Saturday, December 20, 2014

SECURITY TIPS KEEPING FINANCIAL DATA UNDER LOCK AND KEYBOARD



As the holiday season is upon us, a timely reminder regarding internet security is in order, as the scammers will be on the increase over the Christmas period.




  •  Don’t provide your PIN or Internet banking login or password to anyone
  •  Delete spam and scam e-mail – DON’T open it
  •  Keep your anti-virus and firewall software up-to-date
  •  Always logon to Internet banking by typing in your bank’s full web address. Never give your confidential banking details to anyone
  •  Don’t ever use public computers for Internet banking, for example, Internet cafes, libraries or hotels
  •  Guard your identity information carefully and only provide to trusted people and entities – such as your date of birth, current address, driver’s license number and passport details
  •  Be cautious about unsolicited offers or opportunities offering you the chance of making easy money
  •  Be wary of offers from people or companies overseas as it makes it harder to check if they are bona-fide
  •  Take steps to verify any company which makes you a job offer, for example, address, phone number, e-mail address and website. Check if it is a registered company
  •  Always guard your personal information and be suspicious if someone asks for a host of personal details soon after contact
  •  Be wary of a person asking for financial assistance – be aware if you send money by wire transfer these funds cannot be recovered by banks
  •  Be cautious of someone asking for details of your financial status – do not provide the information


May you have a happy and safe Christmas season 

see you in the New Year - Ian B 

Wednesday, December 3, 2014

More neworking questions in the 2014 series - Final?

Time to stretch the grey matter with some more Cisco based networking questions...with some subnetting thrown in to add to the annoyance  :-)



1. If a switch receives a multicast frame, what does it do with it?

A) Forwards it out every port
B) Sends it back to the originator asking for a destination address
C) Drops the frame


2. What is the reserved address space for a Class B network?

A) 10.0.0.0 - 10.255.255.255
B) 20.0.0.0 - 20.255.255.255
C) 172.16.0.0 - 172.31.255.255
D) 192.168.0.0 - 192.168.255.255
E) 208.168.0.0 - 208.168.255.255


(Might need a pencil for the next 2 :-)

3. What valid host range is the IP address 172.25.78.33/27 part of?

4. Which subnet does host 172.26.147.25 255.255.255.224 belong to?

5. IGRP advertises routes to interior, system and exterior routes

A) True
B) False


6. If your switch uses shared memory buffering, what would happen if a packet could not be delivered because of a busy destination port?

A) It would delay transmission of all packets in memory
B) It would be sent to the destination port anyway
C) It would wait in a queue while all other packets in memory are transmitted
D) It would drop the packet after an allocated time


7. What is the default administrative distance of a static route?

A) 1
B) 90
C) 100
D) 110
E) 120


8. Trunk links are used to communicate between...

A) Two switches
B) A switch and router
C) A switch and server
D) A switch and PC
E) A, B and C are correct







Get eBook




1. Correct Answer A 

Internally multicast is treated as broadcast. So the Switch, will send it to all port except from which it recieve. Same way it will treat broadcast also.


2. Correct Answer C

http://en.wikipedia.org/wiki/Private_network#Private_IPv4_address_spaces


3. 172.25.78.33 through to 172.25.78.62

4. 172.26.147.0

5. Correct Answer A

IGRP advertises three types of routes:

Interior routes are routes between subnets in the network attached to a router interface.
System routes are routes to networks within an autonomous system.
Exterior routes are routes to networks outside the autonomous system.


6. Correct Answer C

The area of memory where the switch stores the data is called the memory buffer.

The memory buffer can use two methods for forwarding frames:

port-based memory buffering
shared memory buffering

In port-based memory buffering frames are stored in queues that are linked to specific incoming ports.

Shared memory buffering deposits all frames into a common memory buffer which all the ports on the switch share.


7. Correct Answer A

The default administrative distance for a static route is 1.


8. Correct Answer E

A trunk link is a point-to-point link between two switches, a switch and router or a switch and server which carries multiple VLAN traffic.





Not sure if there will be more questions before Christmas, however I plan new sets for 2015 so come back and we'll have some more lernin... :-)  

Have a good Christmas.

Wednesday, November 26, 2014

Networking Questions and Answers



Here's another set of Cisco based networking questions to mull over - enjoy!




