Monday, October 22, 2012

CCNA Questions Part 8


Another set of Random Networking Questions for your learning pleasure.


1. What OSI layer does the following refer to?

"Establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications"


A.) Transport layer
B.) Session layer
C.) Datalink layer
D.) Application layer
E.) Presentation layer


2. In Cisco the running-config is found in the ...

A.) NVRAM
B.) DRAM
C.) FLASH
D.) ROM


3. Where would you place standard access lists?

A) As close to the destination as possible
B) As close to the source as possible


4. How would you copy the IOS to a TFTP server?

A.) Router(config)#copy ram tftp
B.) Router(config)#copy tftp flash
C.) Router#copy flash tftp
D.) Router#copy tftp flash
E.) None of the above

5. What happens if a packet does not match any of an Access Lists (ACL) statements?
 

A.) Nothing
B.) It is rejected
C.) It is allowed


Clickbank Products


1. Correct Answer D

In TCP/IP, the application layer contains all protocols and methods that fall into the realm of process-to-process communications across an Internet Protocol (IP) network. Application layer methods use the underlying transport layer protocols to establish host-to-host connections.

2. Correct Answer A

NVRAM

3. Correct Answer: A

Standard access lists only filter based on source address so they have to be placed as close to the destination as possible.


4. Correct Answer C

Router#copy flash tftp - Cisco IOS is stored in Flash memory on their devices.

5. Correct Answer B

It is rejected because all ACL's by default have an explicit "Deny All" statement at the end, that drops any packet that does not match the list.  This is usually bypassed by adding the "allow any any" statement at the end of the list.


How did you go?  Add a comment if you like - have a great day!

"The larger the island of knowledge, the longer the
shoreline of wonder."

Ralph W. Sockman

Monday, October 8, 2012

CCNA Questions Part 7


Another set of Random Networking Questions to Ponder, Have Fun


1. What will be the IP address of the second subnet given the following?

172.16.0.0
255.255.224.0
(Assume ip subnet-zero is enabled)

A) 172.16.0.0
B) 172.16.8.0
C) 172.16.16.0
D) 172.16.32.0
E) 172.16.64.0


2. What Cisco IOS enhanced editing command end the configuration mode and returns to EXEC?

A.) Ctrl+Z
B.) Ctrl+W
C.) Ctrl+F
D.) Esc+F
E.) Tab


3. What Transport layer protocol are we describing?

"A reliable connection-oriented protocol with flow control"
A.) UDP
B.) TCP


4. What is the IEEE standard describing VLANs called?

A.) IEEE VLAN
B.) 802.3
C.) 802.1q
D.) 802.11b
E.) 802.3q


5. Where is the best position to place an Extended ACL?

A.) As close to the destination as possible
B.) As close to the source as possible


6. What IOS command would you issue in privileged-mode to change the running-config? (Cisco)


A.) config t
B.) config mem
C.) config net
D.) config run





Clickbank Products


1. Correct Answer: D

172.16.32.0
Easy way to get the Block size 256-224 = 32, now count in blocks of 32
First subnet 172.16.0.0 to 172.16.31.255, Second subnet starts 172.16.32.0

2. Correct Answer A

Cisco Keyboard Shortcut Actions 

  • Up Arrow Displays your previous commands.  (command history)
  • TAB Key Completes a partially typed CLI commands.
  • CTRL+Z Takes you back to Privileged EXEC Mode.
  • CTRL+A Places the cursor at the beginning of a line.
  • CTRL+E Places the cursor at the end of a line.
  • CTRL+R Redisplays the current command line.
  • CTRL+W Erases a word (behind the cursor).
  • CTRL+U Erases an entire line.
3. Correct Answer B

Transmission Control Protocol (TCP) provides reliable, ordered delivery of a stream of octets from a program on one computer to another program on another computer.

4. Correct Answer: C

The IEEE 802.1Q standard specifies a standard method for inserting virtual LAN (VLAN) membership tags into Ethernet frames.


5. Correct Answer A

The general rule is to place standard ACLs as close to the destination as possible and to position extended ACLs as close as possible to the source of the traffic that will be denied. This is because extended ACLs can take in to account source and destination addresses as well as port numbers.


6. Correct Answer A

config t (configure terminal)

Extra one this week, Hope you had some success - have a great day.




Monday, October 1, 2012

3 Simple Mindset “Tricks” To Take Consistent Action |


An interesting article worth a look...


CCNA Questions Part 6


Part 6 of the Networking Questions to keep the old Grey matter ticking - enjoy.



1. If I were to give an IP address to VLAN1, then VLAN2, and VLAN3, which VLAN would be the management VLAN? (Cisco)

A.) VLAN0
B.) VLAN1
C.) VLAN2
D.) VLAN_A
E.) VLAN01


2. What layer of the OSI model is responsible for multiplexing upper-layer applications, establishing sessions and tearing down virtual circuits?

