network administrator is creating a prototype to verify the new WAN design. However, the communication between the two routers cannot be established. Based on the output of the commands, what can be done to solve the problem?
Replace the serial cable .
Replace the WIC on RA.
Configure RA with a clock rate command.
Issue a no shutdown interface command on RB.

36. Refer to the exhibit. Based on the output as shown, which two statements correctly define how the router will treat Telnet traffic that comes into interface FastEthernet 0/1? (Choose two).
Telnet to 172.16.10.0/24 is denied.
Telnet to 172.16.20.0/24 is denied.
Telnet to 172.16.0.0/24 is permitted.
Telnet to 172.16.10.0/24 is permitted.
Telnet to 172.16.20.0/24 is permitted.

37. Which Frame Relay flow control mechanism is used to signal routers that they should reduce the flow rate of frames?
DE
BE
CIR
FECN
CBIR

38. Refer to the exhibit. A network administrator configures a standard access control list on Router1 to prohibit traffic from the 192.168.0.0/24 network from reaching the Internet. The access control list also permits traffic from the 192.168.0.0/24 network to reach the 192.168.1.0/24 network. On which interface and in which direction should the access control list be applied?
interface Fa0/0, inbound
interface Fa0/0, outbound
interface S0/0/0, inbound
interface S0/0/0, outbound

39. Which configuration on the vty lines provides the best security measure for network administrators to remotely access the core routers at headquarters?
RouterConfiguration1 thumb CCNA 4 Final Exam V4.0 Answers
RouterConfiguration2 thumb CCNA 4 Final Exam V4.0 Answers
RouterConfiguration3 thumb CCNA 4 Final Exam V4.0 Answers
RouterConfiguration4 thumb CCNA 4 Final Exam V4.0 Answers
Answer: 3nd option

40. Refer to the exhibit. What can be concluded from the exhibited output of the debug ip nat command?
The 10.1.1.225 host is exchanging packets with the 192.168.0.10 host.
The native 10.1.200.254 address is being translated to 192.168.0.10.
The 192.168.0.0/24 network is the inside network.
Port address translation is in effect.

41. A network administrator is instructing a technician on best practices for applying ACLs. Which suggestion should the administrator provide?
Named ACLs are less efficient than numbered ACLs.
Standard ACLs should be applied closest to the core layer.
ACLs applied to outbound interfaces are the most efficient.
Extended ACLs should be applied closest to the source that is specified by the ACL.

42. Refer to the exhibit. Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices?
ATM
VPN
ISDN
Frame Relay
broadband DSL

43. Which three physical network problems should be checked when a bottom-up troubleshooting approach has been chosen to troubleshoot network performance? (Choose three.)
cable connectivity
high collision counts
STP failures and loops
address mapping errors
high CPU utilization rates
excess packets that are filtered by the firewall

44. Refer to the exhibit. A network administrator is attempting to configure a Frame Relay network. The administrator enters the commands as shown in the exhibit on R2, but the Frame Relay PVCs are inactive. What is the problem?
The incorrect DLCI numbers are being configured on R2.
The S0/0/0 interface on R2 needs to be point-to-point.
The frame-relay map commands are missing the cisco keyword at the end.
A single router interface cannot connect to more than one Frame Relay peer at a time.

45. Which IP address and wildcard mask would be used in an ACL to block traffic from all hosts on the same subnet as host 192.168.16.43/28?
access-list 10 deny 192.168.16.0 0.0.0.31
access-list 10 deny 192.168.16.16 0.0.0.31
access-list 10 deny 192.168.16.32 0.0.0.16
access-list 10 deny 192.168.16.32 0.0.0.15
access-list 10 deny 192.168.16.43 0.0.0.16

46. Which combination of Layer 2 protocol and authentication should be used to establish a link without sending authentication information in plain text between a Cisco and a non-Cisco router?
PPP with PAP
PPP with CHAP
HDLC with PAP
HDLC with CHAP

47. When would the multipoint keyword be used in Frame Relay PVCs configuration?
when global DLCIs are in use
when using physical interfaces
when multicasts must be supported
when participating routers are in the same subnet

48. A network technician analyzes the network and notices late collisions. The collisions occur accompanied by jabber that originates from the server. What is the likely cause of the problem?
faulty switch port
web server CPU overload
faulty NIC in the web server
misconfiguration of web server services

49. Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside network. Host A has sent a packet to the web server. What is the destination IP address of the return packet from the web server?
10.1.1.2:1234
172.30.20.1:1234
172.30.20.1:3333
192.168.1.2:80

50. Refer to the exhibit. All devices are configured as shown in the exhibit. PC1 is unable to ping the default gateway. What is the cause of the problem?
The default gateway is in the wrong subnet.
STP has blocked the port that PC1 is connected to.
Port Fa0/2 on S2 is assigned to the wrong VLAN.
S2 has the wrong IP address assigned to the VLAN30 interface.

51. When Frame Relay encapsulation is used, what feature provides flow control and exchanges information about the status of virtual circuits?
LCP
LMI
DLCI
Inverse ARP

52. A network administrator is tasked with maintaining two remote locations in the same city. Both locations use the same service provider and have the same service plan for DSL service. When comparing download rates, it is noticed that the location on the East side of town has a faster download rate than the location on the West side of town. How can this be explained?
The West side has a high volume of POTS traffic.
The West side of town is downloading larger packets.
The service provider is closer to the location on the East side.
More clients share a connection to the DSLAM on the West side.

Engineer,CCNA ATM VOIP Lan Wan

Posted: 14 Jan 2010 05:47 PM PST


Company Profile
Subex Technologies offers Software Services for building and deploying products/ applications that help Telecom and Media service providers offer integrated, bundled and convergent services over IP networks including Media services like IPTV, Triple Play, and Interactive TV, etc.
 
  Job Details 
Title: Engineer,CCNA ATM VOIP Lan Wan
Posted On:  1/12/2010 8:53:18 AM
Designation: 

Engineer,CCNA ATM VOIP Lan Wan

No. of vacancies:  1
Qualifications:  2 year degree desirable
Essential Skills:
Not specified
Minimum Total Experience:  2
Job Tenure:  No Preference/Any
Salary Offered: 
Job Location:  Piscataway, NJ United States

  Job Description
Major Responsibilities


Render technical support to customers for all AST supported services.
Analyze and resolve all customer circuit impairments
Process Orders
Manually configure switches and routers
Perform Layer I, II, and III troubleshooting
Support end-to-end Customer Test and Turn-up.
Work with and support various internal organizations during pre/post deployment testing and pre-sales.

Required Skills/Knowledge


Familiarity with Cisco routers
Understanding of IP and subnetting.
Understanding of the OSI Model
Ability to Multitask
Time management
Excellent written and verbal communication
Exceptional Interpersonal Skills
Ability to work independently and take ownership of troubles
Aptitude for segmenting, diagnosing, and resolving complex troubles

Desirable Skills/Knowledge


Customer service experience
Knowledge of FR, ATM, or DSL
Frame and ATM Switches

Education and Work Experience.


2 year degree desirable
CCNA a plus

Skill Experience Need
1) Switches and Routers Expert Required
2) Project Management Expert Required
3) Communication skills Expert Required
4) IP and subnetting Expert Required
5) Customer Service Expert Required
6) Frame and ATM Switches Expert Required
7) CCNA Expert Desired