1. How would you copy the IOS to a TFTP server?

A) Router(config)#copy ram tftp
B) Router(config)#copy tftp flash
C) Router#copy flash tftp
D) Router#copy tftp flash
E) None of the above 


2. What determines network addresses when data link addresses are known?

A) Ping
B) ICMP
C) ARP
D) RARP


3. What process is used to check whether packets have been received when using IP?

A) Acknowledgments
B) CRC
C) Windowing
D) Flow control
E) None


4. What is the maximum number of subnets given the following?

192.168.10.0
255.255.255.192
(Assume ip subnet-zero is enabled)

A) 4
B) 8
C) 16
D) 32
E) 64


5. Ip subnet-zero is enabled on all your routers.
How many bits must you borrow to create 16 subnets?


A) 1
B) 2
C) 3
D) 4
E) 5


6. What is the maximum size of an Ethernet packet when the frames have ISL tagging?(Include the size of headers and CRC)

A) 64 bytes
B) 1500 bytes
C) 1518 bytes
D) 1522 bytes
E) 1548 bytes


7. Which of the following are Routed protocols?

A) IP, IPX, ICMP
B) IP, IPX, Appletalk
C) RIP, IGRP, EIGRP
D) Both A and B are correct


8. What is the encapsulation type of Transport Layer?

A) Segments
B) Packets
C) Frames
D) Bits


9. What does Router(config)# no access-list 1 command achieve?

A) Removes Access List 1
B) Disables ACL on interface 1
C) Nothing, this is not a Cisco command


10. What is the numerical value of the Bridge Priority held by Catalyst switches?

A) 32500
B) 32768
C) 100
D) 1024
E) 32700







Get eBook Here



1. Correct Answer C

It is a good practice to backup your existing system image to the TFTP server using the copy flash tftp command.


2. Correct Answer D

Reverse Address Resolution Protocol (RARP) is used by a host computer to request its IPv4 address from an administrative host, it provides the administratiev host with its hardware address (MAC address).

http://en.wikipedia.org/wiki/Reverse_Address_Resolution_Protocol


3. Correct Answer E

Trick question. IP provides no form of error correction/acknowledgements.


4. Correct Answer A

192.168.10.0 is a class C address.  The subnet mask 255.255.255.192 implies 2 bits are borrowed.
22 = 4 subnets


5. Correct Answer D

24 = 16


6. Correct Answer E

Cisco's proprietary VLAN tagging (ISL) has a maximum frame size of 1548 bytes.
IEEE 802.1q VLAN tagging has a maximum frame size of 1522 bytes.


7. Correct Answer D

Routed Protocols are layer 3 Network Layer protocols. They include Internet Protocol (IP), Internetwork Packet Exchange (IPX) and Apple's AppleTalk. Routed or routable protocols allow for internetwork communication by assigning network and host identities to packets, without routed protocols network communication would be restricted to the local segment.

Internet Control Message Protocol (ICMP) is a TCP/IP protocol that works at the network layer and is used to report errors and deliver messages. ICMP is also considered a routed protocol.


8. Correct Answer A 

The Transport layer protocol data unit (PDU) is the 'Segment'


9. Correct Answer A

If you wish to remove an access-list, you use the no access-list (list #) command.


10. Correct Answer B 

The Bridge Priority is the numerical value held by switches. All Catalyst switches have a default priority of 32768. To determine the root bridge you combine the priority of each bridge with its MAC. If two switches have the same priority value the lowest MAC address becomes the root bridge.

 How did you go - Interesting huh - More coming stay tuned... Have a great day!!!


Monday, November 24, 2014

Millimetre-wave WiFi devices.


Samsung preps 4.6Gbps millimetre-wave WiFi devices.




Known as WiGig, the 802.11ad standard transmits in the unlicensed 60GHz frequency band for high performance up to 4.6 gigabits per second in Samsung's designs, while remaining backwards compatible with the previous 2.4GHz and 5GHz Wi-Fi standards.

Compared to today's 802.11ac which provides a maximum throughput of 867 megabits per second per stream under ideal conditions, 802.11ad devices can reach speeds as fast as 7 gigabit/s.

The high frequency used for WiGig results in path loss and poor wall and floor penetration of the signal, leading to shorter reach than existing Wi-Fi.