A.) Presentation
B.) Session
C.) Transport
D.) Network
E.) Data Link


3. Which of the following commands would correctly add a message of the day banner? (Cisco)

A.) Router(config)#banner #
B.) Router(config)#banner motd #
C.) Router#banner motd #
D.) Router#banner #


4. Triggered updates are used to speed the routing protocol convergence process?

A.) True
B.) False


5. What is the reserved address space for a Class B IPV4 network?

A.) 10.0.0.0 - 10.255.255.255
B.) 20.0.0.0 - 20.255.255.255
C.) 172.16.0.0 - 172.31.255.255
D.) 192.168.0.0 - 192.168.255.255
E.) 208.168.0.0 - 208.168.255.255





Clickbank Products


1. Correct Answer: B

VLAN1 is a management VLAN and by default all ports on a switch are members of VLAN1.  Cisco recommends that you use VLAN1 for administrative purposes only, also note you can't change the name of VLAN1.


2. Correct Answer: C

In computer networking, the transport layer or layer 4 provides end-to-end communication services for applications within a layered architecture of network components and protocols. The transport layer provides services such as connection-oriented data stream support, reliability, flow control, and multiplexing.

3. Correct Answer: B
 

A Basic Example of the Command sequence is as follows:

Router>enable
Router>Password:cisco
Router#configure terminal
Router(config)#hostname London
London(config)#banner motd #welcome#
London(config)#exit

4. Correct Answer A

A triggered update is sent immediately in response to a change in the network (e.g. A link going down). The router detecting the change immediately sends an update message to its adjacent routers, which then generate their own triggered updates. This process continues until the network converges. Triggered updates occurs independently from the regular routing updates and are intended to speed the convergence process.


5. Correct Answer C

172.16.0.0 - 172.31.255.255

How did you go? Leave a comment if you disagree or have any questions - have a great day.

 "Hard work often leads to success. 
No work seldom does."
  --Harvey Mackay


Monday, September 24, 2012

CCNA Questions Part 5


More Questions for those interested in all things network. Enjoy


1. Trunk links are used to communicate between...

A) Two switches
B) A switch and router
C) A switch and server
D) A switch and PC
E) A, B and C are correct


2. What are the 3 ways of assigning a switched port to VLANs?

A) Switch-centric, Port-centric, Dynamic VLANs
B) Port-centric, Static VLANs, Dynamic VLANs
C) Interface-based, Static VLANs, Dynamic VLANs


3. Which of the following could be a valid MAC address?

A) 00-08-74-CE-B7-90
B) 192.168.0.1
C) FFFF.FFFF.FFFF.FFFF
D) 255.255.255.240


4. What is the invalid timer set to by default when you have a router running the Interior Gateway Routing Protocol? (IGRP)

A.) 3 times the update period
B.) 270 seconds
C.) 3 times the update period + 10 seconds
D.) Answer A and B
E.) 7 times the update period


5. Which protocol is used to determine the IP address if the MAC address is already known?

A.) ARP
B.) RARP
C.) IP
D.) IPX
E.) TCP




Clickbank Products

1. Correct Answer: E

A trunk link is a point-to-point link between two switches, a switch and router or a switch and server which carries multiple VLAN traffic.


2. Correct Answer: B

3 ways of assigning a switched port to VLANs:

  • Port-Centric - All nodes connected to ports in the same VLAN are assigned to the same VLAN ID.
  • Static VLANs - Statically assign ports to a VLAN.
  • Dynamic VLANs - Ports that can automatically determine their VLAN assignments based on MAC addresses
3. Correct Answer: A

The standard format for printing MAC addresses is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:) e.g. 00-08-74-CE-B7-90, 00:08:74:CE:B7:90.
Another convention commonly used is three groups of four hexadecimal digits separated by dots e.g. 0573.4567.19ab.


4. Correct Answer: D

IGRP sends its routing table to its neighbors every 90 seconds. IGRP uses an invalid timer to mark a route as invalid after 270 seconds (three times the update timer). IGRP uses a flush timer to remove a route from the routing table (default flush timer is 630 seconds, seven times the update period).


5. Correct Answer B

Reverse Address Resolution Protocol (RARP) is a networking protocol used by a host computer to request its IP address from an administrative host, when it knows its MAC address.





If you don't like something, change it. 
If you can't change it, change your attitude. 
Don't complain. - Maya Angelou



Monday, September 17, 2012

CCNA questions part 4


Another set of Questions for those interested in networking - enjoy!


