Cisco Ccna, Ccnp, And Ccent Certification Exam Practice  

Posted by Rajiv Pandey in , , , , , , ,

Here are some free Cisco certification practice exam questions for you , along with a little extra bonus material on recon attacks. Enjoy!

CCNA And CCENT Exam:
A frame enters a switchport. Which of the following does the switch examine first?

A. Source IP address

B. Destination IP address

C. Source MAC address

D. Destination MAC address

Answer: C. The switch will check the source MAC address first, and then decide whether that particular address and corresponding port number need to be added to the switch's MAC address table.

CCNP Certification / BSCI Exam:

In the following EIGRP configuration, the number 100 appears twice. Describe the purpose of each.

R2(config)#router eigrp 100
R2(config-router)#redistribute ospf 1 metric 1544 100 1 255 1500

Answer: The first "100" is the EIGRP AS number. The second "100" is the delay metric for the OSPF routes redistributed into EIGRP.

CCNP Certification / BCMSN Exam:

What single command can be used to change the speed and/or duplex setting of multiple ports simultaneously?

Answer: interface range.

CCNP Certification / ISCW Exam:

Name and briefly describe three different kinds of recon attacks.

A reconnaissance attack isn't necessarily destructive in itself. Quite the contrary, the attacker really doesn't want to draw your attention to this type of attack. A reconnaissance attack is primarily designed to gather information and test network defenses in preparation for a future - and very destructive - network attack.

Just as a successful ping to a single IP address will tell you if that host is online or not, a ping sweep sends pings to a range of addresses to find out which ones are in use. In a similar fashion, port scans are used to find out what ports are open and can possibly be compromised. Packet sniffers can be used for much the same reason.

And just as asking questions about someone can yield information about that person, queries can help a network attacker gain information about your network. DNS queries, SQL queries, and Internet Information queries are just three query types that can be used to gather information for future attacks.

CCNP Certification / ONT Exam:

You want to run Weighted Fair Queueing on a link that's running faster than 2.048 MBPS. What global configuration command allows this?

Answer: None - WFQ does not work on interfaces running at a speed higher than 2.048 MBPS.

Earning An MCSE Certification Is No Simple Task  

Posted by Rajiv Pandey in , , , , ,

As IT professional, include/understand you too well all the importance of certifications. Obtaining Microsoft certified the technician system who certification is certainly a positive movement for your career. MCSE is a certification of Microsoft-specific which proves your knowledge and capacities in the design and the execution of the infrastructure of network for companies. The certification of MCSE requires it professional to pass successfully seven examinations. No wonder one considers it one of Certifications Prime Minister of Microsoft.

In the strongly competing today IT gone, advancing your education is very important. The fact that you rise above other IT of the professionals to keep your competing advantage does not pass inapperçu. The owners of businesses seeking an engineer of art of the car-portrait-motivated to fill position with their company often seek current certifications. Microsoft offers a large variety of professional certifications certified by Microsoft. Certifications of Microsoft carry much influence with owners of businesses. Some certification of Microsoft you continued, you will not be disappointed by the results after you add your certification to your summary.

After you carried out the certification of MCSE on the operating software of your choice, you will have the occasion to select a speciality to place yourselves independently further from your pars. Specializations of MCSE are a manner so that it them professional with more easily identify their hearth in a particular field. You can choose to specialize you in the transmission of messages or safety with any certification of MCSE which you acquire. The owners of businesses need often an employee with specific specialization in safety. A MCSE: Safety would make the potential employers know to you are MCSE certified with a hearth on safety.

In more of your certificate and other gifts of Microsoft, you will receive great businesses on the industry-specific stores, the Web sites and the data bases of MCP-only. By the Web site of member of MCP, you can reach Microsoft professional store certified on line. The store was regarded as one of the principal stores of development of the career and of the professional of the industry . the regular talks on line with other professionals of Microsoft will maintain to you in the loop and will further help your education and career.