Samsung said it has solved these issues with millimetre-wave circuit design, improved transmission technology and a wide-coverage beam-shaping aerials. This, the company said, would make WiGig commercially viable in retail devices.



Read more: http://www.itnews.com.au/News/396733,wigig-coming-to-samsung-devices.aspx#ixzz3G6aWIlAc




Get eBook


Friday, November 21, 2014

Networking Questions And Answers

Another random batch of Cisco based networking questions to ponder, enjoy.



1. What is the default VTP mode of operation for the Cisco Catalyst switch?

A) Client
B) Server
C) Transparent


2. Router(config)#access-list 150 deny tcp any host 172.32.14.2 eq 25

What type of ACL is this and what is it performing?

A) Standard ACL, deny all SMTP traffic to host 172.32.14.2
B) Standard ACL, deny all Telnet traffic to host 172.32.14.2
C) Extended ACL, deny all SMTP traffic to host 172.32.14.2
D) Extended ACL, deny all Telnet traffic to host 172.32.14.2
E) Named ACL, deny all SMTP traffic to host 172.32.14.2


3. Rapid Spanning Tree Protocol (RSTP) can only run on Cisco switches?

A) True
B) False


4. When STP is converging no data can move through the switched network.

A) True
B) False


5. What class is the following IP address?
192.150.0.5

A) Class A
B) Class B
C) Class C
D) Class D


6. Which layer of the OSI reference model allows for internetwork connectivity?

A) Presentation layer
B) Datalink layer
C) Layer 2
D) Network layer
E) Application layer


7. What is the invalid timer set to by default when you have a router running the Interior Gateway Routing Protocol?

A) 3 times the update period
B) 270 seconds
C) 3 times the update period + 10 seconds
D) Answer A and B
E) 7 times the update period


8. How many access control lists can you apply to an interface?

A) Unlimited
B) One ACL per port per direction
C) 10
D) You do not apply ACL to interfaces


9. What does the trace response N mean?

A) Network unreachable
B) Not forwarded due to ACL restriction
C) Protocol unreachable
D) Port could not be reached


10. What is the maximum number of hosts you can assign to a class C network if it is not subnetted?

A) 1024
B) 254
C) 32
D) 512
E) 65025





 
  Get eBook




1, Correct Answer B

The default mode for all Catalyst switches is Server.
A VTP domain requires at least one VTP server.


2, Correct Answer C

Router(config)#access-list 150 deny tcp any host 172.32.14.2 eq 25

Port 25 is SMTP. This extended ACL denies traffic from any source to host 172.32.14.2.


3. Correct Answer B

RSTP (802.1w) is a new Spanning Tree Protocol that can run on any brand of switch.  It can even inter-operate with legacy STP protocols!

4. Correct Answer A

http://en.wikipedia.org/wiki/Spanning_tree_protocol

5. Correct Answer C

The first octet of a class C IP address ranges from 192 - 223


6. Correct Answer D

The Network layer of the OSI model is the layer that defines how internetworks (interconnected networks) function. The Network layer is concerned with getting data from one computer to another even across remote networks.


7. Correct Answer D 

IGRP sends its routing table to its neighbors every 90 seconds. IGRP uses an invalid timer to mark a route as invalid after 270 seconds (three times the update timer). IGRP uses a flush timer to remove a route from the routing table (default flush timer is 630 seconds, seven times the update period).


8. Correct Answer B 

Cisco routers only allow you to place one access control list (ACL) per direction.

9. Correct Answer A

Cisco Trace Command Response Codes

Response Meaning
 * Timed out
 !H router received packet but did not forward it
 N network unreachable
 P protocol unreachable
 U port unreachable



10. Correct Answer B

For class C the number of bits for host address portion is 8. So 2^8 -2 = 256-2 = 254 hosts.




How did you go?  Stay tuned for more - have a great day!

Saturday, October 4, 2014

Animator vs. Animation IV (original)







The struggle between a stick figure and its creator, a computer
animator. In this fourth installment, the animator is finally shown in
real life interacting with his computer monitor. 

The stick figure,
resisting his tormentor, attacks his social life by hacking his Facebook
account, traveling onto his iPhone via USB cord, and drawing animations
of his own to dismantle the animation interface.

