Monday, March 16, 2015

Random Cisco based networking questions - CCNA - Part 3



Welcome to part 3 of the random networking questions (Cisco based) series.

Ready to get the brain tickin? Lets go!






1. What Cisco IOS enhanced editing command end the configuration mode and returns to EXEC?

A) Ctrl+Z
B) Ctrl+W
C) Ctrl+F
D) Esc+F
E) Tab

2, Which devices operate at the Data Link layer?

A) Switch
B) Bridge
C) Repeater
D) Router
E) Both A and B

3. Triggered updates are used to speed the convergence process?

A) True
B) False

4. Which switching mode is the most likely to forward frames containing errors?

A) FIFO
B) Modified Cut-Through
C) Store-and-Forward
D) Cut-Through
E) Fragment-Free

5. What is the function of asymmetric switching?

A) To prioritise bandwidth to nodes that need it
B) To prevent bottlenecks on the port a server is connected to
C) To allow RAS clients to connect to the network

6. PPP can be used over what types of serial connections?

A) Synchronous
B) Asynchronous
C) Both
D) Neither





amaysim - One pure SIM





1. Answer A

Keyboard Shortcut Actions (I've published this before but thought it worthy to remind :-)

Up Arrow Displays your previous commands.  (command history)
TAB Key Completes a partially typed CLI commands.
CTRL+Z Takes you back to Privileged EXEC Mode.

CTRL+A Places the cursor at the beginning of a line.
CTRL+E Places the cursor at the end of a line.
CTRL+R Redisplays the current command line.
CTRL+W Erases a word (behind the cursor).
CTRL+U Erases an entire line.


2. Answer E

Bridges and switches filter network traffic based on the MAC address (hardware address) and are Data Link layer devices.

A Repeater does not apply any filtering and is therefore a Physical Layer device.

Routers forward packets based on logical network addresses are are Network Layer devices.

3. Answer A

A triggered update is sent immediately in response to a change in the network (e.g. A link going down). The router detecting the change immediately sends an update message to its adjacent routers, which then generate their own triggered updates. This process continues until the network converges. Triggered updates occurs independently from the regular routing updates and are intended to speed the convergence process.

4. Answer D

Cut-Through switching is also referred to as Fast Forward.

When in cut-through mode the switch waits for the destination MAC Address to be received. Once the MAC Address is known the switch refers to its MAC filter table to determine which port the frame should be forwarded out. The switch forwards the frame even before the entire frame has arrived.

Frames with and without errors are forwarded in cut-through switching, leaving the error detection of the frame to the intended recipient.

5. Answer B

An asymmetric switch provides switched connections between ports of different bandwidths.
Asymmetric switching is optimized for client-server traffic where multiple clients simultaneously communicate with a server, requiring more bandwidth dedicated to the server port to prevent a bottleneck at that port.

6. Answer C

Point-to-Point Protocol (PPP) can be used over ISDN (synchronous) and dial-up (asynchronous) connections.


All over the place that time - stay tuned for the next batch - coming soon:-)

  “Employ your time in improving yourself by other men's writings, so that you shall gain easily what others have labored hard for.”
 Socrates 


Monday, March 9, 2015

Random Cisco based networking questions - CCNA - Part 2

Part 2 in the series of random networking questions for 2015, to keep you current or stimulate thought..


 1. Where would you place more specific tests in your access list?

A) At the top
B) At the bottom
C) Placement doesn't matter


2. Routers are what by default?

A) DTE devices
B) DCE devices

3. Which WAN protocol is capable of carrying video, Circuit Switched Data And Telephone Services using normal phone network?

A) Frame Relay
B) ISDN
C) PPP
D) ISL

4. What protocol range would you use for IP in ACLs?

A) 1-99
B) 800-899
C) 200-299
D) 1000-1099

5. What IP address will test the internal loopback of a node?

A) 127.0.0.1
B) 255.255.255.255
C) 0.0.0.0
D) 126.0.0.1
E) 127.0.0.0

6. When each network segment uses a different subnet mask this is refered to as...

A) Classful routing
B) Classless routing






amaysim - One pure SIM






1. Answer A

Always organise your access lists so the more specific tests are at the top.

2. Answer A

A router is configured as a DTE by default. If a clock rate speed is not specified, the router is configured as a DTE. If a clock rate speed is specified, the router is configured as a DCE.