 
1. What is the correct sequence of Spanning Tree Port states?

A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled

2. In a directed broadcast all host bits set to 1 received by all hosts on local broadcast domain?

A) True
B) False


3. What type of IP address has the following structure?

network.node.node.node

A.) Class A
B.) Class B
C.) Class C


4. What is the default time BPDUs are sent and received by switches?

A) 2 seconds
B) 10 seconds
C) 30 seconds
D) 60 seconds

5. How would you view the current Configuration Register value?
(Cisco Router)

A.) show config-register
B.) show reg
C.) show config
D.) show version





Clickbank Products

1. Correct Answer: A

Explanation
STP switch port states:

  • Blocking
  • Listening
  • Learning
  • Forwarding
  • Disabled
2. Correct Answer: A

A directed broadcast address for each physical network has all ones in the host ID part of the address. The network ID and the subnet ID must be valid network and subnet values. A directed broadcast is sent to every host on that network or subnetwork.


3. Correct Answer A

Class A Address in IPV4


4. Correct Answer: A

2 seconds
Part of the Spanning tree Protocol (STP)- Bridges and Switches use special data frames called Bridge Protocol Data Units (BPDUs) to exchange information about bridge IDs and root path costs.   

5. Correct Answer: D
 
You can see the current value of the configuration register by using the show version command.
 

Ahh threw in a D in there to see if you where paying attention :-) 
- have a great day!

Thursday, September 13, 2012

Cisco Exam Revision Tips





Here are some revision tips to help you 
                           revise for the CCNA exam.

1.)  Make sure you only learn topics which are covered by the exam.

2.)  Glance through the course/exam topics and highlight the areas you think you'll need to concentrate on more.


3.)  Get a good CCNA book that suits your learning style.


4.)  Practice what you learn frequently by using practice tests and flash cards. Highlight your weakest subjects and aim to improve them.


5.)  Create a set of revision notes for each topic. Try to stick to one page of paper per topic.


6.)  Read through your revision notes frequently.


7.)  You want to retain the information beyond the exam, so forget about cramming the night before the exam. Spread out your revision into 30 minute revision periods.


8.)  Condense your revision notes. The act of rewriting them will help you memorize them.


9.)  Practice your IOS configuration on a Cisco router or router simulator.



From my experience it is best to read twice, answer once.  Good Luck in your endeavours.


Monday, September 10, 2012

Tips To Secure Your Wireless


Wireless network technology has become common place in our daily lives, and we are beginning to find wireless networks available almost everywhere we go.  We can find free wireless networks available at our local coffee shops, fast food restaurants, office supply stores and even while you wait to get your car’s oil changed.   Take into account that WiFi is built into many of our consumer gadgets, we can consume digital information virtually everywhere we go.  With that said, we also need to take precautions in accessing and using these available wireless networks.  Here are a few tips to use wireless network technology safely and security at home and in public places.

Home Wireless tips

  • Secure your wireless network by changing the administrator’s default password on your wireless router.  There are far too many instances where the cable installer or phone technician installs the ISP’s wireless router and the administrator password is never changed.
  • Enable WPA2-Personal with AES encryption.  You should create a pre-shared key (passphrase) with a minimum length of 15 characters.  Length does matter; it is harder to hack a long simple passphrase than a short complex one.
  • Do not name your SSID to easily identify who owns the network (e.g. Jones Family).
  • Hiding your Service Set Identifier (SSID) IS NOT a security measure.  Hidden SSIDs (the wireless network name) are easily identified by freeware applications downloaded from the internet.  Software such as, Kismet or NetStumbler are available for all the major OSes and can quickly identify the SSIDs for nearby wireless networks.  In some instances, hidden SSIDs can actually cause connection problems.


Public Wireless Use Tips:

Whenever you use a public WiFi hotspot, there are two questions you should always ask yourself.
1. “Am I comfortable with someone looking over my shoulder at the information I accessed?” 
2. “Am I comfortable with someone seeing how I accessed that information (by entering my user name and password)?”

When using public WiFi hotspots, you never know if someone sitting near you or across the street has compromised that wireless network, and have the ability to read/capture the data traffic.  You are assuming the provider has implemented and properly configured security protocols to ensure your data privacy.  Maybe they have, and maybe they have not.  That’s why you always need to ask yourself those two questions when using a public WiFi network.

Here are a few tips when accessing and using a public WiFi.

  • I think we all know, DO NOT perform online banking or other financial transactions on a public WiFi hotspot.
  • Have up to date system patches, anti-malware and personal firewall software installed (where applicable).
  • Don’t use the public WiFi hotspot.  If available, use your smart phone‘s hotspot capability or portable hotspot device to provide internet access for your devices.  With the portable hotspot, you control the access security of devices using your wireless network (assuming you actually configure the security features) and have the security of using your mobile carrier’s data network.
  • Invest in a personal VPN service.  There are plenty free and paid VPN services available in the consumer market.