Monday, September 8, 2014

Easy Ways to Recycle

When you think of recycling do you sigh and think that you just don't have the time or energy to do it?

Recycling is not just saving up your empty containers for collection, for example, I have a terrible habit of leaving lights on when I leave a room.  I seem to be someone who, when doing any kind of work, whether it's writing or stripping wallpaper, I need a lot of light around to do it. 

There are many ways to conserve and recycle as the video below shows :-)



The first way I found to conserve energy and count myself in as a "recycler" was to turn off lights as I left a room.  Sounds easy, right?  Well, that's because it is easy.  The only thing I had to do was remind myself that I was no longer going to waste energy by leaving lights on in a room that no one was occupying

Another way is that I changed my light bulbs.  Yup, that simple act of replacing a burned-out bulb with one of the new, energy saving kind has really been a big help.  The newer bulbs use up to 75% less energy when lighting a room and they are supposed to last 10 times longer (debatable).  How can you beat that?  And there wasn't any effort on my part; all I did was replace the bulb with the new and improved bulb and have made quite the impact on my electric bill.

There are easy ways to stay on track with recycling, and you don't have to look very far to find them, maybe that car is the way of the future.......

More Networking questions coming soon :-)

Friday, August 22, 2014

More network based questions part 8

Here's another selection of random networking questions - enjoy.


1. If I were to give an IP address to VLAN1, then VLAN2, and VLAN3, which VLAN would be the management VLAN?

A) VLAN0
B) VLAN1
C) VLAN2
D) VLAN_A
E) VLAN01


2. Frame tagging is used to identify...

A) The intended recipient of a frame
B) The IP address of the frame
C) The source of the frame
D) The VLAN ID of the frame
E) The trunking method

3. What are the three layers of the Cisco hierarchical model?

A) Core layer, Network layer, Access layer
B) Core layer, Distribution layer, Access layer
C) Physical layer, Network layer, Transport layer
D) Media Layer, Transport layer, Application layer


4. HDLC is ISO standard WAN protocol which means you don't need Cisco routers at both ends of a WAN connection, a router from any vendor that supports HDLC will work.
A) True
B) False

5. What type of IP address has the following structure?

network.node.node.node

A) Class A
B) Class B
C) Class C



And a couple of subnetting questions

6. What is the first valid host on the subnet that this address 172.21.15.22/21 belongs to?

7. What is the broadcast address of the network 172.20.80.0 255.255.240.0?


Note: Subnet zero is allowed for all of these subnetting questions.








1. Correct Answer B

VLAN1 is a management VLAN and by default all ports on a switch are members of VLAN1.  Cisco recommends that you use VLAN1 for administrative purposes only, also note you can't change the name of VLAN1.


2. Correct Answer D

Frame tagging is used to tags frames on trunked links to identify what VLAN they belong to.


 3. Correct Answer B

Core layer: Considered the backbone of the network (high-end switches, high-speed cables). Concerned only with speed and reliable delivery of data. No packet filtering happens here.

Distribution layer (Workgroup layer): Ensures packets are properly routed between subnets and VLANs using LAN-based routers and Layer 3 switches.

Access layer (Desktop layer): Deals with connecting workstations to the network with switches and hubs.


 4. Correct Answer B

Even though HDLC is an ISO standard, each vendor has their own implementations of HDLC.


5. Correct Answer A

http://en.wikipedia.org/wiki/Classful_network#Introduction_of_address_classes

Subnetting Answers

6. Correct Answer: 172.21.8.1

7. Correct Answer: 172.20.95.255



http://d53428b9fnj5bvangscjx43m9m.hop.clickbank.net/

   The will to win, the desire to succeed, the urge to reach your full potential... these are the keys that will unlock the door to personal excellence.

― Confucius

Monday, August 18, 2014

Cisco Exam Demo



In the case of Cisco exams,  students fall into a trap. They learn the theory and a little bit of troubleshooting, but they have no idea what the CCNA exam will be like when they go to the testing center.

Luckily Cisco have a little known demo which shows you what types of questions you will encounter on the exam and lets you try them out. Once you are familiar with the different types of exam questions, you'll be much more confident going into the exam.

Go to the Cisco Exam demo

Saturday, August 16, 2014

Cisco base networking questions for 2014 - part 7


Here's some more random networking to activate the brain cells... enjoy!!!