Source: http://www.careerjet.com/job/c383956fe359d6a34192ad4bb2e64c21.html

All Answer CCNA1, CCNA2, CCNA3, CCNA4, CCNA Final

Posted: 16 Jan 2010 05:58 AM PST


http://www.4shared.com/file/138281712/49a03690/CCNA1_chapter_1.html
http://www.4shared.com/file/138281721/fb8434e9/CCNA1_chapter_2_v1.html
http://www.4shared.com/file/138281726/65e0a14a/CCNA1_chapter_2_v2.html
http://www.4shared.com/file/138281738/9b43bd0c/CCNA1_chapter_3_v1.html
http://www.4shared.com/file/138281742/34d7c2d5/CCNA1_chapter_3_v2.html
http://www.4shared.com/file/138281754/c4af56a1/CCNA1_chapter_4_v1.html
http://www.4shared.com/file/138281759/ba1e2a1c/CCNA1_chapter_4_v2.html
http://www.4shared.com/file/138281768/e6344949/CCNA1_chapter_5_v1.html
http://www.4shared.com/file/138281770/f1f4f03a/CCNA1_chapter_5_v2.html
http://www.4shared.com/file/138281777/6f906599/CCNA1_chapter_6_v1.html
http://www.4shared.com/file/138281780/766cecf5/CCNA1_chapter_6_v2.html
http://www.4shared.com/file/138281789/fb05451/CCNA1_chapter_7_v1.html
http://www.4shared.com/file/138281792/8179bc98/CCNA1_chapter_7_v2.html
http://www.4shared.com/file/138281802/5be740ec/CCNA1_chapter_8_v1.html
http://www.4shared.com/file/138281811/dbf52017/CCNA1_chapter_8_v2.html
http://www.4shared.com/file/138281816/4591b5b4/CCNA1_chapter_9_v1.html
http://www.4shared.com/file/138281821/f0d873d4/CCNA1_chapter_10_v1.html
http://www.4shared.com/file/138281824/80b2875b/CCNA1_chapter_11_v1.html
http://www.4shared.com/file/138281829/fe03fbe6/CCNA2_chapter_1_v1.html
http://www.4shared.com/file/138281832/70ca132f/CCNA2_chapter_2_v1.html
http://www.4shared.com/file/138281838/901ffa31/CCNA2_chapter_2_v2.html
http://www.4shared.com/file/138281847/4fe17167/CCNA2_chapter_3_v1.html
http://www.4shared.com/file/138281852/2690b4a9/CCNA2_chapter_3_v2.html
http://www.4shared.com/file/138281857/56fa4026/CCNA2_chapter_4_v1.html
http://www.4shared.com/file/138281860/e3b38646/CCNA2_chapter_4_v2.html
http://www.4shared.com/file/138281868/ed680e74/CCNA2_chapter_4_v3.html
http://www.4shared.com/file/138281874/fdc5731e/CCNA2_chapter_5_v1.html
http://www.4shared.com/file/138281881/a379b5e/CCNA2_chapter_5_v2.html
http://www.4shared.com/file/138281884/7a5d6fd1/CCNA2_chapter_6_v1.html
http://www.4shared.com/file/138281888/73eb23fa/CCNA2_chapter_6_v2.html
http://www.4shared.com/file/138281889/4ec136c/CCNA2_chapter_6_v3.html
http://www.4shared.com/file/138281893/fd22cb33/CCNA2_chapter_7_v1.html
http://www.4shared.com/file/138281897/fa4f0f2a/CCNA2_chapter_7_v2.html
http://www.4shared.com/file/138281905/c441bf78/CCNA2_chapter_8_v1.html
http://www.4shared.com/file/138281910/ad307ab6/CCNA2_chapter_8_v2.html
http://www.4shared.com/file/138281913/34392b0c/CCNA2_chapter_10_v1.html
http://www.4shared.com/file/138281912/433e1b9a/CCNA2_chapter_9_v1.html
http://www.4shared.com/file/138281918/a3ebf284/CCNA2_chapter_11_v1.html
http://www.4shared.com/file/138281923/1f1478cf/CCNA3_chapter_1_v1.html
http://www.4shared.com/file/138281926/6f7e8c40/CCNA3_chapter_1_v2.html
http://www.4shared.com/file/138281935/ef6cecbb/CCNA3_chapter_2_v1.html
http://www.4shared.com/file/138281945/a02d7a7c/CCNA3_chapter_2_v2.html
http://www.4shared.com/file/138281951/be5b8f24/CCNA3_chapter_3_v1.html
http://www.4shared.com/file/138281956/203f1a87/CCNA3_chapter_3_v2.html
http://www.4shared.com/file/138281974/fc071929/CCNA3_chapter_4_v1.html
http://www.4shared.com/file/138281979/82b66594/CCNA3_chapter_4_v2.html
http://www.4shared.com/file/138281988/722949cd/CCNA3_chapter_4_v3.html
http://www.4shared.com/file/138281992/8be79192/CCNA3_chapter_5_v1.html
http://www.4shared.com/file/138281997/fb8d651d/CCNA3_chapter_5_v2.html
http://www.4shared.com/file/138282002/4741beba/CCNA3_chapter_6_v1.html
http://www.4shared.com/file/138282008/a79457a4/CCNA3_chapter_6_v2.html
http://www.4shared.com/file/138282011/c753de41/CCNA3_chapter_7_v1.html
http://www.4shared.com/file/138282012/5e5a8ffb/CCNA3_chapter_7_v2.html
http://www.4shared.com/file/138282021/ec7e8d82/CCNA4_chapter_1_v1.html
http://www.4shared.com/file/138282026/721a1821/CCNA4_chapter_2_v1.html
http://www.4shared.com/file/138282031/f565bcc3/CCNA4_chapter_3_v1.html
http://www.4shared.com/file/138282039/fbbe34f1/CCNA4_chapter_4_v1.html
http://www.4shared.com/file/138282043/542a4b28/CCNA4_chapter_5_v1.html
http://www.4shared.com/file/138282046/2440bfa7/CCNA4_chapter_7_v1.html
http://www.4shared.com/file/138282051/a33f1b45/CCNA4_chapter_8_v1.html

Redistribution : Rip & OSPF Using Packet Tracer

Posted: 28 Sep 2010 08:29 AM PDT


I was playing around with Packet Tracer today, thought why not give it a try. Nice program none the less. So here is a very modest try on basic redistribution. I thought it will help someone.

The lab had very basic set up, i used three routers and with a bunch of loopbacks i tested the redistribution between RIP and OSPF. You can use this lab as a tester or a reference point. PT lacks a lot of command options but is still very highly usable.

So here is the setup:

Router 1: (RIP V2)

interface Loopback1
ip address 192.168.10.100 255.255.255.0
!
interface Loopback2
ip address 2.2.2.2 255.0.0.0
!
interface Serial0/0
ip address 172.16.10.1 255.255.255.252
!
router rip
version 2
network 2.0.0.0
network 172.16.0.0
network 192.168.10.0
no auto-summary

Router 3: (OSPF 1)

interface Loopback1
ip address 3.3.3.3 255.0.0.0
!
interface Loopback2
ip address 192.168.20.100 255.255.255.0
!
interface Serial0/0
ip address 172.16.20.1 255.255.255.252
clock rate 64000
!
router ospf 1
log-adjacency-changes
network 3.3.3.3 0.0.0.0 area 0
network 192.168.20.0 0.0.0.255 area 0
network 172.16.20.0 0.0.0.3 area 0

Router 2: (Performed the redistribution)

interface Serial0/0
ip address 172.16.10.2 255.255.255.252
clock rate 64000
!
interface Serial0/1
ip address 172.16.20.2 255.255.255.252
!
router ospf 1
log-adjacency-changes
redistribute rip subnets
network 172.16.20.0 0.0.0.3 area 0
!
router rip
version 2
redistribute ospf 1 metric 5
network 172.16.0.0
no auto-summary

Outputs:

Router 1: (Rip)

Gateway of last resort is not set

C 2.0.0.0/8 is directly connected, Loopback2
3.0.0.0/32 is subnetted, 1 subnets
R 3.3.3.3 [120/5] via 172.16.10.2, 00:00:01, Serial0/0
172.16.0.0/30 is subnetted, 2 subnets
C 172.16.10.0 is directly connected, Serial0/0
R 172.16.20.0 [120/1] via 172.16.10.2, 00:00:01, Serial0/0
C 192.168.10.0/24 is directly connected, Loopback1
192.168.20.0/32 is subnetted, 1 subnets
R 192.168.20.100 [120/5] via 172.16.10.2, 00:00:01, Serial0/0

Router 3: (OSPF)

O E2 2.0.0.0/8 [110/781] via 172.16.20.2, 00:18:56, Serial0/0
C 3.0.0.0/8 is directly connected, Loopback1
172.16.0.0/30 is subnetted, 2 subnets
O E2 172.16.10.0 [110/781] via 172.16.20.2, 00:18:56, Serial0/0
C 172.16.20.0 is directly connected, Serial0/0
O E2 192.168.10.0/24 [110/781] via 172.16.20.2, 00:18:56, Serial0/0
C 192.168.20.0/24 is directly connected, Loopback2

Router 2: (Performed Redistribution)

R 2.0.0.0/8 [120/1] via 172.16.10.1, 00:00:00, Serial0/0
3.0.0.0/32 is subnetted, 1 subnets
O 3.3.3.3 [110/782] via 172.16.20.1, 00:20:15, Serial0/1
172.16.0.0/30 is subnetted, 2 subnets
C 172.16.10.0 is directly connected, Serial0/0
C 172.16.20.0 is directly connected, Serial0/1
R 192.168.10.0/24 [120/1] via 172.16.10.1, 00:00:00, Serial0/0
192.168.20.0/32 is subnetted, 1 subnets
O 192.168.20.100 [110/782] via 172.16.20.1, 00:20:15, Serial0/1

(The routes that are in bold are learned using redistribution)


Now you could use the "passive-interface" command on s0/1 of Router 2 so that route on s0/1 is advertised by RIP.

If you want the PT lab file, here is the link: hxxp://[nofileshares].com/files/195399030/redist-lab1.pkt.html

Note: As i mentioned above PT does lack some of the advance features. For example while redistributing the rip i was not able to specify the metric-type. But as you can see it still works. :)

TCL Scripting in IOS. Easy to understand Tutorial !