DTE = Data Terminal Equipment
DCE = Data Communications Equipment

 3. Answer B

ISDN (Integrated Services Digital Network) is a set of standards for simultaneous digital communications (voice, video, data) over the traditional circuits of the public switched telephone network.

4. Answer A

Standard Cisco IOS Help output
Router#configure terminal
Router(config)#access-list ?
 <1-99>  IP standard access list
 <100-199> IP extended access list
 <1100-1199> Extended 48-bit MAC address access list
 <1300-1999> IP standard access list (expanded range)
 <200-299> Protocol type-code access list
 <2000-2699> IP extended access list (expanded range)
 <700-799> 48-bit MAC address access list
 rate-limit Simple rate-limit specific access list


5.  Answer A

127.0.0.1 is the loopback address in IP, it is a test mechanism for network adapters. Messages sent to 127.0.0.1 do not get delivered to the network. The NIC intercepts all loopback messages and returns them to the sending application.

6. Answer B

http://en.wikipedia.org/wiki/Classful_network


More coming, please leave comments if you find any errors or want to debate an answer :-)

"Whatever you are, be a good one."
Abraham Lincoln





Wednesday, March 4, 2015

Random Cisco based networking questions - CCNA - Part 1

The first half a dozen of random networking questions to get you thinking in 2015 :-)

Enjoy,,

1. Where would you place extended access lists?

A) As close to the destination as possible
B) As close to the source as possible


2. Bridges can only have one spanning tree instance, while switches can have many.

A) True
B) False


3. What would happen if you put the following ACL on an interface?

access-list 1 deny 172.168.0.1
access-list 1 deny 192.5.2.1


A) All traffic from 172.168.0.1 and 192.5.2.1 would be denied
B) All traffic would be denied
C) Nothing
D) These are not Cisco IOS ACL commands


4. Which layer of the OSI model is concerned with Media Access Control addresses?

A) Layer 1
B) Datalink layer
C) Application Layer
D) Session Layer
E) Transport Layer


5. What do the IOS commands below achieve?

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in


A) Create an extended ACL to only permit host 172.5.15.2 to connect to VTY
B) Create a standard ACL to only permit host 172.5.15.2 to connect to VTY
C) Create an extended ACL to only permit hosts on the network 172.5.15.2 to connect to VTY
D) Create a standard ACL to only permit hosts on the network 172.5.15.2 to connect to VTY

6. What is the Spanning Tree forward delay?

A) The time that is spent in the Listening and Learning states
B) 50 seconds
C) Time taken for a switch to go from Listening to Forwarding
D) Time taken for a switch to go from Blocking to Forwarding






amaysim - One pure SIM




1. Answer B 

Extended access lists are much more granular than standard ACLs, you can block specific ports or protocols.

To avoid unnecessary traffic on your network place them as close to the source as possible.


2. Answer A (true)

Bridges are software based and can only have one spanning-tree instance per bridge, while switches are hardware based and can have many.


3. Answer B

People forget the not shown the automatic deny any any on the tail end of any access list :-)

4. Answer B

Media Access Control is a sublayer of the Data Link Layer specified within the OSI model. It provides addressing and channel access control.  The hardware that implements the MAC is referred to as a Media Access Controller.

http://en.wikipedia.org/wiki/Media_Access_Control


5. Answer B

Router(config)#access-list 5 permit 172.5.15.2
Router(config)#line vty 0 4
Router(config-line)#access-class 5 in


This standard access list permits only the host 172.5.15.2 to connect to your VTY telnet line.


6. Answer A 

Forward delay — The time that is spent in the listening and learning state, 15 sec by default, but you can tune the time to be between 4 and 30 sec.



How did you do?? stay tuned more coming or check out the previous posts :-)


"If you want success, then don't rely on other people to do what YOU can do!" 
Sasha Azevedo


Tuesday, February 17, 2015

Data retention for eternity.

The next breed of solid state drives maybe ???



Researchers at a Zurich university have succeeded in storing and retrieving digital information in DNA segments, the molecules that encode genetic information, a breakthrough that could lengthen the lifespan of information storage by millions of years.

In a paper published by Angewandte Chemie, the team of researchers from Eidgenössische Technische Hochschule described how they managed to translate the 1291 Federal Charter of Switzerland and Archimedes' The Methods of Mechanical Theorums, a total of 83 kilobytes of information, into 4991 segments of DNA.

