Showing posts with label IT job. Show all posts
Showing posts with label IT job. Show all posts

Wednesday, May 28, 2014

A new series of Cisco base networking questions for 2014 - part 6

Lets get to thinking with a random selection of Networking / IT based questions and answers :-)








1. When each network segment uses a different subnet mask this is referred to as...

A) Classful routing
B) Classless routing


2. What is the structure of the MAC address?

A) 32 bit network ID + 32 bit host ID
B) 14 bit vendor code + 6 bit serial number
C) 24 bit vendor code + 24 bit serial number
D) Network + Host

3. Which WAN protocol is capable of carrying video, Circuit Switched Data And Telephone Services using normal phone network?

A) Frame Relay
B) ISDN
C) PPP
D) ISL


4. What do the IOS commands below achieve?

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in

 A) Create an extended ACL to only permit host 172.5.15.2 to connect to VTY
B) Create a standard ACL to only permit host 172.5.15.2 to connect to VTY
C) Create an extended ACL to only permit hosts on the network 172.5.15.2 to connect to VTY
D) Create a standard ACL to only permit hosts on the network 172.5.15.2 to connect to VTY


5. What OSI layer does the following refer to?

"Establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications"

A) Transport layer
B) Session layer
C) Datalink layer
D) Application layer
E) Presentation layer


6. IGRP advertises routes to interior, system and exterior routes

A) True
B) False





-->
Clickbank Products



1. Correct Answer B

http://en.wikipedia.org/wiki/Classful_network


2. Correct Answer C

MAC Addresses are 48 bits long and consist of a 24 bit vendor code and a 24 bit serial number.


3. Correct Answer B

ISDN (Integrated Services Digital Network) is a set of standards for simultaneous digital communications (voice, video, data) over the traditional circuits of the public switched telephone network.


4. Correct Answer B

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in


This standard access list permits only the host 172.5.15.2 to connect to your VTY telnet line.


5. Correct Answer D

The Application layer of the OSI model (layer 7) establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications.


6. Correct Answer A

IGRP advertises three types of routes:

Interior routes are routes between subnets in the network attached to a router interface.
System routes are routes to networks within an autonomous system.
Exterior routes are routes to networks outside the autonomous system.


Let me know how you went, :-)

 "I couldn't wait for success so I started without it" 
Jonathan Winters



Wednesday, May 21, 2014

A new series of Cisco base networking questions for 2014 - part 5

Another selection of random Networking / IT based questions and answer, hopefully to help with getting your certifications or just increase knowledge - enjoy. 



1.  Which of the following best describes the presentation layer?

A) Translates between different data formats
B) Provides transport services
C) Supports communication between different programs
D) Establishes and terminates applications


2. Which protocol is used to determine the IP address if the MAC address is already known?

A) ARP
B) RARP
C) IP
D) IPX
E) TCP


3. What IOS command will copy the current running-config to NVRAM?

A) write memory
B) wr nvram
C) copy start-up run
D) copy run start
E) Answers A and D are correct


4. What process is used to check whether packets have been received when using IP?

A) Acknowledgments
B) CRC
C) Windowing
D) Flow control
E) None


5. Subnetting Questions

    a. What is the broadcast address of the network 192.168.98.64/26? 

    b. Which subnet does host 172.27.249.128 255.255.248.0 belong to?

6. What IOS command would you issue in privileged-mode to change the router configuration stored on TFTP?

A) config t
B) config mem
C) config net
D) config tftp






eToro Forex Trading




1. Correct Answer A

Presentation Layer is the 6th Layer of OSI model. It is responsible for converting different formats to device understandable language at both ends.


 2. Correct Answer B

Reverse Address Resolution Protocol (RARP) is a networking protocol used by a host computer to request its IP address from an administrative host, when it knows its MAC address.

 http://en.wikipedia.org/wiki/Reverse_Address_Resolution_Protocol 

 3. Correct Answer E

There are two types of configuration files on a router:

Running config - The configuration currently running on the router. Stored in RAM.
Startup config - Saved configuration stored in NVRAM.

To save the running configuration to the startup configuration use the following command.

Router# copy running-config startup-config  

or
Router# copy run start


 4. Correct Answer E

Trick question. IP provides no form of error correction / acknowledgements.

(Cisco loves trick questions....)

 5. Correct Answers

 a.  192.168.98.127
 b.  172.27.248.0

6.  Correct Answer C

To change the router configuration stored on TFTP you use configure network (config net)



 A couple of curly ones there, subnetting always seems to slow one down :-)

Stay tuned for more...

Wednesday, February 26, 2014

A new series of Cisco base networking questions for 2014 - part2

A set of questions for those interested in IT / networking / certification or just generally curious  - Enjoy.
(This time with some IPv4 questions thrown into the mix :-)

The secret of life is not to do what you
like but to like what you do.