Posted: 29 Sep 2010 06:31 AM PDT


Hi all. Here i am with yet another tutorial. Programming in IOS. Dont confuse it with programming IOS because you cant do it. IOS is not open source so you cant make extensions/modifications to it, But IOS allows you to use TCL (pronounced "tickle") scripting language to write scripts to get tasks done in a different and more feasible way, that was either not possible before or too complicated. One example is the recent query posted by our fellow member superr about how to monitor snmp OID to trigger events. Although the solution was in EEM, but the same could be done using tcl.

Those who are totally new to this stuff will be getting confused as to what i am talking about. So lets see a few examples, that are very practical and you may encounter tasks similar to these more often.

Example 1)

When router cpu utilization reaches 30%, send an email to me, plus give only the first five top processes in "sh process cpu sorted".

Example 2)
(this is a case of ARP flooding/looping which causes the router to nearly crash)

If router cpu utilization reaches above 80%, check the current processes to see if the top 2 processes contains ARP-Input, if this is the case, check the show int to see which interface is getting lots of broadcast. Find the interface and shut it down, Wait for 3 mins and recheck the process level to see if its ok (below 80%), if yes then check the WAN link to reach the email server, if the wan link is reachable, send an email to notify the support engineer that this event has occurred !!

(dont get your head spinning, there's a lot more to follow ;-))

Example 3)

You have 200+ routers in your access. You want to make sure that every WAN interface is configured with IPsec VPN. Considering 2 WAN links per router means checking of 400 interfaces, can you do that by
1) manually opening the router and viewing the running config ?
2) manually opening the backup config stored on your pc and viewing it ?
3) Or simply open the router, paste the tcl script, that will do all the checking, in the end telling you which interfaces are not vpn enabled and optionally enabling the IPSEC vpn on them !!

Depending on your views, these example might be appealing and might not. But if you are network administrator of 100+ routers, then i consider scripting/EEM to be a must-know knowledge, SIMPLE !!. There is no option, you must learn it. It gives you more control and chances of your completing complicated tasks increase dramatically.

I would recommend the following books to learn more about tcl and how to program.

Tcl and Tk Programming for the Absolute Beginner

Hello World!: Computer Programming for Kids and Other Beginners by Warren Sande and Carter Sande (its for python)

But remember, i have spend 4 years in my BS doing programming, and no book can teach you how to program. They will at best simply teach the syntax of the programming language but wont teach you, how to solve your problems using programming language. So you need to do a lot of practice in order to become a good programmer. Remember, scriping in IOS doesnt require or expects that you start building robotic arms, or robots that speak by themselves, no automatic cars are required, NOTHING !!!!!.

Q) So what the hell i will be doing ?
A) Trust me or not, most of the time, you will be required to do string parsing, extracting your desired result, comparing it with some predefined value and doing some action. Thats it !!

Q) Is it really that simple, or you think i am a dumbo ?
A) It is !!

Q) I dont trust you, na na....
A) Then just read on, i hope i will convince you on the way :-)

Q) What if i am not convinced ?
A) You will, trust me on that ;-)

NOTE: this entire tutorial will be very very specific to scripting in IOS. Remember that.

Some of the programming essentials !

Programming is same as scripting. I may use the word program and script interchangebly, so dont get confused, they are the same thing.

Variables.

Variables are fundamental in every programming language. You will never see a language without variables, and perhaps not a single proper program written without using variables. NEVER !!

Variables are simply places to hold values. Consider this

myfirstvar = 4

over here, the name of variable is "myfirstvar" and the value of this variable is 4. simple :-).

Q) Hey hey, what simple ? whats simple about this ? when and why i will be using variables ?
A) You will use variables under two conditions

1) When you are taking input from the user
2) When you need to use a same value more then "1" time in your program.

User input must be kept somewhere, so for that purpose its necassary to use variables or more properly storage areas.

Now before going into detail, lets see tcl in your router. login to your router and type tclsh from exec mode.

Printing on screen.

R1# tclsh
R1(tcl)# puts "hi, i am in tcl :-)"
hi, i am in tcl :-)

R1(tcl)#

"puts" keyword simply displays what ever is given under inverted commas on screen.

Variables.

R1(tcl)# set myfirstvar 10
10

R1(tcl)#

Over here, "set" is use to assigned a variable "myfirstvar" some value, which in this case is number "4". Now to print the variable do this,

R1(tcl)# puts myfirstvar
myfirstvar

R1(tcl)#

Now this was not i expected. the variable "myfirstvar" is simply a place to store the values. So if you have a locker in bank, then the stuff in that locker is important and not the locker. So variable is the locker, the value is the stuff you place in that locker. So to get the value inside myfirstvar, you have to put the dollar sign in front of it..

R1(tcl)# puts $myfirstvar
10

R1(tcl)#

Now lets create 2 variables, assign them numbers and add them. To do mathematical calculations, tcl uses keyword "expr"

R1(tcl)#set var1 100
100
R1(tcl)#set var2 200
200
R1(tcl)#set var3 [expr $var1 + $var2]
300
R1(tcl)#puts $var3
300

R1(tcl)#

over here "[expr $var1 + $var2]", $var1 says to tcl, that use the value kept in var1 which is 100. $var2 tells to use the value kept in var2 which is 200. expr tells tcl to perform the addition (or whatever like subtraction, multiplication, division, exponentiation). "[]" square brackets will be replaced with whatever value is calculated inside them, so the above expression is more like this

R1(tcl) set var3 300

[expr $var1 + $var2] gives value 300, which will be replaced with it and appears like above statement. We will be using square brackets alot so dont be confused.

In Tcl, you can execute IOS commands as well using following 2 keywords

1) exec -> to run privilege mode commands
2) ios_config -> to run all config mode commands.

Using Exec command

R1(tcl)#exec sh ip int brief
Interface IP-Address OK? Method Status Prot
ocol
Serial1/0 unassigned YES unset administratively down down

Serial1/1 unassigned YES unset administratively down down

Serial1/2 unassigned YES unset administratively down down

Serial1/3 unassigned YES unset administratively down down

R1(tcl)#

Using ios_config command

R1(tcl)# ios_config "int serial 1/0" "ip address 11.0.0.1 255.255.255.252" "no shut"

R1(tcl)#exec show ip int brief
Interface IP-Address OK? Method Status Prot
ocol
Serial1/0 11.0.0.1 YES unset up up

Serial1/1 unassigned YES unset administratively down down

Serial1/2 unassigned YES unset administratively down down

Serial1/3 unassigned YES unset administratively down down

R1(tcl)#

Note: While in tcl mode, you can run IOS commands directly without these keywords, but as we go deeper, you will understand why these keywords make a difference.

Now lets create a simple tcl program.

Program 1)

Create a tcl program to calculate the DRAM on your router.

Now lets see how to write a program.

1) First solve it on paper and follow the steps carefully, observe deeply how exactly did you solved this issue.

I would solve it like this

First i will do "show version"

R1#sh ver
Cisco IOS Software, 3600 Software (C3640-JS-M), Version 12.4(12), RELEASE SOFTWA
RE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright © 1986-2006 by Cisco Systems, Inc.
Compiled Fri 17-Nov-06 13:59 by prod_rel_team

ROM: ROMMON Emulation Microcode
ROM: 3600 Software (C3640-JS-M), Version 12.4(12), RELEASE SOFTWARE (fc1)

R1 uptime is 1 hour, 21 minutes
System returned to ROM by unknown reload cause - suspect boot_data[BOOT_COUNT] 0
x0, BOOT_COUNT 0, BOOTDATA 19
System image file is "tftp://255.255.255.255/unknown"

Cisco 3640 (R4700) processor (revision 0xFF) with 116736K/6144K bytes of memory.
Processor board ID 00000000
R4700 CPU at 100MHz, Implementation 33, Rev 1.2
4 Serial interfaces
DRAM configuration is 64 bits wide with parity enabled.
125K bytes of NVRAM.
8192K bytes of processor board System flash (Read/Write)

Configuration register is 0x2142
--More--

I will locate the line in bold. then i will add both values i.e. 116736 and 6144 and to convert it to MB, divide it by 1024, which gives me the value of 120.

(i am using dynamips and have given exactly 120 ram, so this calculation producess perfect result :-) ).

Now remember, machines are simply dumb, you need to tell them each and everything to solve the issue, because whether you realize it or not, you also require all the pieces together in order to solve the issue. You can sure make some assumptions, but that assumption is usually not completely random, its always based on some prior knowledge. But in case of computers, you have to tell them everything. Now lets break the above solution to MOST SIMPLISTIC STEPS.

1) Run the command show version
2) locate the line which contains the value i.e. 116737k/6144
3) Add both the values before and after "/"
4) Divide them by 1024
5) Display the result

Now as you can see, these steps cant be further broken down. Now lets solve them 1 by 1,

1) set version [exec show version]


Now for second step, we have to go a bit more DEEPER. Here starts the most important topic

PARSING THE GIVEN INPUT FOR A SPECIFIC STRING.

Q) whats a string ?
A) String is the collection of characters. Everything you type whether a number or a letter is essentially a character. So what ever we type, if it contains more then 1 character, it will become string. So this whole tutorial can be thought of a very large string.