Researchers in the United States were able to encode a 5.27 megabyte book with images into DNA two years ago

Read more: http://www.itnews.com.au/News/400620,researchers-make-dna-data-storage-breakthrough.aspx#ixzz3S4edCjXP



My Dear Diary

A new round of Network Q&A will be coming soon - stay tuned....
Ian

Thursday, January 1, 2015

HAPPY NEW YEAR



HAVE A HAPPY NEW YEAR 

MAY YOU HAVE A HAPPY AND PROSPEROUS 2015

Ian B  - Life is An Adventure.

http://payhip.com/ianb1970

Saturday, December 20, 2014

SECURITY TIPS KEEPING FINANCIAL DATA UNDER LOCK AND KEYBOARD



As the holiday season is upon us, a timely reminder regarding internet security is in order, as the scammers will be on the increase over the Christmas period.




  •  Don’t provide your PIN or Internet banking login or password to anyone
  •  Delete spam and scam e-mail – DON’T open it
  •  Keep your anti-virus and firewall software up-to-date
  •  Always logon to Internet banking by typing in your bank’s full web address. Never give your confidential banking details to anyone
  •  Don’t ever use public computers for Internet banking, for example, Internet cafes, libraries or hotels
  •  Guard your identity information carefully and only provide to trusted people and entities – such as your date of birth, current address, driver’s license number and passport details
  •  Be cautious about unsolicited offers or opportunities offering you the chance of making easy money
  •  Be wary of offers from people or companies overseas as it makes it harder to check if they are bona-fide
  •  Take steps to verify any company which makes you a job offer, for example, address, phone number, e-mail address and website. Check if it is a registered company
  •  Always guard your personal information and be suspicious if someone asks for a host of personal details soon after contact
  •  Be wary of a person asking for financial assistance – be aware if you send money by wire transfer these funds cannot be recovered by banks
  •  Be cautious of someone asking for details of your financial status – do not provide the information


May you have a happy and safe Christmas season 

see you in the New Year - Ian B 

Wednesday, December 3, 2014

More neworking questions in the 2014 series - Final?

Time to stretch the grey matter with some more Cisco based networking questions...with some subnetting thrown in to add to the annoyance  :-)



1. If a switch receives a multicast frame, what does it do with it?

A) Forwards it out every port
B) Sends it back to the originator asking for a destination address
C) Drops the frame


2. What is the reserved address space for a Class B network?

A) 10.0.0.0 - 10.255.255.255
B) 20.0.0.0 - 20.255.255.255
C) 172.16.0.0 - 172.31.255.255
D) 192.168.0.0 - 192.168.255.255
E) 208.168.0.0 - 208.168.255.255


(Might need a pencil for the next 2 :-)

3. What valid host range is the IP address 172.25.78.33/27 part of?

4. Which subnet does host 172.26.147.25 255.255.255.224 belong to?

5. IGRP advertises routes to interior, system and exterior routes

A) True
B) False


6. If your switch uses shared memory buffering, what would happen if a packet could not be delivered because of a busy destination port?

A) It would delay transmission of all packets in memory
B) It would be sent to the destination port anyway
C) It would wait in a queue while all other packets in memory are transmitted
D) It would drop the packet after an allocated time


7. What is the default administrative distance of a static route?

A) 1
B) 90
C) 100
D) 110
E) 120


8. Trunk links are used to communicate between...

A) Two switches
B) A switch and router
C) A switch and server
D) A switch and PC
E) A, B and C are correct







Get eBook




1. Correct Answer A 

Internally multicast is treated as broadcast. So the Switch, will send it to all port except from which it recieve. Same way it will treat broadcast also.


2. Correct Answer C

http://en.wikipedia.org/wiki/Private_network#Private_IPv4_address_spaces


3. 172.25.78.33 through to 172.25.78.62

4. 172.26.147.0

5. Correct Answer A

IGRP advertises three types of routes:

Interior routes are routes between subnets in the network attached to a router interface.
System routes are routes to networks within an autonomous system.
Exterior routes are routes to networks outside the autonomous system.


6. Correct Answer C

The area of memory where the switch stores the data is called the memory buffer.

The memory buffer can use two methods for forwarding frames:

port-based memory buffering
shared memory buffering

In port-based memory buffering frames are stored in queues that are linked to specific incoming ports.