Thought it was about time I started 
adding to the collection :-) apologies for the gap.



 1. What is the correct sequence of Spanning Tree states?

A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled

2. If a switch receives a multicast frame, what does it do with it?

A) Forwards it out every port
B) Sends it back to the originator asking for a destination address
C) Drops the frame

3. IGRP advertises routes to interior, system and exterior routes

A) True
B) False
4. What is the reserved address space for a Class C network?

A) 10.0.0.0 - 10.255.255.255
B) 20.0.0.0 - 20.255.255.255
C) 172.16.0.0 - 172.31.255.255
D) 192.168.0.0 - 192.168.255.255
E) 208.168.0.0 - 208.168.255.255

5. What does the trace response N mean?

A) Network unreachable
B) Not forwarded due to ACL restriction
C) Protocol unreachable
D) Port could not be reached

6. Cut Through switching method is best described by which of the following?

A) The entire frame is received before forwarding is commenced
B) Forwards frame after receiving the destination MAC address
C) Filters out collision packets by waiting for the first 64 bytes of data
D) Forwards frame after receiving the source MAC address



Engineer Sales training





1. Correct Answer A
 
STP switch port states:

Blocking > Listening > Learning > Forwarding > Disabled 

2. Correct Answer A 

Internally multicast is treated as broadcast. So the Switch, will send it to all ports except from the one which it is received, just like a broadcast.

3. Correct Answer A

IGRP advertises three types of routes:

Interior routes are routes between subnets in the network attached to a router interface.
System routes are routes to networks within an autonomous system.
Exterior routes are routes to networks outside the autonomous system.


5.  Correct Answer A

Cisco Trace Command Response Codes
Response Meaning
 *         Timed out
 !H       router received packet but did not forward it
 N        network unreachable
 P        protocol unreachable
 U        port unreachable

6. Correct Answer B

Cut-Through switching is also referred to as Fast Forward.

When in cut-through mode the switch waits for the destination MAC Address to be received. Once the MAC Address is known the switch refers to its MAC filter table to determine which port the frame should be forwarded out. The switch forwards the frame even before the entire frame has arrived.


I hope you enjoyed those - more to come..stay tuned....

   Success is a state of mind. If you want success, start thinking of yourself as a success.

― Joyce Brothers


Wednesday, May 28, 2014

A new series of Cisco base networking questions for 2014 - part 6

Lets get to thinking with a random selection of Networking / IT based questions and answers :-)








1. When each network segment uses a different subnet mask this is referred to as...

A) Classful routing
B) Classless routing


2. What is the structure of the MAC address?

A) 32 bit network ID + 32 bit host ID
B) 14 bit vendor code + 6 bit serial number
C) 24 bit vendor code + 24 bit serial number
D) Network + Host

3. Which WAN protocol is capable of carrying video, Circuit Switched Data And Telephone Services using normal phone network?

A) Frame Relay
B) ISDN
C) PPP
D) ISL


4. What do the IOS commands below achieve?

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in

 A) Create an extended ACL to only permit host 172.5.15.2 to connect to VTY
B) Create a standard ACL to only permit host 172.5.15.2 to connect to VTY
C) Create an extended ACL to only permit hosts on the network 172.5.15.2 to connect to VTY
D) Create a standard ACL to only permit hosts on the network 172.5.15.2 to connect to VTY


5. What OSI layer does the following refer to?

"Establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications"

A) Transport layer
B) Session layer
C) Datalink layer
D) Application layer
E) Presentation layer


6. IGRP advertises routes to interior, system and exterior routes

A) True
B) False





-->
Clickbank Products



1. Correct Answer B

http://en.wikipedia.org/wiki/Classful_network


2. Correct Answer C

MAC Addresses are 48 bits long and consist of a 24 bit vendor code and a 24 bit serial number.


3. Correct Answer B

ISDN (Integrated Services Digital Network) is a set of standards for simultaneous digital communications (voice, video, data) over the traditional circuits of the public switched telephone network.


4. Correct Answer B

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in


This standard access list permits only the host 172.5.15.2 to connect to your VTY telnet line.


5. Correct Answer D

The Application layer of the OSI model (layer 7) establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications.


