An interesting article worth a look...
Monday, October 1, 2012
CCNA Questions Part 6
Part 6 of the Networking Questions to keep the old Grey matter ticking - enjoy.
1. If I were to give an IP address to VLAN1, then VLAN2, and VLAN3, which VLAN would be the management VLAN? (Cisco)
A.) VLAN0
B.) VLAN1
C.) VLAN2
D.) VLAN_A
E.) VLAN01
2. What layer of the OSI model is responsible for multiplexing upper-layer applications, establishing sessions and tearing down virtual circuits?
A.) Presentation
B.) Session
C.) Transport
D.) Network
E.) Data Link
3. Which of the following commands would correctly add a message of the day banner? (Cisco)
A.) Router(config)#banner #
B.) Router(config)#banner motd #
C.) Router#banner motd #
D.) Router#banner #
4. Triggered updates are used to speed the routing protocol convergence process?
A.) True
B.) False
5. What is the reserved address space for a Class B IPV4 network?
A.) 10.0.0.0 - 10.255.255.255
B.) 20.0.0.0 - 20.255.255.255
C.) 172.16.0.0 - 172.31.255.255
D.) 192.168.0.0 - 192.168.255.255
E.) 208.168.0.0 - 208.168.255.255
Clickbank Products
1. Correct Answer: B
VLAN1 is a management VLAN and by default all ports on a switch are members of VLAN1. Cisco recommends that you use VLAN1 for administrative purposes only, also note you can't change the name of VLAN1.
2. Correct Answer: C
In computer networking, the transport layer or layer 4 provides end-to-end communication services for applications within a layered architecture of network components and protocols. The transport layer provides services such as connection-oriented data stream support, reliability, flow control, and multiplexing.
3. Correct Answer: B
A Basic Example of the Command sequence is as follows:
Router>enable
Router>Password:cisco
Router#configure terminal
Router(config)#hostname London
London(config)#banner motd #welcome#
London(config)#exit
4. Correct Answer A
A triggered update is sent immediately in response to a change in the network (e.g. A link going down). The router detecting the change immediately sends an update message to its adjacent routers, which then generate their own triggered updates. This process continues until the network converges. Triggered updates occurs independently from the regular routing updates and are intended to speed the convergence process.
5. Correct Answer C
172.16.0.0 - 172.31.255.255
How did you go? Leave a comment if you disagree or have any questions - have a great day.
"Hard work often leads to success.
No work seldom does."
--Harvey Mackay
--Harvey Mackay
Monday, September 24, 2012
CCNA Questions Part 5
More Questions for those interested in all things network. Enjoy
1. Trunk links are used to communicate between...
A) Two switches
B) A switch and router
C) A switch and server
D) A switch and PC
E) A, B and C are correct
2. What are the 3 ways of assigning a switched port to VLANs?
A) Switch-centric, Port-centric, Dynamic VLANs
B) Port-centric, Static VLANs, Dynamic VLANs
C) Interface-based, Static VLANs, Dynamic VLANs
3. Which of the following could be a valid MAC address?
A) 00-08-74-CE-B7-90
B) 192.168.0.1
C) FFFF.FFFF.FFFF.FFFF
D) 255.255.255.240
4. What is the invalid timer set to by default when you have a router running the Interior Gateway Routing Protocol? (IGRP)
A.) 3 times the update period
B.) 270 seconds
C.) 3 times the update period + 10 seconds
D.) Answer A and B
E.) 7 times the update period
5. Which protocol is used to determine the IP address if the MAC address is already known?
A.) ARP
B.) RARP
C.) IP
D.) IPX
E.) TCP
Clickbank Products
1. Correct Answer: E
A trunk link is a point-to-point link between two switches, a switch and router or a switch and server which carries multiple VLAN traffic.
2. Correct Answer: B
3 ways of assigning a switched port to VLANs:
- Port-Centric - All nodes connected to ports in the same VLAN are assigned to the same VLAN ID.
- Static VLANs - Statically assign ports to a VLAN.
- Dynamic VLANs - Ports that can automatically determine their VLAN assignments based on MAC addresses
The standard format for printing MAC addresses is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:) e.g. 00-08-74-CE-B7-90, 00:08:74:CE:B7:90.
Another convention commonly used is three groups of four hexadecimal digits separated by dots e.g. 0573.4567.19ab.
4. Correct Answer: D
IGRP sends its routing table to its neighbors every 90 seconds. IGRP uses an invalid timer to mark a route as invalid after 270 seconds (three times the update timer). IGRP uses a flush timer to remove a route from the routing table (default flush timer is 630 seconds, seven times the update period).
