Wednesday, May 28, 2014

A new series of Cisco base networking questions for 2014 - part 6

Lets get to thinking with a random selection of Networking / IT based questions and answers :-)








1. When each network segment uses a different subnet mask this is referred to as...

A) Classful routing
B) Classless routing


2. What is the structure of the MAC address?

A) 32 bit network ID + 32 bit host ID
B) 14 bit vendor code + 6 bit serial number
C) 24 bit vendor code + 24 bit serial number
D) Network + Host

3. Which WAN protocol is capable of carrying video, Circuit Switched Data And Telephone Services using normal phone network?

A) Frame Relay
B) ISDN
C) PPP
D) ISL


4. What do the IOS commands below achieve?

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in

 A) Create an extended ACL to only permit host 172.5.15.2 to connect to VTY
B) Create a standard ACL to only permit host 172.5.15.2 to connect to VTY
C) Create an extended ACL to only permit hosts on the network 172.5.15.2 to connect to VTY
D) Create a standard ACL to only permit hosts on the network 172.5.15.2 to connect to VTY


5. What OSI layer does the following refer to?

"Establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications"

A) Transport layer
B) Session layer
C) Datalink layer
D) Application layer
E) Presentation layer


6. IGRP advertises routes to interior, system and exterior routes

A) True
B) False





-->
Clickbank Products



1. Correct Answer B

http://en.wikipedia.org/wiki/Classful_network


2. Correct Answer C

MAC Addresses are 48 bits long and consist of a 24 bit vendor code and a 24 bit serial number.


3. Correct Answer B

ISDN (Integrated Services Digital Network) is a set of standards for simultaneous digital communications (voice, video, data) over the traditional circuits of the public switched telephone network.


4. Correct Answer B

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in


This standard access list permits only the host 172.5.15.2 to connect to your VTY telnet line.


5. Correct Answer D

The Application layer of the OSI model (layer 7) establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications.


6. Correct Answer A

IGRP advertises three types of routes:

Interior routes are routes between subnets in the network attached to a router interface.
System routes are routes to networks within an autonomous system.
Exterior routes are routes to networks outside the autonomous system.


Let me know how you went, :-)

 "I couldn't wait for success so I started without it" 
Jonathan Winters



Wednesday, May 21, 2014

A new series of Cisco base networking questions for 2014 - part 5

Another selection of random Networking / IT based questions and answer, hopefully to help with getting your certifications or just increase knowledge - enjoy. 



1.  Which of the following best describes the presentation layer?

A) Translates between different data formats
B) Provides transport services
C) Supports communication between different programs
D) Establishes and terminates applications


2. Which protocol is used to determine the IP address if the MAC address is already known?

A) ARP
B) RARP
C) IP
D) IPX
E) TCP


3. What IOS command will copy the current running-config to NVRAM?

A) write memory
B) wr nvram
C) copy start-up run
D) copy run start
E) Answers A and D are correct


4. What process is used to check whether packets have been received when using IP?

A) Acknowledgments
B) CRC
C) Windowing
D) Flow control
E) None


5. Subnetting Questions

    a. What is the broadcast address of the network 192.168.98.64/26? 

    b. Which subnet does host 172.27.249.128 255.255.248.0 belong to?

6. What IOS command would you issue in privileged-mode to change the router configuration stored on TFTP?

A) config t
B) config mem
C) config net
D) config tftp






eToro Forex Trading




1. Correct Answer A

Presentation Layer is the 6th Layer of OSI model. It is responsible for converting different formats to device understandable language at both ends.


 2. Correct Answer B

Reverse Address Resolution Protocol (RARP) is a networking protocol used by a host computer to request its IP address from an administrative host, when it knows its MAC address.

 http://en.wikipedia.org/wiki/Reverse_Address_Resolution_Protocol 

 3. Correct Answer E

There are two types of configuration files on a router:

Running config - The configuration currently running on the router. Stored in RAM.
Startup config - Saved configuration stored in NVRAM.

To save the running configuration to the startup configuration use the following command.

Router# copy running-config startup-config  

or
Router# copy run start


 4. Correct Answer E

Trick question. IP provides no form of error correction / acknowledgements.

(Cisco loves trick questions....)