6. Correct Answer A

IGRP advertises three types of routes:

Interior routes are routes between subnets in the network attached to a router interface.
System routes are routes to networks within an autonomous system.
Exterior routes are routes to networks outside the autonomous system.


Let me know how you went, :-)

 "I couldn't wait for success so I started without it" 
Jonathan Winters



Wednesday, May 21, 2014

A new series of Cisco base networking questions for 2014 - part 5

Another selection of random Networking / IT based questions and answer, hopefully to help with getting your certifications or just increase knowledge - enjoy. 



1.  Which of the following best describes the presentation layer?

A) Translates between different data formats
B) Provides transport services
C) Supports communication between different programs
D) Establishes and terminates applications


2. Which protocol is used to determine the IP address if the MAC address is already known?

A) ARP
B) RARP
C) IP
D) IPX
E) TCP


3. What IOS command will copy the current running-config to NVRAM?

A) write memory
B) wr nvram
C) copy start-up run
D) copy run start
E) Answers A and D are correct


4. What process is used to check whether packets have been received when using IP?

A) Acknowledgments
B) CRC
C) Windowing
D) Flow control
E) None


5. Subnetting Questions

    a. What is the broadcast address of the network 192.168.98.64/26? 

    b. Which subnet does host 172.27.249.128 255.255.248.0 belong to?

6. What IOS command would you issue in privileged-mode to change the router configuration stored on TFTP?

A) config t
B) config mem
C) config net
D) config tftp






eToro Forex Trading




1. Correct Answer A

Presentation Layer is the 6th Layer of OSI model. It is responsible for converting different formats to device understandable language at both ends.


 2. Correct Answer B

Reverse Address Resolution Protocol (RARP) is a networking protocol used by a host computer to request its IP address from an administrative host, when it knows its MAC address.

 http://en.wikipedia.org/wiki/Reverse_Address_Resolution_Protocol 

 3. Correct Answer E

There are two types of configuration files on a router:

Running config - The configuration currently running on the router. Stored in RAM.
Startup config - Saved configuration stored in NVRAM.

To save the running configuration to the startup configuration use the following command.

Router# copy running-config startup-config  

or
Router# copy run start


 4. Correct Answer E

Trick question. IP provides no form of error correction / acknowledgements.

(Cisco loves trick questions....)

 5. Correct Answers

 a.  192.168.98.127
 b.  172.27.248.0

6.  Correct Answer C

To change the router configuration stored on TFTP you use configure network (config net)



 A couple of curly ones there, subnetting always seems to slow one down :-)

Stay tuned for more...

Friday, May 16, 2014

A new series of Cisco base networking questions for 2014 - part 4

Another selection of random Networking / IT based questions and answers to get the grey matter ticking..enjoy

1. What is the correct sequence of Spanning Tree states?

A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled


 2. What type of NAT allows you to map multiple unregistered IP addresses to a single registered IP address?

A) Static NAT
B) Dynamic NAT
C) Overloading (Port Address Translation)


3.  You are having to enter a certain command into the router several times, how would you recall the last entry?

A) Up arrow
B) Down arrow
C) Ctrl+N
D) Shift-P
E) Alt-P


 4. What is responsible for ensuring a router is functional and the interfaces are present on booting?

A) Bootstrap
B) POST
C) ROM monitor
D) NVRAM
E) Configuration register


5.  What is the Spanning Tree forward delay?

A) The time that is spent in the Listening and Learning states
B) 50 seconds
C) Time taken for a switch to go from Listening to Forwarding
D) Time taken for a switch to go from Blocking to Forwarding



6. What describes the role of the Session layer?

A) Provides transport services
B) Translates between different data formats
C) Supports communication between applications
D) Establishes and terminates communications between applications 





Dodo Australia - ADSL2+ Broadband - No Bundling Required



1,  Correct Answer A

STP switch port states:

Blocking
Listening
Learning
Forwarding
Disabled


2. Correct Answer C

 PAT (Port Address Translation) allows you to map multiple unregistered IP addresses to a single registered IP address

3. Correct Answer A

Cisco Keyboard Shortcut Actions

Up Arrow Displays your previous commands.  (command history)
TAB Key Completes a partially typed CLI commands.
CTRL+Z Takes you back to Privileged EXEC Mode.