5. Correct Answer B
Reverse Address Resolution Protocol (RARP) is a networking protocol used by a host computer to request its IP address from an administrative host, when it knows its MAC address.
If you don't like something, change it.
If you can't change it, change your attitude.
Don't complain. - Maya Angelou
Monday, September 17, 2012
CCNA questions part 4
Another set of Questions for those interested in networking - enjoy!
1. What is the correct sequence of Spanning Tree Port states?
A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled
2. In a directed broadcast all host bits set to 1 received by all hosts on local broadcast domain?
A) True
B) False
3. What type of IP address has the following structure?
network.node.node.node
A.) Class A
B.) Class B
C.) Class C
4. What is the default time BPDUs are sent and received by switches?
A) 2 seconds
B) 10 seconds
C) 30 seconds
D) 60 seconds
5. How would you view the current Configuration Register value? (Cisco Router)
A.) show config-register
B.) show reg
C.) show config
D.) show version
Clickbank Products
1. Correct Answer: A
Explanation
STP switch port states:
- Blocking
- Listening
- Learning
- Forwarding
- Disabled
A directed broadcast address for each physical network has all ones in the host ID part of the address. The network ID and the subnet ID must be valid network and subnet values. A directed broadcast is sent to every host on that network or subnetwork.
3. Correct Answer A
Class A Address in IPV4
4. Correct Answer: A
2 seconds
Part of the Spanning tree Protocol (STP)- Bridges and Switches use special data frames called Bridge Protocol Data Units (BPDUs) to exchange information about bridge IDs and root path costs.
5. Correct Answer: D
You can see the current value of the configuration register by using the show version command.
Ahh threw in a D in there to see if you where paying attention :-)
- have a great day!
- have a great day!
Thursday, September 13, 2012
Cisco Exam Revision Tips
Here are some revision tips to help you
revise for the CCNA exam.1.) Make sure you only learn topics which are covered by the exam.
2.) Glance through the course/exam topics and highlight the areas you think you'll need to concentrate on more.
3.) Get a good CCNA book that suits your learning style.
4.) Practice what you learn frequently by using practice tests and flash cards. Highlight your weakest subjects and aim to improve them.
5.) Create a set of revision notes for each topic. Try to stick to one page of paper per topic.
6.) Read through your revision notes frequently.
7.) You want to retain the information beyond the exam, so forget about cramming the night before the exam. Spread out your revision into 30 minute revision periods.
8.) Condense your revision notes. The act of rewriting them will help you memorize them.
9.) Practice your IOS configuration on a Cisco router or router simulator.
From my experience it is best to read twice, answer once. Good Luck in your endeavours.
Monday, September 10, 2012
Tips To Secure Your Wireless
Wireless network technology has become common place in our daily lives, and we are beginning to find wireless networks available almost everywhere we go. We can find free wireless networks available at our local coffee shops, fast food restaurants, office supply stores and even while you wait to get your car’s oil changed. Take into account that WiFi is built into many of our consumer gadgets, we can consume digital information virtually everywhere we go. With that said, we also need to take precautions in accessing and using these available wireless networks. Here are a few tips to use wireless network technology safely and security at home and in public places.
Home Wireless tips
- Secure your wireless network by changing the administrator’s default password on your wireless router. There are far too many instances where the cable installer or phone technician installs the ISP’s wireless router and the administrator password is never changed.
- Enable WPA2-Personal with AES encryption. You should create a pre-shared key (passphrase) with a minimum length of 15 characters. Length does matter; it is harder to hack a long simple passphrase than a short complex one.
- Do not name your SSID to easily identify who owns the network (e.g. Jones Family).
- Hiding your Service Set Identifier (SSID) IS NOT a security measure. Hidden SSIDs (the wireless network name) are easily identified by freeware applications downloaded from the internet. Software such as, Kismet or NetStumbler are available for all the major OSes and can quickly identify the SSIDs for nearby wireless networks. In some instances, hidden SSIDs can actually cause connection problems.
Public Wireless Use Tips:
Whenever you use a public WiFi hotspot, there are two questions you should always ask yourself.
1. “Am I comfortable with someone looking over my shoulder at the information I accessed?”
2. “Am I comfortable with someone seeing how I accessed that information (by entering my user name and password)?”
When using public WiFi hotspots, you never know if someone sitting near you or across the street has compromised that wireless network, and have the ability to read/capture the data traffic. You are assuming the provider has implemented and properly configured security protocols to ensure your data privacy. Maybe they have, and maybe they have not. That’s why you always need to ask yourself those two questions when using a public WiFi network.