3 Reasons To Buy An Existing Domain Name  

Posted by Rajiv Pandey in , , , ,

Obviously you do not want to buy an existing web site for your new business as you wish to create a web site that accurately reflects your business vision, but there are a number of advantages to buying an existing domain name and if you do not yet have your heart set on a new domain name you will likely find an existing domain name available at a price not much greater than you will pay for a fresh name and an existing domain name brings a number of advantages.

One of the primary advantages of an existing domain name is that it already has traffic flowing toward it. Obviously the amount of traffic will vary greatly depending on what the current owner has done for promotion but any traffic is more than the zero visitors a fresh name will deliver.

Another advantage is from search engine optimization. Many domainers will have at least put in a small amount of time optimizing their domain name portfolio for search engines. Others put in a great deal of time and effort targeting key words and making sure the domain name is listed. It takes time for various domain names to work their way into search engine listings and if someone has already done that work for you then you are ready to capitalize on their groundwork as soon as you take over the name.

Tips To Increase Traffic To Your Blog  

Posted by Rajiv Pandey in , , , , , , , , ,

Just like any web site, it is capital you accept cartage visiting your blog. Once you accept a connected breeze of cartage advancing to your blog it’s abundant easier to run as you will body responses and get acknowledgment for the online autograph that you’ve posted.

A abundant way of accretion cartage to your blog is by announcement in forums and added online communities targeted at your blogs niche. There are actually bags of forums on the internet and award one in your alcove to access cartage to your blog shouldn’t be a problem. Just seek google or one of the added above seek engines.

Targeted cartage is acutely important as it will accompany you added committed readers to your blog. Random hits don’t beggarly annihilation these days, you wish to recruit an admirers and accumulate them absorbed by announcement on affair online autograph that will kepp them advancing back.

Another abundant means of accretion cartage is autograph articles, just like this one. Make abiding your commodity is on affair and gives as abundant advice as possible. You’re your online autograph amid 250-500 words for best results.

Social book appearance is aswell acceptable a abundant way to access cartage to your blog. Website like Digg, De.licio.us and Stumble Upon can accompany hoards of cartage to your website with the actual post.

5 Tips to Improve your Wireless Connection  

Posted by Rajiv Pandey in , , ,

Wireless technology makes it easy to get rid of the cables and take computing away from the desk. It's becoming the household norm, and while the technology is advancing quickly, there are some easy things you can do to improve your own wireless connectivity.

1. Position your Router
A wireless signal doesn't carry far, and any walls or large objects may cause interference. For this reason, a wireless router should be centrally located in your home to insure the best range possible. Place the router on a flat surface off the floor and away from obstructions. Additionally, there could be interference from a neighboring wireless signal. Make sure that you're using a unique wireless channel to limit interference.

2. Replace your Antenna
The antennas shipped with most routers are small antennas with omni-directional capabilities. These antennas broadcast a signal in all directions, which can be useful if you need wireless throughout your house, but the range is quite short. A directional antenna can improve range by focusing the signal in a specific way, allowing you to aim it where it's needed. These antennas are often called "high-gain" and the signal increase is measured in decibels (dB).

3. Get a Repeater
A wireless repeater is the easy and safe way to boost your signal. A repeater works very much like a router, but instead of creating a signal, it relays an existing signal. A repeater is easy to install and doesn't require any additional wires or connections. Multiple repeaters make it easy to create a home or business network with complete connectivity.

4. Make an Antenna Booster
It's possible to make a homemade reflector or antenna to improve your wireless signal. There are templates and building instructions on many Web sites across the internet to use materials as commonplace as foil and cardboard. Common designs are a parabolic satellite shape and a "coffee can" yagi antenna. Both can increase range and direct your signal, though homemade quality will vary.

5. Upgrade Firmware
Router manufacturers publish firmware updates regularly and upgrading your router can provide a performance boost and access to new features. Another option for the tech savvy is to install third-party firmware. There are a number of free, safe alternatives that may be compatible with your router. One project, DD-WRT, offers more robust features than many of the official firmware packages.

How to describe yourself?  

Posted by Rajiv Pandey in , , , ,

"Describe yourself!", This question is almost invariably asked in the majority of interviews, and just as invariably answered dismally!. What does one say and why do we always seem so flustered by the question?. Because we have always been taughtby our parents and respected elders not to boast or talk about ourselves.