CTRL+A Places the cursor at the beginning of a line.
CTRL+E Places the cursor at the end of a line.
CTRL+R Redisplays the current command line.
CTRL+W Erases a word (behind the cursor).
CTRL+U Erases an entire line.


4. Correct Answer B

POST (Power-on-self-test) stored in ROM performs a basic router health-check on booting.


5. Correct Answer A

Forward delay — The time that is spent in the listening and learning state, 15 sec by default, but you can tune the time to be between 4 and 30 sec.


6. Correct Answer D

The Session Layer (layer 5) of the OSI model provides the mechanism for opening, closing and managing a session between end-user application processes.


Very random I know, how did you go? More to come, fun isn't it :-)


Courage doesn't always roar. Sometimes courage is the quiet voice at the end of the day saying, "I will try again tomorrow."
~ Mary Anne Radmacher "



Tuesday, May 13, 2014

7 Ways to Improve Your Mobile Banking Security

As mobile banking grows in popularity, experts are offering consumers advice on how to safely use this service so they can be protected while conveniently managing their finances. It’s timely advice; mobile banking is one of the industry’s fastest growing trends because it gives consumers flexibility and the chance to manage their finances anytime and anywhere. But to enjoy the benefits without compromising security, you need to make informed decisions, avoiding the scams and schemes that are growing up around this new technology. To that end, some tips:


1.Invest in an antivirus app for your smartphone or tablet to help protect you when downloading other apps and mobile content. A good site I found for ideas on this is Digitl Trends, Top 5 Android security Apps.

2.Never provide personal identification or banking information over your mobile device unless you initiate the contact and you know that you’re dealing directly with your bank.

3.Never share your password, account number, PIN, or answers to your secret questions. Moreover, don't save this information anywhere on your phone – if you do, and it’s lost or stolen, you’re a sitting duck.

4.Never set an app to automatically log you into your bank account. If you do and your device is lost or stolen, someone will have free access to your money.

5.Set your phone to require a password to power on the handset or awaken it from sleep mode.

6.Remember, your bank would never call or text you asking for personal or banking information. Assume any unsolicited text request is fraudulent.

7.Immediately tell your mobile operator and your bank if you lose your phone.


You can ensure multiple antivirus programs aren’t interfering with each other by making sure they aren’t scanning at the same time.




--> Clickbank Products

Friday, April 18, 2014

A new series of Cisco base networking questions for 2014 - part3

Another selection of random Networking / IT based questions and answers to get the grey matter ticking..enjoy 

 1. What should be carried out within the Cisco hierarchy at the distribution layer? 

A) ACL 
B) Security and network policies 
C) VLANs 
D) WAN access 
E) All of the above 

2. Which of the following commands would correctly add a message of the day banner? 

A) Router(config)#banner # 
B) Router(config)#banner motd # 
C) Router#banner motd # 
D) Router#banner # 

3. What mode are you in when you see this prompt? 

 Router(config-router)#

A) user exec mode 
B) privileged mode 
C) global configuration mode 
D) interface configuration mode 
E) routing protocol configuration 

 4, What is the correct sequence of Spanning Tree states? 

A) Blocking, Listening, Learning, Forwarding, Disabled 
B) Disabled, Blocking, Listening, Learning, Forwarding 
C) Learning, Listening, Forwarding, Disabled, Blocking 
D) Listening, Learning, Forwarding, Blocking, Disabled 

5. What protocol range would you use for IP in ACLs? 

A) 1-99 
B) 800-899 
C) 200-299 
D) 1000-1099 







1. Correct Answer E

Core layer: Considered the backbone of the network (high-end switches, high-speed cables). Concerned only with speed and reliable delivery of data. No packet filtering happens 

2. Correct Answer B

Router>enable
Router>Password:cisco
Router#configure terminal
Router(config)#hostname London
London(config)#banner motd #welcome#
London(config)#exit

The correct answer is B because you need to be in router configuration mode to change the MOTD banner.


I often use this - try it and see :-)  hopefully it displays right LOL.