Here are a few tips when accessing and using a public WiFi.
- I think we all know, DO NOT perform online banking or other financial transactions on a public WiFi hotspot.
- Have up to date system patches, anti-malware and personal firewall software installed (where applicable).
- Don’t use the public WiFi hotspot. If available, use your smart phone‘s hotspot capability or portable hotspot device to provide internet access for your devices. With the portable hotspot, you control the access security of devices using your wireless network (assuming you actually configure the security features) and have the security of using your mobile carrier’s data network.
- Invest in a personal VPN service. There are plenty free and paid VPN services available in the consumer market.
PRIVATE WiFi is a personal VPN that protects the identity and sensitive information of anyone on a public WiFi network by encrypting everything you send and receive with bank-level security.
PRIVATE WiFi is the safest way to do everything online. And you can try it for free for 3 days by clicking the link below.
What is a Computer Hacker?
| ||||
Sunday, September 9, 2012
CCNA Questions Part 3
Here are some more networking questions and answers to get the brain matter ticking.\
1. What do asymmetric switches require?
A) memory buffers
B) extra ports
C) statically assigned ports only
D) high speed CAM
2. What does Ethernet 0 is down, protocol is down indicate?
A) Keepalive or framing issue
B) Carrier detect is not present
C) The interface is shutdown
3. Fragment Free switching method is best described by which of the following?
A.) The entire frame is received before forwarding is commenced
B.) Forwards frame after receiving the destination MAC address
C.) Filters out collision packets by waiting for the first 64 bytes of data
4. What is the default synchronous serial encapsulation on Cisco routers?
A.) Frame Relay
B.) X.25
C.) ISDN
D.) PPP
E.) HDLC
5. A CIDR value of /12 equates to what subnet mask?
A) 255.0.0.0
B) 255.128.0.0
C) 255.192.0.0
D) 255.224.0.0
E) 255.240.0.0
Clickbank Products
1. Correct Answer: A
Explanation
With ability for support of high bandwidth ports Asymmetric Switches require more Buffer memory for storing & forwarding of packets for fast processing.
2. Correct Answer: B
The various states of an interface:
- Ethernet0 is up, line protocol is up - The interface is functioning correctly.
- Ethernet0 is down, line protocol is down - This message usually represents a physical interface problem. The cable may be disconnected. This can also occur if this interface is connected to another router whose interface has been shutdown.
- Ethernet0 is up, line protocol is down - The Physical layer connectivity is not the issue. The line protocol being down is either a clocking issue (keepalives) or a mismatch of the frame types being used on connected devices.
- Ethernet0 is administratively down, line protocol is down - The interface has been manually shutdown using the shutdown command.
Filters out collision packets by waiting for the first 64 bytes of data
4. Correct Answer: E
HDLC
5. Correct Answer: E
255.240.0.0
Binary 11111111.11110000.0000000.0000000 = 12 bits set to 1
Binary octet = 128, 64, 32. 16, 8, 4, 2, 1 so 128+64+32+16 = 240
How did you go? let me know - have a great day.
Friday, August 17, 2012
CCNA questions Part 2
More Networking Questions and Answers for you, typical of Cisco, they are more like English questions, remember to read twice, answer once - happy learning.
1. Which switching mode has the highest degree of error checking?
A) Fragment-Free
B) Fast-Forward
C) Cut-Through
D) Store-and-Forward
E) FIFO
2. What Application layer protocol is a method of transferring files, especially useful if you need to list available files?
A) Telnet
B) FTP
C) TFTP
D) NFS
E) SMTP
3. What TCP/IP layer are TCP and UDP protocols associated with?
A) Application
B) Host-to-Host
C) Internet
D) Network Access
4. The Cisco Spanning Tree protocol is compatible with IEEE 802.1d?
A) True
B) False
5. What is the default administrative distance of a static route?
A) 1
B) 90
C) 100
D) 110
E) 120
A) 1
B) 90
C) 100
D) 110
E) 120
1. Correct Answer: D
Store and forward switching method is known as store and forward because the switch will store the incoming data frame in its internal buffer, then when the complete frame has been received the switch will then run a Cyclic Redundancy Check (CRC) against the frame. If the CRC passes, the switch will then look up the destination MAC Address in its MAC filter table to forward it on to its destination.
2. Correct Answer: A
3. Correct Answer: B
TCP and UDP protocols are associated with the Transport layer of the TCP/IP model, which is sometimes referred to as the "host-to-host transport layer".