PRIVATE WiFi is a personal VPN that protects the identity and sensitive information of anyone on a public WiFi network by encrypting everything you send and receive with bank-level security.
 

PRIVATE WiFi is the safest way to do everything online. And you can try it for free for 3 days by clicking the link below.



What is a Computer Hacker?

These days, a hacker doesn't have to be a geek from a top university who breaks into high profile banks and government systems.

A hacker can be anyone, even the kid next door. Anyone can download a simple software off the Internet to see everything that goes into, and out of, a computer on a the same network. And people who do this don't always have the best of intentions. So just imagine how exposed you are when you use WiFi in a public hotspot. Everybody in that very same hotspot are all on the same computer network.

Firewalls and anti-virus can't stop this new type of hacking, called sniffing, but PRIVATE WiFi can. Learn more about how to protect yourself against hackers.Private wifi description

Sunday, September 9, 2012

CCNA Questions Part 3



Here are some more networking questions and answers to get the brain matter ticking.\




1. What do asymmetric switches require?

A) memory buffers
B) extra ports
C) statically assigned ports only
D) high speed CAM


2. What does Ethernet 0 is down, protocol is down indicate?

A) Keepalive or framing issue
B) Carrier detect is not present
C) The interface is shutdown


3. Fragment Free switching method is best described by which of the following?

A.) The entire frame is received before forwarding is commenced
B.) Forwards frame after receiving the destination MAC address
C.) Filters out collision packets by waiting for the first 64 bytes of data


4. What is the default synchronous serial encapsulation on Cisco routers?

A.) Frame Relay
B.) X.25
C.) ISDN
D.) PPP
E.) HDLC


5. A CIDR value of /12 equates to what subnet mask?

A) 255.0.0.0
B) 255.128.0.0
C) 255.192.0.0
D) 255.224.0.0
E) 255.240.0.0




Clickbank Products

1. Correct Answer: A

Explanation
With ability for support of high bandwidth ports Asymmetric Switches require more Buffer memory for storing & forwarding of packets for fast processing.


2. Correct Answer: B

The various states of an interface:

  • Ethernet0 is up, line protocol is up - The interface is functioning correctly.
  • Ethernet0 is down, line protocol is down - This message usually represents a physical interface problem. The cable may be disconnected. This can also occur if this interface is connected to another router whose interface has been shutdown.
  • Ethernet0 is up, line protocol is down - The Physical layer connectivity is not the issue. The line protocol being down is either a clocking issue (keepalives) or a mismatch of the frame types being used on connected devices.
  • Ethernet0 is administratively down, line protocol is down - The interface has been manually shutdown using the shutdown command.
 3. Correct Answer: C

 Filters out collision packets by waiting for the first 64 bytes of data

 4. Correct Answer: E 

HDLC

5. Correct Answer: E

255.240.0.0

Binary 11111111.11110000.0000000.0000000 = 12 bits set to 1
Binary octet =  128, 64, 32. 16, 8, 4, 2, 1 so 128+64+32+16 = 240

How did you go? let me know  - have a great day.

Friday, August 17, 2012

CCNA questions Part 2

More Networking Questions and Answers for you, typical of Cisco, they are more like English questions, remember to read twice, answer once  - happy learning.
 1. Which switching mode has the highest degree of error checking?

A) Fragment-Free
B) Fast-Forward
C) Cut-Through
D) Store-and-Forward
E) FIFO

2. What Application layer protocol is a method of transferring files, especially useful if you need to list available files?

A) Telnet
B) FTP
C) TFTP
D) NFS
E) SMTP

3. What TCP/IP layer are TCP and UDP protocols associated with?

A) Application
B) Host-to-Host
C) Internet
D) Network Access

4. The Cisco Spanning Tree protocol is compatible with IEEE 802.1d?

A) True
B) False


5. What is the default administrative distance of a static route?

A) 1
B) 90
C) 100
D) 110
E) 120




1. Correct Answer: D

Store and forward switching method is known as store and forward because the switch will store the incoming data frame in its internal buffer, then when the complete frame has been received the switch will then run a Cyclic Redundancy Check (CRC) against the frame. If the CRC passes, the switch will then look up the destination MAC Address in its MAC filter table to forward it on to its destination.

2. Correct Answer: A

3. Correct Answer: B

TCP and UDP protocols are associated with the Transport layer of the TCP/IP model, which is sometimes referred to as the "host-to-host transport layer".

4. Correct Answer: B

The original Spanning-Tree protocol was created by Digital Equipment Corporation (DEC) which is now part of Compaq. The IEEE created its own version called IEEE 802.1d which is not compatible with the original version.

Cisco enhanced the original 802.1d specification with features such as Uplink Fast, Backbone Fast, and Port Fast to speed up the convergence time of a bridged network. However these new features are proprietary, and can only be configured on Cisco switches.

5. Correct Answer: A