With a childhood full of such repressive advice, its not surprising that the majority of us begin the answer with a stammer and a blush, almost instantly changing from flash to foolish and ruining our chances of employment.

So what do we say? Frankly, just answer the question as it comes. Most disconcerted candidates dread this question and begin with a silly "Basically, my name is ...". Why don't we realise that our CV is there right in front of the interviewer, and he knows this already.
By repeating the stuff that fills our CV, we just demonstrate that we are an 'in-the-box' kind of person, with little if any skill in innovation and presentation.

Actually, a question of this kind is an ideal way to plug in everything we want to say about ourselves that we had leave out of the CV. If you have attended a premier institution, say that the institution taught you much more than the degree it awared ypu, mention people who influenced ypu, talk about the books you like reading, your hobbies and your other interests.

Talk about your strengths; perhaps mention an instance when you used your conflict resolution skills or selling skills or whatever. But make certain that it does not sound like blowing your trumpet. Mention these instances as learning.
Tall about your weaknesses, but make sure that they are 'positive' weaknesses. For instance you could say that that you sometimes pay more attention to detail than is warranted. You can openly confess a tendency to be impatient with team members who cannot carry their own weight, or who cannot contribute sufficiently.

But first, think today what you want to say and practice. Remeber, if you hesitate about yourself, your interviewers will doubt whether you fit their bill of requirements. After all, if you don't know about you, who does?

What is Data Flow Diagram  

Posted by Rajiv Pandey in , , ,

The Data Flow Diagram is commonly used also for the visualization of structured design data processing. The normal flow is represented graphically. A designer typically draws context level DFD first showing interaction between the system and the outside entities. Then this context level DFD will then be exploded in order to further show the details of system being modeled.

A DFD is one of the three essential perspectives of Structured Systems Analysis and Design Method (SSADM). In this method, both the project sponsors and the end users need to collaborate closely throughout the whole stages of the evolution of the system. Having a DFD will make the collaboration easy because the end users will be able to visualize the operation of the system, the will see a better perspective what the system will accomplish and how the whole project will be implemented.

A project implementation can also be made more efficient especially in progress monitoring. The DFD of the old system can be laid side by side with the new system's DFD so that comparisons can be made and weak points can be identified so that the appropriate innovations can be developed.

There are four components of a data flow diagram which are the following:
External Entities / Terminators - These refer or points to the outside parts of the system being developed or modeled. Terminators, depending on whether data flows into or from the system, are often called sinks or sources. They represent the information as wherever it comes from or where it goes.
Processes – The Processes component modifies the inputs and corresponding outputs.
Data Stores – refers to any place or area or storage where data will be placed whether temporarily or permanently.
Data Flows – refers to the way data will be transferred from one terminator to another, or through processes and data stores.

As a general rules, every page in a DFD should not contain more than 10 components. So, if there are more than 10 components in one processes, one or more components should have to be combined and then make another DFD to detail the combination in another page.
Each component needs to be number. Same goes for each subcomponent so that it will be easy to follow visually. For example, a top level DFD must have components numbered 1,2,3,4,5 and next level subcomponent (for instance of number 2) numbered 2.1, 2.2, 2.3 and so on.
There are two approaches to developing a DFD. The first approach is the Top Down Approach where a DFD starts with a context level DVD and then the system is slowly decomposed until the graphical detail goes down to a primitive level.

The other approach, Event Partitioning Approach, was described by Edward Yourdon in Just Enough Structured Analysis. In Event Partitioning Approach, a detailed DFD is constructed all events are made. For every event, a process is constructed and then each process is linked with other processes through data stores. Each process' reaction to a given event is modeled by an outgoing data flow.

There many DFD tools available in the market today. Some of these DFD tools include Microsoft Visio, ConceptDraw, Dia, SmartDraw and SILVERRUN ModelSphere. Most of these tools have drag and drop capabilities and have analysis tools to help a designer see instant potential flaw in the diagram so correction can done immediately.

Visits our Health Blogs:--
Health Plus Pharmacy - Health Related Terms - Health Related Terms
- ISO 27001