TCP and UDP protocols are associated with the Transport layer of the TCP/IP model, which is sometimes referred to as the "host-to-host transport layer".
4. Correct Answer: B
The original Spanning-Tree protocol was created by Digital Equipment Corporation (DEC) which is now part of Compaq. The IEEE created its own version called IEEE 802.1d which is not compatible with the original version.
Cisco enhanced the original 802.1d specification with features such as Uplink Fast, Backbone Fast, and Port Fast to speed up the convergence time of a bridged network. However these new features are proprietary, and can only be configured on Cisco switches.
The original Spanning-Tree protocol was created by Digital Equipment Corporation (DEC) which is now part of Compaq. The IEEE created its own version called IEEE 802.1d which is not compatible with the original version.
Cisco enhanced the original 802.1d specification with features such as Uplink Fast, Backbone Fast, and Port Fast to speed up the convergence time of a bridged network. However these new features are proprietary, and can only be configured on Cisco switches.
Friday, July 13, 2012
Mircosoft store clearance
We are excited to announce MIcrosoft Store has just launched a big PC clearance! Please post this offer and let your customer's take advantage of these deeply discounted PC's. Offers vaild while supplies last so check it out asap! Microsoft Store PC Clearance! Live 7.09.12 for a limited time, while supplies last!
Sunday, July 8, 2012
What is phishing?
What is phishing?
Phishing (pronounced "fishing") is a type
of online identity theft. It uses email and fraudulent websites that are
designed to steal your personal data or information such as credit card
numbers, passwords, account data, or other information.
Con artists might send millions of fraudulent email
messages with links to fraudulent websites that appear to come from websites
you trust, such as your bank or credit card companies, and set up a scenario
that would require you to provide personal information. Criminals can use this
information for many different types of fraud, such as to steal money from your
account, open new accounts in your name, or to obtain official documents using
your identity.
FAQs about phishing
Phishing - General
- What should I do if I receive an email phishing scam? If you think you've received a phishing scam, delete the email message. Do not click any links within the message.
- What should I do if I think I've responded to a phishing scam? Take these steps to minimize any damage if you suspect that you've responded to a phishing scam with personal or financial information or entered this information into a fake website.
- Change the passwords or PINs on all your online accounts that you think could be compromised.
- Place a fraud alert on your credit reports. Check with your bank or financial advisor if you're not sure how to do this.
- Contact the bank or the online merchant directly. Do not follow the link in the fraudulent email.
- If you know of any accounts that were accessed or opened fraudulently, close those accounts.
- Routinely review your bank and credit card statements monthly for unexplained charges or inquiries that you didn't initiate.
- How do scammers get my email address or know which bank I use? Criminals who send out phishing scams (often called "phishers") send out millions of messages to randomly generated email addresses. They fake or "spoof" popular companies in order to attempt to dupe as many people as possible.
Recognize
Phishing Scams
- Can an email message that contains a company's official logo be a phishing scam? Yes. Phishing scams often use the official logos of the companies they're trying to spoof. If you think an email message is a phishing scam, delete it, or type the web addresses directly into your browser, or use your personal bookmarks.
- Can I tell if an email message is a phishing scam just by reading it? Not necessarily. Phishing email messages often include official-looking logos from real organizations and other identifying information taken directly from legitimate websites. They might also contain phrases like:
- "Verify your account."
- "Update your account."
- "During regular account maintenance…"
- "Failure to update your records will result in account suspension."
- I received an email message that requests banking information. Is that a phishing scam? Any email message that requests banking information is probably a phishing scam. Most legitimate banks and financial institutions do not request this information by email. If you receive a message to an email address that is not the one you use to log in to your bank account, this is probably a phishing scam.
- I received an email message telling me I'd won the Microsoft Lottery. Is this a phishing scam? Yes, this is a type of phishing scam known as "advance fee fraud."
Prevent ID theft
from phishing scams
- What can I do to help prevent identity theft from phishing scams? You can do the following to help protect yourself from phishing
scams:
- Don't click links in email messages.
- Type addresses directly into your browser or use your personal bookmarks.
- Check the site's security certificate before you enter personal or financial information into a website.
- Don't enter personal or financial information into pop-up windows.
- Keep your computer anti-malware software current with the latest security updates.
- How can Internet Explorer help protect me from phishing scams? Internet Explorer includes the SmartScreen Filter, which can help protect you from web fraud and personal data theft.