Q) what do you mean by parsing the string ?
A) Parsing the string means, going through the string looking for something. Like in our case, i will parse (look through) show version output to locate the line containing the DRAM values.

So how to search in a given string ?. There are usually 2 methods that i use

1) Taking the input, splitting it till i get to the value i want.
2) Using regular expression.

I wont be using method 1 till i have no other way. In start i used it alot but you will realize as i did, its better to get comfortable with regular
expressions. They are fast and easy way to search for a given string.

CCNP guys must have played with BGP and surely regexp. Those who havent, you must do it. I will be giving a brief tutorial on how to use regexp.

Q) What are regular expression ?
A) They are more general/dynamic way of respresenting a given string.

Q) Oh yeah !!! i know i am being dumb but it actually went over my head you know !
A) Ok so just read on.

Lets consider the essentials of regular expression

. means anything. Including space, newline, anything
* means zero or more occurence of the character preceding this.
+ means one or more occurence of the character preceding it.
- defines the range
[] encloses the range

Q) ..... WHAT ??? i have seen regexp and they are lot more, you are cheating !!!!!!
A) Explanining regexp is not a part of this tutorial. I will be using a simplified approach to use regular expressions.

Lets practice it a bit

suppose i am giving you the following string

Hi, my height is 100 foot 11 inches. My color is fair, i have bright blue eyes and shiny hairs. Yesterday i had fever measuring 100. WOW !!

Q) Are you talking about yourself ?
A) Ofcourse not...

Now using regular expression, EXTRACT the fever value.

Now, focus the surrounding of the value you need to extract. "Yesterday i had fever measuring 100. WOW !!" and ALSO "Hi, my height is 100 foot 11 inches"

We need the second 100 value thats after word "measuring". So in my opinion, i will tell the regexp to get me the value that is after "measuring ". Rest is all garbage right ?

So in regexp, you must define what is garbage for you and what part is important. In our case, all what is before "measuring" is garbage, and all after 100 is garbage too. Garbage in regexp is denoted by ".*"

. means anything and * means zero or more times. So it becomes

anything (zero or more)times
. *

so our partial regular exp becomes

.* measuring

keep in mind, that we want to write a general expression so that it will give us any value that comes after measuring. Since this value (fever) is expected to change (since i am telling you !!), you have to generalize this using regexp.

Fever value will always be a number. its length would be 2 - 3 digits ( am i right ?) )

so regular expression for fever value might be

[0-9][0-9][0-9] TADAAAAAAAAAAAAAAAAAAAAA!!!!

Nope its wrong. This may evaluate too

First[0-9] = 1
Second[0-9] = 0
Third[0-9] = 0

This is right but not 100%. Fever values are usually like 98,99,100,102,104 etc.

So the more appropriate regexp would be

[0-9]+

Now, this says that number from 0-9 can appear more then once. Strictly speaking, it satisfies our need. But what if a value is given with 4 digits ?, or extremely high fever like 300 which is not possible, so let me give you a relief that, we wont be going into that much complication. AS long as we are able to extract our needed value out of given input, we are fine.

So the complete regular expression becomes

".*measuring [0-9]+\."

Q) Why have you written "\." ?
A) As you know that "." is the regexp itself. I wanted to write period as it was appearing in statement, so for this purpose i add "\" telling the regexp that period is the literal value and not a regexp. Same is true for other regexp such as +,* etc. When you need to specify them as literals, just place a "\" before them.

Now the syntax for tcl is as follows

first lets assign this whole statement to a variable.

R1(tcl)#set var1 "Hi, my height is 100 foot 11 inches. My color is fair, i hav$
Hi, my height is 100 foot 11 inches. My color is fair, i have bright blue eyes a
nd shiny hairs. Yesterday i had fever measuring 100. WOW !!
R1(tcl)#
R1(tcl)# regexp {.*measuring ([0-9]+)\.} $var1 complete_string fever_value
1 <- 1 means match was found. 0 means match wasnt found

R1(tcl)# puts $fever_value
100

R1(tcl)#

Now lets see the syntax. Regular expression is written after regexp keyword and in curly braces. The value you need to actually extract is placed with round brackets within those curly braces. Then you place the variable containing the string that will be evaluated by the regexp followed by yet 2 more variables. The first variable will contain the complete string (which is useless to us) and second variable contains the value that will be extracted by the round brackets, which in our case will be value 100 as show in above example.

Now lets get back to our example of extracting DRAM values from the entire show version string.

First just pick up the line contaning the values.

"Cisco 3640 (R4700) processor (revision 0xFF) with 116736K/6144K bytes of memory."

Now if you have multiple platform, then the first value "Cisco 3640" is likely to change. Just run sh version on couple of routers and see which part of this line always remain constant. In my view it was the last 3 words " bytes of memory". You can verify this by looking at the entire ouput and making sure that these 3 words dont appear anywhere else, thus making this line unique.

Now first try to write your own regexp for this.

.
.
.
.
.
.
.
.
.

Well, mine is

".*([0-9]+)K/([0-9]+)K bytes of memory."

R1(tcl)#regexp {.*with ([0-9]+)K/([0-9]+)K bytes of memory.} $version complete_string first_val second_val
1
R1(tcl)#puts $first_val
116736

R1(tcl)#puts $second_val
6144

R1(tcl)#

Now add them and divide them with 1024 to get the final result

R1(tcl)#puts "the DRAM is [expr ($first_val + $second_val) / 1024]"
the DRAM is 120

R1(tcl)#

If you want to test this before hand, paste the following lines once you are in privilege mode

---------------------------------------------------
tclsh

set version [exec show version]

regexp {.*with ([0-9]+)K/([0-9])+K bytes of memory.} $version complete_string first_val second_val

puts "the DRAM is [expr ($first_val + $second_val) / 1024]"

Check to see, if you get the correct output or not :-).


---------------------------------------------------

Now, instead of going any further, just practice the above, by extracting different strings from different inputs. Like for example, extract the following from the show version output

1) IOS name
2) Model name
3) How much Flash
4) Configuration register value.


Trust me, it just needs a practice of 1 or 2 days. We will move on once you are bit comfortable with regexp, since we will be using them alot. There would be rarely a script that will be written without them.

This is just the start. These are not TCL based EEM scripts but they use similar logic. I will be writing more if you guys are getting what i am explaining here. Just give it a little effort and you will never regret it.

Let me know of your feedback so i may write more. Plus, in your feedback, provide the regexp (complete scripts) for extracting all the 4 values i mentioned so i will also tell me that you actually learned something from this tutorial :-)

DsmbISP_Final_Exam_-_CCNA

Posted: 07 Sep 2010 06:05 PM PDT


New =>DsmbISP_Final_Exam_-_CCNA

Thank technician.usa@gmail.com

CCNA3 Final 2010

Posted: 21 Oct 2010 06:57 AM PDT


Link to this site if you copy my content. Thank Petter !
1. Which security protocol or measure would provide the greatest protection for a wireless LAN?
WPA2
cloaking SSIDs
shared WEP key
MAC address filtering

2.

Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message?
only computer 4
computer 3 and RTR-A
computer 4 and RTR-A
computer 1, computer 2, computer 4, and RTR-A
computer 1, computer 2, computer 3, computer 4, and RTR-A
all of the computers and the router


3.
Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal?
only hosts A and B
only hosts A, B, and C
only hosts A, B, C, and D
only hosts A, B, C, and E




4.
Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161. What will the router do with this packet?
The router will drop the packet.
The router will forward the packet out interface FastEthernet 0/1.1.
The router will forward the packet out interface FastEthernet 0/1.2.
The router will forward the packet out interface FastEthernet 0/1.3.
The router will forward the packet out interface FastEthernet 0/1.2 and interface FastEthernet 0/1.3.

5.
Refer to the exhibit. Which two settings show the default value of VTP configuration on a Cisco 2960 switch? (Choose two.)
revision number
existing VLANs
operating mode
domain name
pruning mode

6.
Which value determines if a switch becomes the central point of reference in the spanning tree topology?
lowest bridge ID
highest revision number
lowest numeric IP address
highest numeric MAC address

7.
What is the purpose of the Spanning Tree algorithm?
It propagates VLAN configurations to other switches.
It restricts broadcast packets to a single VLAN.
It segments a network into multiple broadcast domains.
It prevents loops in a switched network with redundant paths.

8. What are two benefits of the IEEE 802.11n standard over the IEEE 802.11G? (Choose two.)
requires less equipment
provides improved range
permits increased data rates
has a single-input and a single-output
needs no hardware upgrade for compatibility

9. Which configuration changes will increment the configuration revision number on the VTP server?
configuring trunk links on the VTP server
configuring or changing the VTP password
configuring or changing the VTP domain name
configuring or changing the VTP version number
configuring or deleting a VLAN or creating a VLAN name

10.