By: Anonymous

1. What will be the IP address of the second subnet given the following?

172.16.0.0 255.255.224.0 (Assume ip subnet-zero is enabled)


A) 172.16.0.0
B) 172.16.8.0
C) 172.16.16.0
D) 172.16.32.0
E) 172.16.64.0


2. What is the maximum number of subnets and hosts per subnet achievable from the network 172.22.0.0 255.255.255.224?

A) 2048 subnets and 30 hosts
B) 256-224=32 ip per subnet - 30 hosts
C) 256/32=8 subnets per 4th octet
D) 256 x 8 = 2048 total subnets for B class address


3. What are the 3 ways of assigning a switched port to VLANs?

A) Switch-centric, Port-centric, Dynamic VLANs
B) Port-centric, Static VLANs, Dynamic VLANs
C) Interface-based, Static VLANs, Dynamic VLANs


4. What is the default time BPDUs are sent and received by switches?

A) 2 seconds
B) 10 seconds
C) 30 seconds
D) 60 seconds


5. What does Router(config)# no access-list 1 command achieve?

A) Removes Access List 1
B) Disables ACL on interface 1
C) Nothing, this is not a Cisco command





Dodo Australia - ADSL2+ Broadband - No Bundling Required




1. Correct Answer: D 

The subnet block size is 256 - 224 = 32
The first subnet will be subnet zero 172.16.0.0
The second subnet will be 172.16.32.0


2. Correct Answer: A

2048 subnets and 30 hosts

3. Correct Answer: B

Three ways of assigning a switched port to VLANs:

Port-Centric - All nodes connected to ports in the same VLAN are assigned to the same VLAN ID.
Static VLANs - Statically assign ports to a VLAN.
Dynamic VLANs - Ports that can automatically determine their VLAN assignments based on MAC addresses.


4. Correct Answer: A 

The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for manual enabling/disabling of these backup links.

The bridges have to determine the root bridge and compute the port roles (root, designated, or blocked) with only the information that they have. To ensure that each bridge has enough information, the bridges use special data frames called Bridge Protocol Data Units (BPDUs) to exchange information about bridge IDs and root path costs.

A bridge sends a BPDU frame using the unique MAC address of the port itself as a source address, and a destination address of the STP multicast address 01:80:C2:00:00:00.

There are two types of BPDUs in the original STP specification (The Rapid Spanning Tree (RSTP) extension uses a specific RSTP BPDU.[4]):

Configuration BPDU (CBPDU), used for Spanning Tree computation
Topology Change Notification (TCN) BPDU, used to announce changes in the network topology
BPDUs are exchanged regularly (every 2 seconds by default) and enable switches to keep track of network changes and to start and stop forwarding at ports as required.


5. Correct Answer: A

"No" is generally used in front of Cisco config lines to remove them from configuration, in this case No Removes Access List 1

More questions Coming - see you soon...

Sign up to get them in your email 

Monday, February 17, 2014

Cisco Exam Demo



Are you considering getting Cisco certified? 

A lot of Cisco students attempting the CCNA exams fall into a trap. They learn the theory and a little bit of troubleshooting, but they have no idea what the CCNA exam will be like when they go to the testing center.

Luckily Cisco have a little known demo which shows you what types of questions you will encounter on the exam and lets you try them out. Once you are familiar with the different types of exam questions, you'll be much more confident going into the exam.


Go to the Cisco Exam demo

To your success..

Sunday, January 26, 2014

Contemplating a career in Information Technology?

It's not easy trying to get your first job in IT, you have to compete against candidates who have years of experience. However many of these experienced candidates don't have certifications or a college degree to back up their on-the-job experience, as an older IT professional I find myself in this category.

Unfortunately it is an employers market, where they can pick and choose who they hire. IT graduates sometimes find themselves in a catch 22 position where they can't get a job without experience without getting a job in the first place.

However, a good certification such as the CCNA and a relevant college degree is still the best way to position yourself for your future career, or to expand your career as I am doing.

Certifications provide you with some hands-on configuration experience that will be a step in the right direction to getting the experience you need, however in order to get the commercial experience employers want, you'll have to start from the bottom and work your way up to those high-paying IT positions.

Remember that employers generally like to promote from within their company, so don't be disheartened if you have to start in an entry-level help desk position. Remember nobody starts out at the top. Work hard and seek the promotion when it becomes available.

If an employer offers a 6-month contract don't dismiss the opportunity to show your worth. If you are good they are likely to employ you on a full-time basis when the contract ends.  The same goes for temporary roles, try and get your foot in the door and impress.

Don't forget the local computer support companies. These companies can provide you with invaluable experience and their hiring requirements are generally less than big corporations. You my even find that they are willing to sub-contract jobs to workers.

Non-profit organizations such as churches and charities need IT support too, and volunteering is another route to getting valuable experience. This will look great on your resume and hopefully you'll get glowing references too.

Craft a resume that doesn't sell yourself short, you want your resume to stand out from the crowd. Include all your relevant IT skills and emphasize industry buzzwords that employers are asking for on job adverts if you have those skills. Add any relevant experience with certain technologies should be added.

Remember, you may not have a wealth of experience that other job candidates have, but this is only one attribute employers look for. If you can demonstrate your professionalism, passion for technology as well as being able to communicate as well as relevant qualifications you will eventually succeed in breaking into IT.

Good luck in your job search and career in information technology.