                                        \\\|///
                                      \\ ~ ~ //
                                    (/ @ @ /)
**************************o00o-(_)-o00o****************************
I'm watching you......... :-) 
                                         0ooo.                                 
*********************************(   )******************************
                                 .ooo0  ) /
                                   (   )  (_/
                                     \ (
                                      \_)

3. Correct Answer E

 Here is a summary of Cisco IOS router command prompts:

Router> - User EXEC mode
Router# - Privileged EXEC mode
Router(config)# - Global configuration mode
Router(config-if)# - Interface level configuration mode
Router(config-router)# - Routing engine level within configuration mode
Router(config-line)# - Line level (vty, tty, async) within configuration mode


4.  Correct Answer A

STP switch port states:

Blocking
Listening
Learning
Forwarding
Disabled


5. Correct Answer A

Router#configure terminal
Router(config)#access-list ?
 <1-99>  IP standard access list
 <100-199> IP extended access list
 <1100-1199> Extended 48-bit MAC address access list
 <1300-1999> IP standard access list (expanded range)
 <200-299> Protocol type-code access list
 <2000-2699> IP extended access list (expanded range)
 <700-799> 48-bit MAC address access list
 rate-limit Simple rate-limit specific access list




 How did you do? More coming stay tuned, 
or sign up to get them emailed to you as I publish them :-)

Wednesday, February 26, 2014

A new series of Cisco base networking questions for 2014 - part2

A set of questions for those interested in IT / networking / certification or just generally curious  - Enjoy.
(This time with some IPv4 questions thrown into the mix :-)

The secret of life is not to do what you
like but to like what you do.

By: Anonymous

1. What will be the IP address of the second subnet given the following?

172.16.0.0 255.255.224.0 (Assume ip subnet-zero is enabled)


A) 172.16.0.0
B) 172.16.8.0
C) 172.16.16.0
D) 172.16.32.0
E) 172.16.64.0


2. What is the maximum number of subnets and hosts per subnet achievable from the network 172.22.0.0 255.255.255.224?

A) 2048 subnets and 30 hosts
B) 256-224=32 ip per subnet - 30 hosts
C) 256/32=8 subnets per 4th octet
D) 256 x 8 = 2048 total subnets for B class address


3. What are the 3 ways of assigning a switched port to VLANs?

A) Switch-centric, Port-centric, Dynamic VLANs
B) Port-centric, Static VLANs, Dynamic VLANs
C) Interface-based, Static VLANs, Dynamic VLANs


4. What is the default time BPDUs are sent and received by switches?

A) 2 seconds
B) 10 seconds
C) 30 seconds
D) 60 seconds


5. What does Router(config)# no access-list 1 command achieve?

A) Removes Access List 1
B) Disables ACL on interface 1
C) Nothing, this is not a Cisco command





Dodo Australia - ADSL2+ Broadband - No Bundling Required




1. Correct Answer: D 

The subnet block size is 256 - 224 = 32
The first subnet will be subnet zero 172.16.0.0
The second subnet will be 172.16.32.0


2. Correct Answer: A

2048 subnets and 30 hosts

3. Correct Answer: B

Three ways of assigning a switched port to VLANs:

Port-Centric - All nodes connected to ports in the same VLAN are assigned to the same VLAN ID.
Static VLANs - Statically assign ports to a VLAN.
Dynamic VLANs - Ports that can automatically determine their VLAN assignments based on MAC addresses.


4. Correct Answer: A 

The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for manual enabling/disabling of these backup links.

The bridges have to determine the root bridge and compute the port roles (root, designated, or blocked) with only the information that they have. To ensure that each bridge has enough information, the bridges use special data frames called Bridge Protocol Data Units (BPDUs) to exchange information about bridge IDs and root path costs.

A bridge sends a BPDU frame using the unique MAC address of the port itself as a source address, and a destination address of the STP multicast address 01:80:C2:00:00:00.

There are two types of BPDUs in the original STP specification (The Rapid Spanning Tree (RSTP) extension uses a specific RSTP BPDU.[4]):

Configuration BPDU (CBPDU), used for Spanning Tree computation
Topology Change Notification (TCN) BPDU, used to announce changes in the network topology
BPDUs are exchanged regularly (every 2 seconds by default) and enable switches to keep track of network changes and to start and stop forwarding at ports as required.


5. Correct Answer: A

"No" is generally used in front of Cisco config lines to remove them from configuration, in this case No Removes Access List 1

More questions Coming - see you soon...

Sign up to get them in your email