Refer to the exhibit. A company has acquired a new office in a campus environment. Switches in the existing office and the new office are directly connected by a trunk link. The VLANs and IP addressing are setup as shown in the exhibit. The computers in each office are not able to ping each other. What will fix the problem?
Use an access link between S2 and S3.
Connect S2 and S3 to a common router.
Set the subnet mask in the new office to /24.
Configure the new office default gateway to 172.17.10.1
Change the port assignments in the new office to a different VLAN.

11.
What is a possible impact of setting too short an aging time in the MAC address table of a switch?
overly large address table
unnecessary flooding of packets
excessive timeouts of static addresses
impaired ability to dynamically learn new addresses

12.
Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2. Hosts A, B, C, and D are correctly configured with IP addresses in the subnet range for VLAN 50. Host A can communicate with host B, but cannot communicate with host C or host D. What is the cause of this problem?
There is a native VLAN mismatch.
The Fa0/11 interface of Switch1 is not configured as a trunk.
The link between Switch1 and Switch2 is up but not trunked.
VLAN 50 is not allowed on the trunk link between Switch1 and Switch2.

13.

Refer to the exhibit. Users complain that they do not have connectivity to the web server that is connected to SW1. What should be done to remedy the problem?
Allow all VLANs on the trunk link.
Configure VLAN 100 as the native VLAN for SW1.
Configure the trunk port in trunk mode on SW1.
Attach the web server to a router and configure inter-VLAN routing.

14.
What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
only the management VLAN
all VLANs except the extended range VLANs
all VLANs except 1 and 1002-1005
all VLANs

15.
Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP address should be assigned to this new host?
192.168.1.11 /28
192.168.1.22 /28
192.168.1.33 /28
192.168.1.44 /28
192.168.1.55 /28

16.
Using the command copy tftp:backup.cfg startup-config, an administrator downloaded a saved configuration from a TFTP server to a switch. Why does the administrator not detect any changes in the switch configuration after the download completes?
The command should have been copy startup-config tftp:backup.cfg.
A backup configuration from a TFTP server cannot be copied directly into the startup-config.
The command copy running-config startup-config should be used to save the changes on the switch.
Downloading to the startup-config requires the switch to be reloaded in order for the configuration to take effect.

17. What two methods can be used to remove MAC address table entries from a switch? (Choose two.)
Power cycle the switch to clear all dynamically learned addresses.
The clear switching-tables command will remove statically configured entries.
The clear mac-address-table command will remove statically and dynamically configured table entries.
The erase flash command will clear all statically configured table entries.
Statically configured MAC addresses will automatically be removed from the address table 300 minutes after the last activity on a switch port.

18. Which type of traffic can still be received on a switch interface that is in STP blocking mode?
BPDU frames
multicast frames
broadcast frames
Layer 3 packets

19. Which method establishes an administrative connection for configuring the Linksys WRT300N wireless access point?
Associate with the access point and then open a HyperTerminal session with the access point.
Physically connect to the access point and then reboot the computer to launch the configuration software.
From a computer in the same IP subnet as the access point, enter the default IP address of the access point in a web browser.
Modify the TCP/IP properties of the computer connected to the access point so that it exists on the same network, and then reboot your computer to establish a connection.

20.

Refer to the exhibit. All edge ports are configured with the spanning-tree portfast command. Host1 is recently connected to port Fa0/1 on switch SW1 . Which statement is true about the status of port Fa0/1?
The port will transition into blocking state.
The port will transition immediately into forwarding state.
The port will transition into blocking state and then immediately into forwarding state.
The port will transition into blocking state and immediately transition through the listening and learning states.

21.
Refer to the exhibit. What is true of the configuration of switch S1?
A Cisco proprietary protocol is in use for ports Fa0/1 and Fa0/3.
Switch ports Fa0/1 and Fa0/3 have been configured with the switchport mode access command.
Untagged frames received on ports Fa0/1 and Fa0/3 will be placed on VLAN 1.
Switch ports Fa0/1 and Fa0/3 are configured to carry data from multiple VLANs.

22.
Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?
The switch must be configured with SSH version 1.
The transport input command must specify Telnet access.
The RSA keys must be returned to zero before SSH will permit Telnet access.
The ip domain-name command must also be entered in line configuration mode for the vty lines.

23.

Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?
Cat-A
Cat-B
Cat-C
Cat-D

24.
Refer to the exhibit. VTP has been configured with VTP pruning enabled on all switches. If HostA sends a broadcast frame to SW1, which devices will receive the frame?
SW1, SW3, HostF
SW1, HostB, HostC
SW1, SW2, SW3, SW4, HostF
SW1, SW2, SW3, SW4, all hosts

25.

Refer to the exhibit. Which two statements are true about the operation of the interfaces? (Choose two.)
Incoming traffic with VLAN ID 0 is processed by interface fa0/0.
Incoming traffic that has a VLAN ID of 2 is processed by subinterface fa0/0.2.
Both subinterfaces remain up with line protocol up, even if fa0/0 line protocol is down.
Subinterfaces use unique MAC addresses by adding the 802.1Q VLAN ID to the hardware address.
Traffic inbound on this router is processed by different subinterfaces, depending on the VLAN from which the traffic originated.

26.
The network administrator wants to configure a switch to pass VLAN update information to other switches in the domain but not update its own local VLAN database. Which two steps should the administrator perform to achieve this? (Choose two.)
Reset the VTP counters.
Configure VTP version 1 on the switch.
Configure the VTP mode of the switch to transparent.
Verify that the switch has a higher configuration revision number.
Configure the switch with the same VTP domain name as other switches in the network.

27.
CCNA 1 Final Exam V4.0 Answers 15
Refer to the exhibit. The devices in the network are operational and configured as indicated in the exhibit. However, hosts B and D cannot ping each other. What is the most likely cause of this problem?
The link between the switches is up but not trunked.
The Fa0/11 interface of Switch1 is not configured as a trunk.
Hosts B and D are configured with IP addresses from different subnets.
VLAN 20 and VLAN 30 are not allowed on the trunk between the switches.

28.
 
Refer to the exhibit. Users A and B are reporting intermittent connectivity problems. Pre-installation surveys showed strong signal strength from the AP locations to the client locations. Outside electrical interference has been eliminated. What will fix the problem?
Relocate the APs closer to each other.
Increase the distance between the clients.
Change the channel on AP-B to 6 or 11.
Place AP-A and AP-B on the same wireless channel.

29. Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?
SSH uses TCP whereas Telnet does not.
SSH encrypts only the username and password when logging in.
SSH encrypts all remote management communications whereas Telnet does not.
SSH sends a clear text message steam which reduces the bandwidth use for management.

30.
Refer to the exhibit. The teacher host is connected to port Fa0/7 on switch STW. A student has decided to share access to the Internet by attaching a hub and laptop to STW as shown. What will be the result of the student making this connection?
The Fa0/7 port of STW will be shutdown.
The student will gain full access to the Internet.
Both the teacher and student will be able to receive data but only the teacher will be able to send.
The frames from the laptop will be dropped, but the teacher host will maintain connectivity with the network.

31. A network administrator configures a switch port with the command switchport mode dynamic auto. What is the resulting behavior of the switch port?
The switch port is able to trunk if the remote switch port is set to auto.
The switch port is able to trunk if the remote switch port is set to desirable.
The switch port will be disabled if it is unable to successfully negotiate trunking.
A successful trunk will be established if the remote switch is non-Cisco but the port is configured for trunking.

32. Which STP port type can only appear once on a segment, and must be present in order for traffic to flow on that segment?
non-root port
disabled port
designated port
non-designated port

33.

Refer to the exhibit. What would happen if the network administrator moved the network cable of Host A from interface Fa0/1 to Fa0/3 on switch SW1?
Host A remains a member of VLAN 10, because the router is routing traffic between VLANs.
Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.
Host A remains a member of VLAN 10, because the switch provides dynamic VLAN assignment for the port.
Host A maintains connectivity to all members of VLAN 10, because it is connected to the same physical network.
Host A is no longer a member of VLAN 10, but because port Fa0/3 was unused, it is now a member of VLAN 1.

34.
Refer to the exhibit. VLAN 10 has been configured on the VTP server. Users who are assigned to VLAN 10 are connected as shown in the exhibit. On the basis of the outputs that are provided, which group of users will be able to communicate with the users on VLAN 10 on SW1?
all the users who are connected only to SW2
users on VLAN 10 who are connected only to SW3
users on VLAN 10 who are connected only to SW4
users on VLAN 10 who are connected to both SW3 and SW4

35.
Refer to the exhibit. Which three options correctly identify information that could be associated with this output?(Choose three.)
Interface FastEthernet3/0/0 is subinterfaced.
A non-proprietary trunking protocol is in use.
The configuration is appropriate for a router-on-a-stick network design.
A shutdown command has been applied to interface FastEthernet3/0/0.
Interface FastEthernet3/0/0.3 is mapped to the default management VLAN.
An IP address should be applied to FastEthernet3/0/0 for correct data routing.