 5. Correct Answers

 a.  192.168.98.127
 b.  172.27.248.0

6.  Correct Answer C

To change the router configuration stored on TFTP you use configure network (config net)



 A couple of curly ones there, subnetting always seems to slow one down :-)

Stay tuned for more...

Friday, May 16, 2014

A new series of Cisco base networking questions for 2014 - part 4

Another selection of random Networking / IT based questions and answers to get the grey matter ticking..enjoy

1. What is the correct sequence of Spanning Tree states?

A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled


 2. What type of NAT allows you to map multiple unregistered IP addresses to a single registered IP address?

A) Static NAT
B) Dynamic NAT
C) Overloading (Port Address Translation)


3.  You are having to enter a certain command into the router several times, how would you recall the last entry?

A) Up arrow
B) Down arrow
C) Ctrl+N
D) Shift-P
E) Alt-P


 4. What is responsible for ensuring a router is functional and the interfaces are present on booting?

A) Bootstrap
B) POST
C) ROM monitor
D) NVRAM
E) Configuration register


5.  What is the Spanning Tree forward delay?

A) The time that is spent in the Listening and Learning states
B) 50 seconds
C) Time taken for a switch to go from Listening to Forwarding
D) Time taken for a switch to go from Blocking to Forwarding



6. What describes the role of the Session layer?

A) Provides transport services
B) Translates between different data formats
C) Supports communication between applications
D) Establishes and terminates communications between applications 





Dodo Australia - ADSL2+ Broadband - No Bundling Required



1,  Correct Answer A

STP switch port states:

Blocking
Listening
Learning
Forwarding
Disabled


2. Correct Answer C

 PAT (Port Address Translation) allows you to map multiple unregistered IP addresses to a single registered IP address

3. Correct Answer A

Cisco Keyboard Shortcut Actions

Up Arrow Displays your previous commands.  (command history)
TAB Key Completes a partially typed CLI commands.
CTRL+Z Takes you back to Privileged EXEC Mode.

CTRL+A Places the cursor at the beginning of a line.
CTRL+E Places the cursor at the end of a line.
CTRL+R Redisplays the current command line.
CTRL+W Erases a word (behind the cursor).
CTRL+U Erases an entire line.


4. Correct Answer B

POST (Power-on-self-test) stored in ROM performs a basic router health-check on booting.


5. Correct Answer A

Forward delay — The time that is spent in the listening and learning state, 15 sec by default, but you can tune the time to be between 4 and 30 sec.


6. Correct Answer D

The Session Layer (layer 5) of the OSI model provides the mechanism for opening, closing and managing a session between end-user application processes.


Very random I know, how did you go? More to come, fun isn't it :-)


Courage doesn't always roar. Sometimes courage is the quiet voice at the end of the day saying, "I will try again tomorrow."
~ Mary Anne Radmacher "



Tuesday, May 13, 2014

7 Ways to Improve Your Mobile Banking Security

As mobile banking grows in popularity, experts are offering consumers advice on how to safely use this service so they can be protected while conveniently managing their finances. It’s timely advice; mobile banking is one of the industry’s fastest growing trends because it gives consumers flexibility and the chance to manage their finances anytime and anywhere. But to enjoy the benefits without compromising security, you need to make informed decisions, avoiding the scams and schemes that are growing up around this new technology. To that end, some tips:


1.Invest in an antivirus app for your smartphone or tablet to help protect you when downloading other apps and mobile content. A good site I found for ideas on this is Digitl Trends, Top 5 Android security Apps.

2.Never provide personal identification or banking information over your mobile device unless you initiate the contact and you know that you’re dealing directly with your bank.

3.Never share your password, account number, PIN, or answers to your secret questions. Moreover, don't save this information anywhere on your phone – if you do, and it’s lost or stolen, you’re a sitting duck.

4.Never set an app to automatically log you into your bank account. If you do and your device is lost or stolen, someone will have free access to your money.

5.Set your phone to require a password to power on the handset or awaken it from sleep mode.

6.Remember, your bank would never call or text you asking for personal or banking information. Assume any unsolicited text request is fraudulent.

7.Immediately tell your mobile operator and your bank if you lose your phone.


You can ensure multiple antivirus programs aren’t interfering with each other by making sure they aren’t scanning at the same time.




--> Clickbank Products