Monday, September 24, 2012

CCNA Questions Part 5


More Questions for those interested in all things network. Enjoy


1. Trunk links are used to communicate between...

A) Two switches
B) A switch and router
C) A switch and server
D) A switch and PC
E) A, B and C are correct


2. What are the 3 ways of assigning a switched port to VLANs?

A) Switch-centric, Port-centric, Dynamic VLANs
B) Port-centric, Static VLANs, Dynamic VLANs
C) Interface-based, Static VLANs, Dynamic VLANs


3. Which of the following could be a valid MAC address?

A) 00-08-74-CE-B7-90
B) 192.168.0.1
C) FFFF.FFFF.FFFF.FFFF
D) 255.255.255.240


4. What is the invalid timer set to by default when you have a router running the Interior Gateway Routing Protocol? (IGRP)

A.) 3 times the update period
B.) 270 seconds
C.) 3 times the update period + 10 seconds
D.) Answer A and B
E.) 7 times the update period


5. Which protocol is used to determine the IP address if the MAC address is already known?

A.) ARP
B.) RARP
C.) IP
D.) IPX
E.) TCP




Clickbank Products

1. Correct Answer: E

A trunk link is a point-to-point link between two switches, a switch and router or a switch and server which carries multiple VLAN traffic.


2. Correct Answer: B

3 ways of assigning a switched port to VLANs:

  • Port-Centric - All nodes connected to ports in the same VLAN are assigned to the same VLAN ID.
  • Static VLANs - Statically assign ports to a VLAN.
  • Dynamic VLANs - Ports that can automatically determine their VLAN assignments based on MAC addresses
3. Correct Answer: A

The standard format for printing MAC addresses is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:) e.g. 00-08-74-CE-B7-90, 00:08:74:CE:B7:90.
Another convention commonly used is three groups of four hexadecimal digits separated by dots e.g. 0573.4567.19ab.


4. Correct Answer: D

IGRP sends its routing table to its neighbors every 90 seconds. IGRP uses an invalid timer to mark a route as invalid after 270 seconds (three times the update timer). IGRP uses a flush timer to remove a route from the routing table (default flush timer is 630 seconds, seven times the update period).


5. Correct Answer B

Reverse Address Resolution Protocol (RARP) is a networking protocol used by a host computer to request its IP address from an administrative host, when it knows its MAC address.





If you don't like something, change it. 
If you can't change it, change your attitude. 
Don't complain. - Maya Angelou



Monday, September 17, 2012

CCNA questions part 4


Another set of Questions for those interested in networking - enjoy!


 
1. What is the correct sequence of Spanning Tree Port states?

A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled

2. In a directed broadcast all host bits set to 1 received by all hosts on local broadcast domain?

A) True
B) False


3. What type of IP address has the following structure?

network.node.node.node

A.) Class A
B.) Class B
C.) Class C


4. What is the default time BPDUs are sent and received by switches?

A) 2 seconds
B) 10 seconds
C) 30 seconds
D) 60 seconds

5. How would you view the current Configuration Register value?
(Cisco Router)

A.) show config-register
B.) show reg
C.) show config
D.) show version





Clickbank Products

1. Correct Answer: A

Explanation
STP switch port states:

  • Blocking
  • Listening
  • Learning
  • Forwarding
  • Disabled
2. Correct Answer: A

A directed broadcast address for each physical network has all ones in the host ID part of the address. The network ID and the subnet ID must be valid network and subnet values. A directed broadcast is sent to every host on that network or subnetwork.


3. Correct Answer A

Class A Address in IPV4


4. Correct Answer: A

2 seconds
Part of the Spanning tree Protocol (STP)- Bridges and Switches use special data frames called Bridge Protocol Data Units (BPDUs) to exchange information about bridge IDs and root path costs.   

5. Correct Answer: D
 
You can see the current value of the configuration register by using the show version command.
 

Ahh threw in a D in there to see if you where paying attention :-) 
- have a great day!

Thursday, September 13, 2012

Cisco Exam Revision Tips





Here are some revision tips to help you 
                           revise for the CCNA exam.

1.)  Make sure you only learn topics which are covered by the exam.

2.)  Glance through the course/exam topics and highlight the areas you think you'll need to concentrate on more.


3.)  Get a good CCNA book that suits your learning style.


4.)  Practice what you learn frequently by using practice tests and flash cards. Highlight your weakest subjects and aim to improve them.


5.)  Create a set of revision notes for each topic. Try to stick to one page of paper per topic.


6.)  Read through your revision notes frequently.


7.)  You want to retain the information beyond the exam, so forget about cramming the night before the exam. Spread out your revision into 30 minute revision periods.


8.)  Condense your revision notes. The act of rewriting them will help you memorize them.


9.)  Practice your IOS configuration on a Cisco router or router simulator.



From my experience it is best to read twice, answer once.  Good Luck in your endeavours.


Monday, September 10, 2012

Tips To Secure Your Wireless


Wireless network technology has become common place in our daily lives, and we are beginning to find wireless networks available almost everywhere we go.  We can find free wireless networks available at our local coffee shops, fast food restaurants, office supply stores and even while you wait to get your car’s oil changed.   Take into account that WiFi is built into many of our consumer gadgets, we can consume digital information virtually everywhere we go.  With that said, we also need to take precautions in accessing and using these available wireless networks.  Here are a few tips to use wireless network technology safely and security at home and in public places.