36.
Refer to the exhibit. The Layer 2 switching design that is shown has been implemented in a campus environment that is using Spanning Tree Protocol. All inter-switch links that are shown are trunks. Whenever an inter-switch link fails, the network takes nearly a minute to completely converge. How can the convergence time be reduced?
Increase the capacity of the distribution and core trunk links to 10 Gb/s.
Add a trunk link that directly connects D1 and D2.
Use Layer 3 switching on the core switch.
Implement Rapid Spanning Tree Protocol.

37.
Refer to the exhibit. Each switch is configured to participate in STP for VLANs 1, 10, 20, and 30. Which switch will become the root for VLAN 20?
A
B
C
D

38.
Refer to the exhibit. Switches S2 and S3 are properly connected using an ethernet cable. A network administrator has configured both switches with VTP, but S3 is unable to propagate VLANs to S2. What could be the reason for this?
The VTP configuration revision is different on both switches.
The VTP domains are different on both switches.
VTP pruning is disabled.
VTP v2 is disabled.

39. In a three-layer hierarchical network design, which distribution layer function delineates broadcast domains?
routing between VLANs
aggregating traffic flows
providing redundant links
reducing the network diameter

40.
Which parameter is used to uniquely identify one wireless network from another?
SSID
OFDM
WEP
DSSS

41.
What is one disadvantage that 802.11a wireless has compared to 802.11g?
Use of the 5GHz band requires much larger antennas.
The OFDM modulation technique results in a slower data rate.
There are fewer non-overlapping channels available to help reduce RF interference.
The use of higher frequencies means that signals are more likely to be obstructed.

42. Which three statements are correct concerning the default configuration of a new switch? (Choose three.)
It is configured in VTP server mode.
STP is automatically enabled.
The first VTY line is automatically configured to allow remote connections.
VLAN1 is configured with a management IP address.
All switch ports are assigned to VLAN1.
The enable password is configured as cisco.

43.

Refer to the exhibit. How is port Gi1/1 on SWT-A functioning in the spanning-tree topology?
It is sending and receiving data frames.
It is receiving BPDUs, but not sending data frames.
It is participating in the election process by forwarding the BPDUs it receives.
It is receiving BPDUs and populating the MAC address table, but not sending data.

44.
While configuring a new switch, a network administrator configures the switch as an HTTP server. What benefits does this configuration provide?
This allows the switch to host web pages for the network.
This allows remote VPN connections to the switch over the Internet.
This is required if a web server or web farm is attached to the switch.
This allows web-based configuration tools to be used with the switch.

45.
Which statement describes the use of voice VLANs in Cisco IP telephony?
The voice VLAN carries both tagged and untagged traffic.
The voice VLAN carries untagged traffic having special QoS markings.
The voice VLAN must be configured on the switch port to which the IP phone attaches.
Data and voice frames are tagged with same VLAN ID between the IP phone and the switch when a voice VLAN is configured.

46.

Refer to the exhibit. If switch SW1 is configured with the four VLANs as shown in the exhibit, how many physical interfaces are needed on router R1 to configure inter-VLAN routing using subinterfaces?
zero
one
two
four

47.
Refer to the exhibit. What does the term DYNAMIC indicate in the output that is shown?
This entry can only be removed from the MAC address table by a network administrator.
When forwarding a frame to the device with address 0060.5c5b.cd23, the switch does not have to perform a lookup to determine the final destination port.
Only the device with MAC address 0060.5c5b.cd23 will be allowed to connect to port Fa0/18.
The switch learned this MAC address from the source address in a frame received on Fa0/18.

48.
Refer to the exhibit. The VTP domain has been configured as shown in the exhibit. The network technician accidentally configured the VTP server as a VTP client. After the technician reloaded the switches, all users in the VTP domain started to complain that they lost connectivity to the users on the same VLANs that are connected to other switches. What should be done in the future to prevent losing all VLAN configurations in a VTP domain?
Configure all switches in VTP transparent mode and copy the VLAN configuration into flash.
Configure all switches in the network as VTP clients and copy the VLAN configuration into NVRAM.
Create a new domain and configure a second switch as a VTP server to take over in case of a primary VTP server failure.
In the same domain, configure a second switch as a VTP server to take over in case of a primary VTP server failure.

49.

Refer to the exhibit. How does SW1 manage traffic coming from Host A?
SW1 drops the traffic because it is untagged.
SW1 leaves the traffic untagged and forwards it over the trunk.
SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.
SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.

50. An administrator is troubleshooting a PC on the network which is suffering from slow and intermittent connectivity. The PC has a ping success rate to the default gateway of less than half the ping attempts. Other PCs on the switch can consistently ping the default gateway. The switch port is configured for auto duplex and the PC is configured for full duplex. What will commonly cause this problem?
The PC is set to full duplex. The switch port fails to autonegotiate the duplex setting and defaults to half duplex, which causes a duplex mismatch.
The switch traffic is exceeding available frame buffers. The result is that frames are being dropped.
The PC and the default gateway have different bandwidth Ethernet ports.
The default gateway is not on the same switch that the PC is.

51.
Refer to the exhibit. A network administrator has segmented the network into two VLANs and configured Router1 for inter-VLAN routing. A test of the network, however, shows that hosts on each VLAN can only access local resources and not resources on the other VLAN. What is the most likely cause of this problem?
Switch port Fa0/1 is not trunking.
Router interface Fa0/0 is possibly down.
No routing protocol is configured on Router1.
One of the router subinterfaces is possibly down.

52. What impact does the use of the mdix auto configuration command have on an Ethernet interface on a switch?
automatically detects duplex settings
automatically detects interface speed
automatically detects copper cable type
automatically assigns the first detected MAC address to an interface

Routing Fundamentals

Posted: 05 Oct 2010 07:03 AM PDT


When IP packets travel over the Internet, routing information is exchanged between the devices that control the flow of information over the Internet. These devices are known as routers, and they use the IP address as the basis for controlling the traffic. These devices need to talk the same language to function properly, though they belong to different administrative domains. For example, one router may be in Newyork(US), and the receiving router may be in London (UK). It is necessary that a routing protocol is followed for smooth flow of traffic. Given below are the widely used routing protocols for routing Internet traffic:
  • RIP v1
  • RIP v2
  • OSPF
  • IGRP
  • EIGRP
  • BGP
Notations used: Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Border Gateway Protocol (BGP).
One often get confused between a routing protocol and a routed protocol. A routing protocol such as RIP is used to route information packets over the Internet, where as a routed protocol such as IP (or IPX) is the payload (contains data) that get routed from source to the destination.
Routing protocols are primarily distinguished into three types:
  • Distance Vector Protocols
  • Link State Protocols
  • Hybrid Protocols
RIP is an example of distance vector protocol. IS-IS is an example of Hybrid protocol, and OSPF is an example of Link State Protocol.
The table below provides the routing protocol used with different routed protocols:
Routing Protocol Routed Protocol
RIP, OSPF,IS-IS, BGP,EIGRP IP
RIP, NLSP, EIGRP IPX
RTMP, EIGRP AppleTalk
The list of routed, and routing protocols given in the above table is not complete, and given to serve as an example only.
Routing Metric: This is a fundamental measure that routing protocols use for determining appropriate route to deliver packets. Each routing protocol uses its own measure of metric, and a sample of routing metrics used by different routing protocols is given below:
Routing Protocol Metric
RIPv2 Hop count
EIGRP Bandwidth, Delay, Load, Reliability, and MTU
OSPF Cost (Higher bandwidth indicates lower cost)
IS-IS Cost
The best route in RIP is determined by counting the number of hops required to reach the destination. A lower hop count route is always preferred over a higher hop count route. One disadvantage of using hop count as metric is that if there is a route with one additional hop, but with significantly higher bandwidth, the route with smaller bandwidth is taken. This is illustrated in the figure below:

The RIP routed packets take the path through 56KBPS link since the destination can be reached in one hop. Though, the alternative provides a minimum bandwidth of 1MBPS (though using two links of 1MBPS, and 2MBPS each), it represents 2 hops and not preferred by the RIP protocol.

Link State vs. Distance Vector

Distance Vector routing protocols usually send their entire routing table to their nearest neighbors at regular intervals. A router that receives several such routing tables filter the routes and arrive at its own and retransmits it to its neighbouring routers. There will some period of time where different routers hold non-optimized routes initially. After some time, known as convergence time, a final routing table is arrived at by all the routers. A faster convergence time results in a stable network. 
RIP, as mentioned earlier uses hop count as the metric for computing a route to a given destination. Other Distance Vector routing protocols, such as IGRP, improve on this by using hop count, bandwidth, current load, cost, and reliability to determine the best path.
Link State routing protocols usually send only the routing changes to every other router within their area. Unlike Distance Vector, routers using Link State routing protocols maintain a picture of the entire network. A router can use this network wide information to determine the best route for traffic.
Example Question:
What is true about IP routing?
A. The frame changes at each hop
B. The source IP address changes at each hop
C. The destination IP address changes at each hop
D. The hardware interface addresses remain constant

Correct answer: A

Explanation:
IP Packets are transported from source network to the destination network by what is known as routing. Hop-by-hop routing model is used by the Internet for delivery of packets. At each hop, the destination IP address is examined, the best next hop is determined by the routing protocol (such as RIP, OSPF or BGP) and the packet is forwarded by one more hop through this route. The same process takes place at the next hop. During this process, the logical addresses remain same. In an IP network, the logical addresses are IP addresses. The hardware interface addresses, such as MAC address change with each hop.