- What is the SmartScreen Filter? The Microsoft SmartScreen Filter is a feature of Internet Explorer 7 and Internet Explorer 8. It's designed to help protect you from fraudulent websites that try to steal your personal information.While you surf the Internet, SmartScreen Filter analyzes pages and determines if they have any characteristics that might be suspicious. If it finds suspicious web pages, it shows a yellow warning and advises you to proceed with caution. If the site matches an updated list of reported phishing sites, SmartScreen Filter notifies you with a red flag that it has blocked the site for your safety.
- What does it mean when a website is flagged yellow and "suspicious"? A suspicious website has some of the typical characteristics of phishing websites, but it is not on the list of reported phishing websites. The website might be legitimate, but you should be cautious about entering any personal or financial information unless you are certain that the site is trustworthy.
- What does it mean when a website is blocked and flagged in red as a reported phishing website? A reported phishing website has been confirmed by reputable sources as fraudulent and has been reported to Microsoft. We recommend that you do not give any information to such websites.
How to recognize phishing email messages or links
Phishing email messages are designed to steal your
identity. They ask for personal data, or direct you to websites or phone
numbers to call where they ask you to provide personal information. A few clues
can help you spot fraudulent email messages or links within them.
What does a
phishing email message look like?
Phishing email messages take a number of forms:
- They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site.
- They might appear to be from someone listed in your email address book.
- They might ask you to make a phone call. Phone phishing scams direct you to call a phone number where a person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data.
- They might include official-looking logos and other identifying information taken directly from legitimate websites, and they might include convincing details about your personal history that scammers discover from your social networking pages.
- They might include links to spoofed websites where you are asked to enter personal information.
- They might contain alarmist messages and threats of account closures.
- They might promise monetary reward for little or no effort.
- They might feature deals that sound too good to be true.
- They might solicite donations for charitable organizations after a disaster has been in the news – appealing to your good nature or willingness to help less fortunate individuals.
To make these phishing email messages look even
more legitimate, the scam artists use graphics that appear to go to the
legitimate websites (Windows Live Hotmail and Woodgrove Bank, respectively),
but actually take you to a phony scam site or possibly a pop-up window that looks
exactly like the official site.
Here are a few phrases that are commonly used in
phishing email scams:
- "Verify your account." Businesses should not ask you to send passwords, logon information or user names, Social Security numbers, or other personal information through email. If you receive an email message from Microsoft or any other business asking you to update your credit card information, do not respond: This is a phishing scam.
- "You have won the lottery." The lottery scam is a common phishing scam known as advanced fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. The lottery scam often includes references to big companies, such as Microsoft. There is no Microsoft Lottery.
- "If you don't respond within 48 hours, your account will be closed." These messages convey a sense of urgency so that you'll respond immediately without thinking. A phishing email message might even claim that your response is required because your account might have been compromised.
What does a
phishing link look like?
Sometimes phishing email messages direct you to
spoofed websites.
HTML-formatted messages can contain links or forms
that you can fill out just as you would fill out a form on a legitimate
website.
Phishing links that you are urged to click in email
messages, on websites, or even in instant messages, may contain all or part of
a real company's name and are usually masked, meaning that the link you see
does not take you to that address but somewhere different, usually an
illegitimate website.
Notice in the following example that resting (but
not clicking) your mouse pointer on the link reveals the real web address, as
shown in the box with the yellow background. The string of cryptic numbers
looks nothing like the company's web address. This is a suspicious sign.
Cybercriminals also use web addresses that resemble
the names of well-known companies but are slightly altered by adding, omitting,
or transposing letters. For example, the address "www.microsoft.com"
could appear instead as:
- www.micosoft.com
- www.mircosoft.com
- www.verify-microsoft.com
This is called "typo-squatting" or
"cybersquatting."
Sign of a scam: bad grammar and misspelled words
We received a message from a reader who asked
whether or not this email was a scam:
"Microsoft Corporation wish to notify all
online customers as we celebrates the 35th year anniversary 2010; and also to
inform you that you have emerged one of the beneficiary
Selected in this ongoing 35th Anniversary Program
in conjunction with the Foundation of Software Products (F.P.S.) The Microsoft
internet E-mail draw is held periodically and is organized to encourage the
users of the Internet and promote computer literacy worldwide."
This email message continues with a request for
personal and financial information. This is a scam. Email messages from
Microsoft or other familiar and trustworthy organizations that are full of bad
grammar and misspellings are fraudulent. If you receive one of these
unsolicited e-mail messages, delete it.
The secret of life is not to do what you like but to like what you do.
By: Anonymous
By: Anonymous
Subscribe to:
Posts (Atom)