Skip to main content

Posts

Showing posts from 2013

CCNA RIPv2 Simulation

Central Florida Widgets recently installed a new router in their Apopka office. Complete the network installation by performing the initial router configurations and configuring RIPv2 routing using the router command line interface (CLI) on the Apopka router. To configure the router (Apopka) click on the console host icon that is connected to a router by a serial console cable (shown in the diagram as a dashed black line). Each of the windows can be minimized by clicking on the [-]. You can also reposition a window by dragging it by the title bar. The “Tab” key and most commands that use the “Control” or “Esc” keys are not supported and are not necessary to complete this simulation. The help command does not display all commands of the help system. Configure the router per the following requirements: Name of the router is Apopka Enable-secret password is ish555ana The password to access user EXEC mode using the console is New2Rtr The password to allow te...

CCNA NAT Simulation

  A network associate is configuring a router for the weaver company to provide internet access. The ISP has provided the company six public IP addresses of 198.18.184.105 198.18.184.110. The company has 14 hosts that need to access the internet simultaneously. The hosts in the company LAN have been assigned private space addresses in the range of 192.168.100.17 – 192.168.100.30. The following have already been configured on the router: - The basic router configuration - The appropriate interfaces have been configured for NAT inside and NAT outside. - The appropriate static route have also been configured (since the company will be a stub network, no routing protocol will be required) - All passwords have been temporarily set to “cisco”. The task is to complate the NAT configuration using all IP addresses assigned by the ISP to provide Internet access for the hosts in the Weaver LAN. Functionality can be tested by clicking on the host provided for testing. ...

Cisco Packet Tracer Multi User Connection

Multiuser communication allows multiple point-to-point (peer) connections between multiple instances of Packet Tracer. By allowing communication between Packet Tracer instances, a new door has been opened to a fun, interactive, social, collaborative, and competitive learning environment. Instructors will now be able to create a variety of activities for students to learn in groups that will facilitate greater social interaction between students. Students will benefit from this environment by working together to solve problems and share ideas. Both students and teachers should take full advantage that Multiuser will offer in their learning environment. Technical Information Communicates between instances using PTMP. PTMP is TCP based. By default, uses TCP port 38000, is customizable, and each new instances on the same PC will use the next available port. On by default. UPnP will attempt to establish port forwarding to facilitate home networks. All network co...

Drag and Drop Questions

Question 1 Drag the security feature on the left to the specific security risks they help protect against on the right. (Not all options are used.) Answer : Question 2 Routing has been configured on the local router with these commands: Local(config)#ip route 0.0.0.0 0.0.0.0 192.168.1.1 Local(config)#ip route 10.1.0.0 255.255.255.0 192.168.2.2 Local(config)#ip route 10.1.0.0 255.255.0.0 192.168.3.3 Drag each destination IP address on the left to its correct next hop address on the right Answer: Question 3 The left describes the types of cables, while the right describes the purposes of the cables. Drag the items on the left to the proper locations. (Not all items can be used.) Answer: Question 4 Drag each category on the left to its corresponding router output on the right. Each router output line is in the result of a show ip interface command. (No...

Windows XP Unattended Installations with Windows Setup Manager

Step 1: Extract Windows XP Deployment Tools 1. Insert the Windows XP Professional CD-ROM. 2. If the Welcome To Microsoft Windows XP screen opens automatically, click Exit to close the screen. 3. In Windows Explorer, Open C drive and create a folder named 'Deploy'. 4. In Windows Explorer, open your CD-ROM drive and locate the 'Support\Tools\' folder. In the Tools folder, double-click Deploy.cab. 5. Select all the files listed in Deploy.cab. 6. Press CTRL+C to copy the selected files. 7. In Windows Explorer, open the Deploy folder that you created on the C drive. 8. In the Deploy folder that you created, paste the files (Shortcut Key: CTRL + V). Step 2: Create a answer file using Windows Setup Manager 1. In Windows Explorer, locate the C:\Deploy folder. 2. Double-click Setupmgr.exe. The Windows Setup Manager Wizard will starts. 3. Click Next. The New Or Existing Answer File page appears. 4. Select Create A New Answer File, and then click...

Difference Between SNMPv2 and SNMPv3

SNMPv2 vs SNMPv3 Internet Protocol (IP) networks use managing devices such as Simple Network Management Protocol (SNMP) to monitor network attached devices. In a computer network, a group of devices are attached, and they are managed and monitored by a manager. An agent, which is a software module in a managed device, reports information through the SNMP to the manager which has a Network Management System (NMS) that executes the applications that monitor and control managed devices. There are seven SNMP protocol data units (PDU): GetRequest – request to retrieve the value of a variable from the manager to the agent. SetRequest – request to change the value of a variable from the manager to the agent. GetNextRequest – request to find variables from the manager to the agent. GetBulkRequest – enhanced version of GetNextRequest. Response – reply from the agent to the manager through the return of variables. Trap – simultaneous message from the agent to the man...

Host A pings interface S0/0 on router 3. What is the TTL value for that ping?