CCNA 1 Final Exam 2010

Posted: 28 Oct 2010 08:50 AM PDT


1.

Refer to the exhibit. What is the correct destination socket number for a web page request from Host A to the web server?
00-08-a3-b6-ce-46
198.133.219.25:80

C 198.133.219.0/24 is directly connected, FastEthernet0/0

2. Which prompt represents the appropriate mode used for the copy running-config startup-config command ?
Switch-6J>
Switch-6J#
Switch-6J(config)#
Switch-6J(config-if)#
Switch-6J(config-line)#


3. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two)
Router(config)# line vty 0 3 Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0″.
Telnet access will be denied because the Telnet configuration is incomplete.
Access will be permitted for Telnet using "c13c0″ as the password.



4.

Refer to the exhibit. Each media link is labeled. What type of cable should be used to connect the different devices?
Connection 1 – rollover cable
Connection 2 – straight-through cable
Connection 3 – crossover cable
Connection 1 – crossover cable
Connection 2 – rollover cable
Connection 3 – crossover cable
Connection 1 – straight-through cable
Connection 2 – crossover cable
Connection 3 – crossover cable
Connection 1 – straight-through cable
Connection 2 – crossover cable
Connection 3 – straight-through cable

Connection 1 – crossover cable
Connection 2 – straight-through cable
Connection 3 – crossover cable

5.

Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?
address translation
DHCP services
ftpd
web server


6. When connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data?
IP
UDP
Ethernet
a connectionless acknowledgement
an upper-layer, connection-oriented protocol or service

7.

Refer to the exhibit. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication?
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.94

8.

Refer to the exhibit. Cable 1 and cable 2 have the ends wired for specific physical layer requirements. The table lists each segment by number and the cable which has been installed by the network technician between the network components on that segment. From the data given, which segments have the correct cable installed? (Choose three.)
segment1
segment2
segment3
segment4
segment5

9.
What is true regarding network layer addressing? (Choose three)
uses a flat structure
prevent broadcasts
heirarchical
uniquely identifies each host
48 bits in length
contains a network portion

10.

Refer to the exhibit. What two facts can be determined about the exhibited topology? (Choose two)
A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
Five collision domains exist.

11.

Refer to the exhibit. What two facts can be determined from the information that is given? (Choose two.)
This exchange is part of the three-way handshake.
The source port indicates that a Telnet session has been initiated.
The data is flowing from server to client.
The destination port indicates that an HTTP session has been initiated.
The data listed is associated with the transport layer.
The source port does not support communication with the destination port that is listed.

12. In a Cisco IOS device, where is the startup-configuration file stored?
Flash
NVRAM
RAM
ROM

13.

Refer to the exhibit. The network containing router B is experiencing problems. A network associate has isolated the issue in this network to router B. What action can be preformed to correct the network issue?
issue the clock rate command on interface Serial 0/0/0
issue the description command on interface Serial 0/0/1
issue the ip address command on interface FastEthernet 0/0
issue the no shutdown command on interface FastEthernet 0/1

14.

Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?
127.0.0.1
192.168.64.196
192.168.254.1
192.168.254.9
192.168.254.254

15.
Which combination of network id and subnet mask correctly identifies all IP addresses from 172.16.128.0 through 172.16.159.255?
172.16.128.0 255.255.255.224
172.16.128.0 255.255.0.0
172.16.128.0 255.255.192.0
172.16.128.0 255.255.224.0
172.16.128.0 255.255.255.192

16.

Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?
leaving host A
leaving ATL
leaving Dallas
leaving NYC

17.

Refer to the exhibit. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram.
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA 5.MTA 6.SMTP 7.POP 8.MUA
1.MDA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MUA 7.POP 8.MDA
1.MUA 2.SMTP 3.MTA 4.SMTP 5.MTA 6.MDA 7.POP 8.MUA

18.

Refer to the exhibit. The command that is shown was issued on a PC. What does the IP address 192.168.33.2 represent?
IP address of the host
default gateway of the host
IP address of the homepage for the host
primary domain name server for the host
IP address of the website resolver1.mooki.local

19.

Refer to the exhibit. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network?
Host A was assigned a network address.
Host B was assigned a multicast address.
Host A and Host B belong to different networks.
The gateway address was assigned a broadcast address.

20.

Refer to the exhibit. The tracert command is initiated from PC1 to PC4. Which device will send a response to the initial tracert packet from PC1?
Athens
Ankara
London
Paris
PC4

21.
Which password is automatically encrypted when it is created?
vty
aux
console
enable secret
enable password

22. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?
application
presentation
session
transport

23.

Refer to the exhibit. Which two statements describe the information that is represented in the header? (Choose two)
This is a server response.
The UDP protocol is being used.
The destination port indicates a Telnet session.
The return segment will contain a source port of 23.
The next session originated from the client of this session will use the source port number 13358.

24. The Layer 4 header contains which type of information to aid in the delivery of data?
service port number
host logical address
device physical address
virtual connection identifier

25.
As network administrator, what is the subnet mask that allows 510 hosts given the IP address 172.30.0.0?
255.255.0.0
255.255.248.0
255.255.252.0
255.255.254.0
255.255.255.0
255.255.255.128

26.
When must a router serial interface be configured with the clock rate command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
when the interface is functioning as a DCE device

27.

Refer to the exhibit. What is required on host A for a network technician to create the initial configuration on Router1?
an FTP client
a Telnet client
a terminal emulation program
a web browser

28.

Refer to the exhibit. Which set of devices contains only intermediary devices?
A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J

29.

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?
IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2
IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17
IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18
IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5
IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1
IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

30.
A routing issue has occurred in you internetwork. Which of the following type of devices should be examined to isolate this error?
access point
host
hub
router
switch

31.
Which type of media is immune to EMI and RFI? (Choose two.)
10 Base-T
10 Base-2
10 Base-5
100 Base-FX
100 Base TX
1000 Base LX

32.

Refer to the exhibit. With the router running NAT, what IP addresses can be applied to the computer to allow access to the Internet? (Choose three)
192.168.18.38
192.168.18.48
192.168.18.49
192.168.18.52
192.168.18.59
192.168.18.63

33.
Which three IPv4 addresses represent a broadcast for a subnet? (Choose three.)
172.16.4.63 /26
172.16.4.129 /26
172.16.4.191 /26
172.16.4.51 /27
172.16.4.95 /27
172.16.4.221 /27

34.

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?
1
3
4
5
7

35.
What are three characteristics of CSMA/CD? (Choose three)
Devices can be configured with a higher transmission priority.
A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired.

36.
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?
console
enable
enable secret
VTY

37.
A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
Use the ipconfig /all command at the host's command prompt.
Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.

38.

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers

39.

Examine the graphic with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem?
IP address incorrectly entered
network cables unplugged
subnet mask incorrectly entered
network card failure

40.
Which two functions of the OSI model occur at layer two? (Choose two.)
physical addressing
encoding
routing
cabling
media access control

41.

Refer to the exhibit. A router, whose table is shown, receives a packet that is destined for 192.168.1.4. How will router treat the packet?
The packet will be dropped.
The packet will be forwarded via FastEthernet 0/0.
The packet will be forwarded to the destination host.
The packet will be forwarded to the 192.168.1.3 next-hop address.

42. Which range of port numbers are reserved for services that are commonly used by applications that run on servers?
0 to 255
0 to 1023
1024 to 49151
49152 to 65535

43.

Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)
The address that is assigned to the computer represents private addressing.
The computer is unable to communicate outside of the local network.
The network of this computer can have 126 hosts.
The prefix of the computer address is /27.
The IP address that is assigned to the computer is routable on the Internet.
The IP address that is assigned to the computer is a broadcast address.

44.

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?
The data is automatically encrypted.
A Telnet server process is running on PC1.
The connection is made through a VTY session on the router.
A GET request was sent to RouterB to retrieve data during this session.

45.
Which three statements characterize the transport layer protocols? (Choose three.)
TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
TCP uses windowing and sequencing to provide reliable transfer of data.
TCP is a connection-oriented protocol. UDP is a connectionless protocol.

46.
Which of the following are the address ranges of the private IP addresses? (Choose three.)
10.0.0.0 to 10.255.255.255
200.100.50.0 to 200.100.25.255
150.150.0.0 to 150.150.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
127.16.0.0 to 127.31.255.255

47. Which OSI layers offers reliable, connection-oriented data communication services?
application
presentation
session
transport
network

48.