Shared memory buffering deposits all frames into a common memory buffer which all the ports on the switch share.


7. Correct Answer A

The default administrative distance for a static route is 1.


8. Correct Answer E

A trunk link is a point-to-point link between two switches, a switch and router or a switch and server which carries multiple VLAN traffic.





Not sure if there will be more questions before Christmas, however I plan new sets for 2015 so come back and we'll have some more lernin... :-)  

Have a good Christmas.

Wednesday, November 26, 2014

Networking Questions and Answers



Here's another set of Cisco based networking questions to mull over - enjoy!




1. How would you copy the IOS to a TFTP server?

A) Router(config)#copy ram tftp
B) Router(config)#copy tftp flash
C) Router#copy flash tftp
D) Router#copy tftp flash
E) None of the above 


2. What determines network addresses when data link addresses are known?

A) Ping
B) ICMP
C) ARP
D) RARP


3. What process is used to check whether packets have been received when using IP?

A) Acknowledgments
B) CRC
C) Windowing
D) Flow control
E) None


4. What is the maximum number of subnets given the following?

192.168.10.0
255.255.255.192
(Assume ip subnet-zero is enabled)

A) 4
B) 8
C) 16
D) 32
E) 64


5. Ip subnet-zero is enabled on all your routers.
How many bits must you borrow to create 16 subnets?


A) 1
B) 2
C) 3
D) 4
E) 5


6. What is the maximum size of an Ethernet packet when the frames have ISL tagging?(Include the size of headers and CRC)

A) 64 bytes
B) 1500 bytes
C) 1518 bytes
D) 1522 bytes
E) 1548 bytes


7. Which of the following are Routed protocols?

A) IP, IPX, ICMP
B) IP, IPX, Appletalk
C) RIP, IGRP, EIGRP
D) Both A and B are correct


8. What is the encapsulation type of Transport Layer?

A) Segments
B) Packets
C) Frames
D) Bits


9. What does Router(config)# no access-list 1 command achieve?

A) Removes Access List 1
B) Disables ACL on interface 1
C) Nothing, this is not a Cisco command


10. What is the numerical value of the Bridge Priority held by Catalyst switches?

A) 32500
B) 32768
C) 100
D) 1024
E) 32700







Get eBook Here



1. Correct Answer C

It is a good practice to backup your existing system image to the TFTP server using the copy flash tftp command.


2. Correct Answer D

Reverse Address Resolution Protocol (RARP) is used by a host computer to request its IPv4 address from an administrative host, it provides the administratiev host with its hardware address (MAC address).

http://en.wikipedia.org/wiki/Reverse_Address_Resolution_Protocol


3. Correct Answer E

Trick question. IP provides no form of error correction/acknowledgements.


4. Correct Answer A

192.168.10.0 is a class C address.  The subnet mask 255.255.255.192 implies 2 bits are borrowed.
22 = 4 subnets


5. Correct Answer D

24 = 16


6. Correct Answer E

Cisco's proprietary VLAN tagging (ISL) has a maximum frame size of 1548 bytes.
IEEE 802.1q VLAN tagging has a maximum frame size of 1522 bytes.


7. Correct Answer D

Routed Protocols are layer 3 Network Layer protocols. They include Internet Protocol (IP), Internetwork Packet Exchange (IPX) and Apple's AppleTalk. Routed or routable protocols allow for internetwork communication by assigning network and host identities to packets, without routed protocols network communication would be restricted to the local segment.

Internet Control Message Protocol (ICMP) is a TCP/IP protocol that works at the network layer and is used to report errors and deliver messages. ICMP is also considered a routed protocol.


8. Correct Answer A 

The Transport layer protocol data unit (PDU) is the 'Segment'


9. Correct Answer A

If you wish to remove an access-list, you use the no access-list (list #) command.


10. Correct Answer B 

The Bridge Priority is the numerical value held by switches. All Catalyst switches have a default priority of 32768. To determine the root bridge you combine the priority of each bridge with its MAC. If two switches have the same priority value the lowest MAC address becomes the root bridge.

 How did you go - Interesting huh - More coming stay tuned... Have a great day!!!


Monday, November 24, 2014

Millimetre-wave WiFi devices.


Samsung preps 4.6Gbps millimetre-wave WiFi devices.