Refer to the exhibit. Host A pings interface S0/0 on router 3. What is the TTL value for that ping? A. 252 B. 253 C. 254 D. 255 Answer : B Explanation: The TTL or Time-To-Live gives you an indication of the number of routers between the source and destination. The TTL is used to prevent an IP packet from looping inside an IP network and causing a network meltdown. The initial TTL packet value for an IP packet is 255 and then it is decremented by 1 each time it encounters a router. When this value reaches 0, the packet is discarded by a router. The TTL value is contained in each IP packet including ICMP packets. The TTL value given by the ping command is in fact the TTL value of an echo_response packet. By default, Windows will decrease the TTL by 128 and Ubuntu Linux by 192. The above the exact topology of this questions. I used 10.0.0.1 for Host A’s IP address and 12.0.0.2 for R3 S0/0’s IP address. All router has been config...

How to recover Cisco Router/Switch Password

The following is the tutorial about how recover a Cisco Passwords (Example: Console Password, Enable Password, Enable secret, VTY Password. But no need to removing case or CMOS Battery) Step 1: Restart / Power On the Router “R1” Step 2: Press Ctrl + Break, When the router is booting IOS. This key will interrupt the router boot process and prompt you ROM Monitor (ROMMON) Mode.   Step 3: Change the Configuration Register key to 0x2142 using confreg 0x2142 command. The key 0x2142 used to avoid coping configuration from NVRAM to RAM during next boot process. Then restart the router using reset command Step 4: After router restarted you will prompted for Initial Configuration. Type no to avoid Initial Configuration.   Step 5: Now the router with basic default configuration will be loaded. You can verify your passwords by show startup-config in Privilege EXEC mode.   ...

Based on the output from RouterA, what are two possible reasons for the failure?

Refer to the exhibit. Hosts in network 192.168.2.0 are unable to reach hosts in network 192.168.3.0. Based on the output from RouterA, what are two possible reasons for the failure?(Choose two) A. The cable that is connected to S0/0 on RouterA is faulty. B. Interface S0/0 on RouterB is administratively down. C. Interface S0/0 on RouterA is configured with an incorrect subnet mask. D. The IP address that is configured on S0/0 of RouterB is not in the correct subnet. E. Interface S0/0 on RouterA is not receiving a clock signal from the CSU/DSU. F. The encapsulation that is configured on S0/0 of RouterB does not match the encapsulation that is configured on S0/0 of RouterA. Answer : E, F E: If no clock rate found on DCE end or no keepalive message received , then the Protocol Status changed to down. F: Also if RouterA Serial0/0 and RouterB Serial S0/0 configured with two different protocols (Example: HDLC, PPP), then Protocol statu...

How to configure DHCP Service on Cisco Router

The Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure devices that are connected to a network so they can communicate on that network using the Internet Protocol (IP). The protocol is implemented in a client-server model, in which DHCP clients request configuration data, such as an IP address, a default gateway, and one or more DNS server addresses from a DHCP server. This tutorial will walk you through configuring a Cisco Router to server as a DHCP server for client computers. Commands: R1>enable R1#conf t R1(config)#service dhcp                                     >   Enables DHCP R1(config)#ip dhcp pool mydhcp                ...

Which command will show the MAC addresses of stations connected to switch ports?

Which command will show the MAC addresses of stations connected to switch ports? A. show mac-address B. show arp C. show table D. show switchport Answer : A Explanation: One of the three main functions of a switch is to learn which devices—that is, MAC addresses—are associated with which interfaces or ports. This information is stored in a port address, or content addressable memory (CAM) table. You can view the CAM table by using the show mac-address-table command. The command show mac-address is short form of show mac-address-table . Topology In this simple topology there were four hosts connected to Sw-Host switch. Each of its IP address and MAC address are shown below the Host icons. The switch Sw-Hosts has been assigned IP address of 192.168.1.254. After some transactions of data between all hosts. Each and every MAC address of hosts will be stored in CAM table. Below is the output of show mac-address...

A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts?

Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three.) A. host A IP address: 192.168.1.79 B. host A IP address: 192.168.1.64 C. host A default gateway: 192.168.1.78 D. host B IP address: 192.168.1.128 E. host B default gateway: 192.168.1.129 F. host B IP address: 192.168.1.190 Answer : A, C, F Explanation: Refer to the exhibit. Host A connected to Port 6 and Host B connected to Port 9. Also Port 6 and Port 9 associated with VLAN10 AND VLAN 20 respectively. In router Rtr1, the sub-interface fa0/0.10 and fa0/0.20 ‘s IP address will be used for Default Gateway for Host A and Host B. First take the IP address of fa0/0.10 – 192.168.1.78 /27 (255.255.255.224) Its IP range will be 192.168.1.65 – 192.168.1.94 Network Address – 192.168.1.64, Broadcast Address – 192.168.1.95 Second take the IP address of fa0/0....

CCNA – Chapter 1

Question 1 Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication? A. transport B. network C. presentation D. session E. application Answer : E Explanation: The application layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Question 2 A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about th...