Refer to the exhibit. Which logical topology best describes the exhibited network?
star
ring
point-to-point
multiaccess
mesh

49.
During the encapsulation process, which identifiers are added at the transport layer?
two networks routing the packets
two applications communicating the data
two hosts at either end of the communication
two nodes on the local network exchanging the frame

50.
What are two characteristics of the data link layer? (Choose two.)
It segments and reorders the data.
It exchanges the frames between nodes.
It defines the method by which network devices place data onto the media.
It manages the transfer of data between the processes that run on each host.
It retrieves signals from the media and restores them to their bit representations.

CCNA4 Final Exam (French)

Posted: 19 Feb 2010 09:55 PM PST


Thanks IS_IS eigrp!
This is Final exam (French), if you have other test, please send to me at nguyenhuuhai.it@gmail.com thanks.
Download now

Subnet masking

Posted: 30 Sep 2010 06:38 AM PDT





Subnetting an IP Network is done primarily for better utilization of available IP address space, and routing purpose. Other reasons include better organization, use of different physical media (such as Ethernet, WAN, etc.),  and securing network resources.
A subnet mask enables you to identify the network and node parts of the address. The network bits are represented by the 1s in the mask, and the node bits are represented by the 0s. A logical AND operation between the IP address and the subnet mask provides the Network Address.
For example, using our test IP address and the default Class C subnet mask, we get:
192.189.210.078: 1100 0000.1011 1101.1101 0010.0100 1110 Class C IP Address
255.255.255.000: 1111 1111.1111 1111.1111 1111.0000 0000 Default Class C subnet mask
 192.189.210.0         1100 0000 1011 1101 1101 0010 0000 0000
As can be seen above, by using and AND operator, we can compute the network portion of an IP address.  The network portion for the IP address given in the above example is 192.189.210.0, and the host portion of the IP address is 078.
Given below is a table that provides binary equivalent of decimal values.  For binary conversion, take first octet of a given IP address (in dotted decimal form), and lookup the binary value. Then take the second octet and lookup the binary value, and so on.
Binary Conversion Table
Decimal Binary Decimal Binary Decimal Binary Decimal Binary
0 0000 0000 64 0100 0000 128 1000 0000 192 1100 0000
1 0000 0001 65 0100 0001 129 1000 0001 193 1100 0001
2 0000 0010 66 0100 0010 130 1000 0010 194 1100 0010
3 0000 0011 67 0100 0011 131 1000 0011 195 1100 0011
4 0000 0100 68 0100 0100 132 1000 0100 196 1100 0100
5 0000 0101 69 0100 0101 133 1000 0101 197 1100 0101
6 0000 0110 70 0100 0110 134 1000 0110 198 1100 0110
7 0000 0111 71 0100 0111 135 1000 0111 199 1100 0111
8 0000 1000 72 0100 1000 136 1000 1000 200 1100 1000
9 0000 1001 73 0100 1001 137 1000 1001 201 1100 1001
10 0000 1010 74 0100 1010 138 1000 1010 202 1100 1010
11 0000 1011 75 0100 1011 139 1000 1011 203 1100 1011
12 0000 1100 76 0100 1100 140 1000 1100 204 1100 1100
13 0000 1101 77 0100 1101 141 1000 1101 205 1100 1101
14 0000 1110 78 0100 1110 142 1000 1110 206 1100 1110
15 0000 1111 79 0100 1111 143 1000 1111 207 1100 1111








16 0001 0000 80 0101 0000 144 1001 0000 208 1101 0000
17 0001 0001 81 0101 0001 145 1001 0001 209 1101 0001
18 0001 0010 82 0101 0010 146 1001 0010 210 1101 0010
19 0001 0011 83 0101 0011 147 1001 0011 211 1101 0011
20 0001 0100 84 0101 0100 148 1001 0100 212 1101 0100
21 0001 0101 85 0101 0101 149 1001 0101 213 1101 0101
22 0001 0110 86 0101 0110 150 1001 0110 214 1101 0110
23 0001 0111 87 0101 0111 151 1001 0111 215 1101 0111
24 0001 1000 88 0101 1000 152 1001 1000 216 1101 1000
25 0001 1001 89 0101 1001 153 1001 1001 217 1101 1001
26 0001 1010 90 0101 1010 154 1001 1010 218 1101 1010
27 0001 1011 91 0101 1011 155 1001 1011 219 1101 1011
28 0001 1100 92 0101 1100 156 1001 1100 220 1101 1100
29 0001 1101 93 0101 1101 157 1001 1101 221 1101 1101
30 0001 1110 94 0101 1110 158 1001 1110 222 1101 1110
31 0001 1111 95 0101 1111 159 1001 1111 223 1101 1111








32 0010 0000 96 0110 0000 160 1010 0000 224 1110 0000
33 0010 0001 97 0110 0001 161 1010 0001 225 1110 0001
34 0010 0010 98 0110 0010 162 1010 0010 226 1110 0010
35 0010 0011 99 0110 0011 163 1010 0011 227 1110 0011
36 0010 0100 100 0110 0100 164 1010 0100 228 1110 0100
37 0010 0101 101 0110 0101 165 1010 0101 229 1110 0101
38 0010 0110 102 0110 0110 166 1010 0110 230 1110 0110
39 0010 0111 103 0110 0111 167 1010 0111 231 1110 0111
40 0010 1000 104 0110 1000 168 1010 1000 232 1110 1000
41 0010 1001 105 0110 1001 169 1010 1001 233 1110 1001
42 0010 1010 106 0110 1010 170 1010 1010 234 1110 1010
43 0010 1011 107 0110 1011 171 1010 1011 235 1110 1011
44 0010 1100 108 0110 1100 172 1010 1100 236 1110 1100
45 0010 1101 109 0010 1101 173 1010 1101 237 1010 1101
46 0010 1110 110 0110 1110 174 1010 1110 238 1110 1110
47 0010 1111 111 0110 1111 175 1010 1111 239 1110 1111








48 0011 0000 112 0111 0000 176 1011 0000 240 1111 0000
49 0011 0001 113 0111 0001 177 1011 0001 241 1111 0001
50 0011 0010 114 0111 0010 178 1011 0010 242 1111 0010
51 0011 0011 115 0111 0011 179 1011 0011 243 1111 0011
52 0011 0100 116 0111 0100 180 1011 0100 244 1111 0100
53 0011 0101 117 0111 0101 181 1011 0101 245 1111 0101
54 0011 0110 118 0111 0110 182 1011 0110 246 1111 0110
55 0011 0111 119 0111 0111 183 1011 0111 247 1111 0111
56 0011 1000 120 0111 1000 184 1011 1000 248 1111 1000
57 0011 1001 121 0111 1001 185 1011 1001 249 1111 1001
58 0011 1010 122 0111 1010 186 1011 1010 250 1111 1010
59 0011 1011 123 0111 1011 187 1011 1011 251 1111 1011
60 0011 1100 124 0111 1100 188 1011 1100 252 1111 1100
61 0011 1101 125 0111 1101 189 1011 1101 253 1111 1101
62 0011 1110 126 0111 1110 190 1011 1110 254 1111 1110
63 0011 1111 127 0111 1111 191 1011 1111 255 1111 1111
Example Question: Which of the following is a Class C IP address?
      A. 10.10.14.118
      B. 135.23.112.57
      C. 191.200.199.199
      D. 204.67.118.54

                         
Correct Answer: D.
Explanation:
IP addresses are written using decimal numbers separated by decimal points. This is called dotted decimal notation of expressing IP addresses. The different classes of IP addresses is as below:
Class
Format 
Leading Bit  pattern
Network address Range   
Maximum  networks
Maximum hosts     
A
N.H.H.H
 0
 0-126
 127
 16,777,214
B
N.N.H.H   
 10
 128-191
 16,384
 65,534
C
N.N.N.H
 110
 192-223
 2,097,152
 254
Network address of all zeros means "This network or segment".
Network address of all 1s means " all networks", same as hexadecimal of all Fs.
Network number 127 is reserved for loopback tests.
Host (Node) address of all zeros mean "This Host (Node)".
Host (Node) address of all 1s mean "all Hosts (Nodes) " on the specified network.

CCNA Wireless - Any netsims available?

Posted: 28 Sep 2010 08:23 AM PDT


Hi,

I am a CCNA and looking to recertify by taking the CCNA Wireless concentration as I would like to add some new knowlegde rather than just retake the current CCNA. I will need to know how to configure Cisco WCS, WLC's and AP's for the exam, so I am looking for a netsim like Boson's but for the Wireless config's only. Does a netsim for CCNA Wireless exist and if so what is it and how do I get it?

Thanks.

Free CCNA Practice Test

Posted: 16 Jan 2010 05:35 AM PST


Begin the test
Read the question and then click on the checkbox that contains the correct answer(s). The small field to the immediate right of the question will either display "Yes" if you are correct or "No" if you have selected the wrong answer.
Click on the "Explanation" button to find out more about the answer and click "Next Question" to continue the MCSE Practice test.
Your answers are not graded, so keep track of the topics which with you had difficulty.

0 comments:

Post a Comment