Known as WiGig, the 802.11ad standard transmits in the unlicensed 60GHz frequency band for high performance up to 4.6 gigabits per second in Samsung's designs, while remaining backwards compatible with the previous 2.4GHz and 5GHz Wi-Fi standards.

Compared to today's 802.11ac which provides a maximum throughput of 867 megabits per second per stream under ideal conditions, 802.11ad devices can reach speeds as fast as 7 gigabit/s.

The high frequency used for WiGig results in path loss and poor wall and floor penetration of the signal, leading to shorter reach than existing Wi-Fi.

Samsung said it has solved these issues with millimetre-wave circuit design, improved transmission technology and a wide-coverage beam-shaping aerials. This, the company said, would make WiGig commercially viable in retail devices.



Read more: http://www.itnews.com.au/News/396733,wigig-coming-to-samsung-devices.aspx#ixzz3G6aWIlAc




Get eBook


Friday, November 21, 2014

Networking Questions And Answers

Another random batch of Cisco based networking questions to ponder, enjoy.



1. What is the default VTP mode of operation for the Cisco Catalyst switch?

A) Client
B) Server
C) Transparent


2. Router(config)#access-list 150 deny tcp any host 172.32.14.2 eq 25

What type of ACL is this and what is it performing?

A) Standard ACL, deny all SMTP traffic to host 172.32.14.2
B) Standard ACL, deny all Telnet traffic to host 172.32.14.2
C) Extended ACL, deny all SMTP traffic to host 172.32.14.2
D) Extended ACL, deny all Telnet traffic to host 172.32.14.2
E) Named ACL, deny all SMTP traffic to host 172.32.14.2


3. Rapid Spanning Tree Protocol (RSTP) can only run on Cisco switches?

A) True
B) False


4. When STP is converging no data can move through the switched network.

A) True
B) False


5. What class is the following IP address?
192.150.0.5

A) Class A
B) Class B
C) Class C
D) Class D


6. Which layer of the OSI reference model allows for internetwork connectivity?

A) Presentation layer
B) Datalink layer
C) Layer 2
D) Network layer
E) Application layer


7. What is the invalid timer set to by default when you have a router running the Interior Gateway Routing Protocol?

A) 3 times the update period
B) 270 seconds
C) 3 times the update period + 10 seconds
D) Answer A and B
E) 7 times the update period


8. How many access control lists can you apply to an interface?

A) Unlimited
B) One ACL per port per direction
C) 10
D) You do not apply ACL to interfaces


9. What does the trace response N mean?

A) Network unreachable
B) Not forwarded due to ACL restriction
C) Protocol unreachable
D) Port could not be reached


10. What is the maximum number of hosts you can assign to a class C network if it is not subnetted?

A) 1024
B) 254
C) 32
D) 512
E) 65025





 
  Get eBook




1, Correct Answer B

The default mode for all Catalyst switches is Server.
A VTP domain requires at least one VTP server.


2, Correct Answer C

Router(config)#access-list 150 deny tcp any host 172.32.14.2 eq 25

Port 25 is SMTP. This extended ACL denies traffic from any source to host 172.32.14.2.


3. Correct Answer B

RSTP (802.1w) is a new Spanning Tree Protocol that can run on any brand of switch.  It can even inter-operate with legacy STP protocols!

4. Correct Answer A

http://en.wikipedia.org/wiki/Spanning_tree_protocol

5. Correct Answer C

The first octet of a class C IP address ranges from 192 - 223


6. Correct Answer D

The Network layer of the OSI model is the layer that defines how internetworks (interconnected networks) function. The Network layer is concerned with getting data from one computer to another even across remote networks.


7. Correct Answer D 

IGRP sends its routing table to its neighbors every 90 seconds. IGRP uses an invalid timer to mark a route as invalid after 270 seconds (three times the update timer). IGRP uses a flush timer to remove a route from the routing table (default flush timer is 630 seconds, seven times the update period).


8. Correct Answer B 

Cisco routers only allow you to place one access control list (ACL) per direction.

9. Correct Answer A

Cisco Trace Command Response Codes

Response Meaning
 * Timed out
 !H router received packet but did not forward it
 N network unreachable
 P protocol unreachable
 U port unreachable



10. Correct Answer B

For class C the number of bits for host address portion is 8. So 2^8 -2 = 256-2 = 254 hosts.




How did you go?  Stay tuned for more - have a great day!