Home Wireless tips

  • Secure your wireless network by changing the administrator’s default password on your wireless router.  There are far too many instances where the cable installer or phone technician installs the ISP’s wireless router and the administrator password is never changed.
  • Enable WPA2-Personal with AES encryption.  You should create a pre-shared key (passphrase) with a minimum length of 15 characters.  Length does matter; it is harder to hack a long simple passphrase than a short complex one.
  • Do not name your SSID to easily identify who owns the network (e.g. Jones Family).
  • Hiding your Service Set Identifier (SSID) IS NOT a security measure.  Hidden SSIDs (the wireless network name) are easily identified by freeware applications downloaded from the internet.  Software such as, Kismet or NetStumbler are available for all the major OSes and can quickly identify the SSIDs for nearby wireless networks.  In some instances, hidden SSIDs can actually cause connection problems.


Public Wireless Use Tips:

Whenever you use a public WiFi hotspot, there are two questions you should always ask yourself.
1. “Am I comfortable with someone looking over my shoulder at the information I accessed?” 
2. “Am I comfortable with someone seeing how I accessed that information (by entering my user name and password)?”

When using public WiFi hotspots, you never know if someone sitting near you or across the street has compromised that wireless network, and have the ability to read/capture the data traffic.  You are assuming the provider has implemented and properly configured security protocols to ensure your data privacy.  Maybe they have, and maybe they have not.  That’s why you always need to ask yourself those two questions when using a public WiFi network.

Here are a few tips when accessing and using a public WiFi.

  • I think we all know, DO NOT perform online banking or other financial transactions on a public WiFi hotspot.
  • Have up to date system patches, anti-malware and personal firewall software installed (where applicable).
  • Don’t use the public WiFi hotspot.  If available, use your smart phone‘s hotspot capability or portable hotspot device to provide internet access for your devices.  With the portable hotspot, you control the access security of devices using your wireless network (assuming you actually configure the security features) and have the security of using your mobile carrier’s data network.
  • Invest in a personal VPN service.  There are plenty free and paid VPN services available in the consumer market.

PRIVATE WiFi is a personal VPN that protects the identity and sensitive information of anyone on a public WiFi network by encrypting everything you send and receive with bank-level security.
 

PRIVATE WiFi is the safest way to do everything online. And you can try it for free for 3 days by clicking the link below.



What is a Computer Hacker?

These days, a hacker doesn't have to be a geek from a top university who breaks into high profile banks and government systems.

A hacker can be anyone, even the kid next door. Anyone can download a simple software off the Internet to see everything that goes into, and out of, a computer on a the same network. And people who do this don't always have the best of intentions. So just imagine how exposed you are when you use WiFi in a public hotspot. Everybody in that very same hotspot are all on the same computer network.

Firewalls and anti-virus can't stop this new type of hacking, called sniffing, but PRIVATE WiFi can. Learn more about how to protect yourself against hackers.Private wifi description

Sunday, September 9, 2012

CCNA Questions Part 3



Here are some more networking questions and answers to get the brain matter ticking.\




1. What do asymmetric switches require?

A) memory buffers
B) extra ports
C) statically assigned ports only
D) high speed CAM


2. What does Ethernet 0 is down, protocol is down indicate?

A) Keepalive or framing issue
B) Carrier detect is not present
C) The interface is shutdown


3. Fragment Free switching method is best described by which of the following?

A.) The entire frame is received before forwarding is commenced
B.) Forwards frame after receiving the destination MAC address
C.) Filters out collision packets by waiting for the first 64 bytes of data


4. What is the default synchronous serial encapsulation on Cisco routers?

A.) Frame Relay
B.) X.25
C.) ISDN
D.) PPP
E.) HDLC


5. A CIDR value of /12 equates to what subnet mask?

A) 255.0.0.0
B) 255.128.0.0
C) 255.192.0.0
D) 255.224.0.0
E) 255.240.0.0




Clickbank Products

1. Correct Answer: A

Explanation
With ability for support of high bandwidth ports Asymmetric Switches require more Buffer memory for storing & forwarding of packets for fast processing.


2. Correct Answer: B

The various states of an interface:

  • Ethernet0 is up, line protocol is up - The interface is functioning correctly.
  • Ethernet0 is down, line protocol is down - This message usually represents a physical interface problem. The cable may be disconnected. This can also occur if this interface is connected to another router whose interface has been shutdown.
  • Ethernet0 is up, line protocol is down - The Physical layer connectivity is not the issue. The line protocol being down is either a clocking issue (keepalives) or a mismatch of the frame types being used on connected devices.
  • Ethernet0 is administratively down, line protocol is down - The interface has been manually shutdown using the shutdown command.
 3. Correct Answer: C

 Filters out collision packets by waiting for the first 64 bytes of data

 4. Correct Answer: E 

HDLC

5. Correct Answer: E

255.240.0.0

Binary 11111111.11110000.0000000.0000000 = 12 bits set to 1
Binary octet =  128, 64, 32. 16, 8, 4, 2, 1 so 128+64+32+16 = 240

How did you go? let me know  - have a great day.