Monday, June 6, 2011

CCNP_BCMSN Lab: Configuring a Distribution Switch


Items of practical training certificates Cisco CCNP_BCMSN (Building Cisco Multilayer Switched Networks)

Start practicing: Configuring a Distribution Switch

CCNA EIGRP LAB Question

Question:
After adding R3 router, no routing updates are being exchanged between R3 and the new location. All other inter connectivity and Internet access for the existing locations of the company are working properly.
The task is to identify the fault(s) and correct the router configuration to provide full connectivity between the routers.

Access to the router CLI can be gained by clicking on the appropriate host. All passwords on all routers are cisco.

IP addresses are listed in the chart below.
ccna_eigrp_sim
R1
Fa0/0: 192.168.77.33
S1/0: 198.0.18.6
S0/1: 192.160.60.25
R2
Fa0/0: 192.168.60.97
Fa0/1: 192.168.60.113
S0/0: 192.168.36.14
R3
Fa0/0: 192.168.77.34
Fa0/1: 192.168.60.65
Fa1/0: 192.168.60.81
R4
Fa0/0: 192.168.60.129
Fa0/1: 192.168.60.145
S0/1: 192.168.60.26
Answer and explanation:

CCNA: Cisco Certified Network Associate: Fast Pass



Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.

The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:

* Designing Cisco internetworks
* Developing an access list
* Evaluating TCP/IP communication
* Configuring routers and switches
* Configuring IP addresses, subnet masks, and gateway addresses
* Performing LAN, VLAN, and WAN troubleshooting
* Understanding rules for packet control 

Cisco IOS access lists: 10 things you should know

Takeaway: Access control lists (ACLs) are a fundamental part of working with routers. How much do you know about managing these vital gatekeepers? David Davis lists 10 things every administrator should know about working with Cisco IOS ACLs.

People who read this, also read...
Playing with Cisco access lists
Use advanced parameters on your Cisco IOS ACLs
Traffic filtering with Cisco access lists: Why, how, and what to consider
Learn additional uses for Cisco IOS access control lists
Protect your network with the Cisco IOS Firewall
If you work with Cisco routers, you're more than likely familiar with Cisco IOS access control lists (ACLs). But that doesn't mean you know all there is to know about these important gatekeepers. Access lists are an integral part of working with routers, and they're vital to security.

Because ACLs are a fundamental part of router administration, I want to address 10 things you should know about working with these lists. If you're new to working with Cisco routers, this list offers a good foundation to get you started. But even if you've worked with Cisco routers for a while, it never hurts to review the basics—you might even learn something new.

Cisco Network Magic Pro 5.0.8282


Cisco has introduced a suite of network management software named Network Magic 5.0 . This tool will improve various network tasks like- connecting and sharing computers(content & printer), control computers on network while accessing Internet, connection repairing features, manage performance problem to provide optimize performance and many more. This tool run in the background and indicate/alert each time when new device connect to your network.

CCNA 1 Final Exam 640 - 802

1. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?
--> Use the ping 127.0.0.1 command at the command prompt.

2. Refer to the exhibit. Which set of devices contains only intermediary devices?
--> A, B, D, G

3. Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
--> only computer D

4. Which password is automatically encrypted when it is created?
--> enable secret

5. Which three statements characterize the transport layer protocols? (Choose three.)
--> TCP and UDP port numbers are used by application layer protocols.
--> TCP uses windowing and sequencing to provide reliable transfer of data.
--> TCP is a connection-oriented protocol. UDP is a connectionless protocol.

CCNA1 FINAL 100%

1  A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?

Use the ipconfig /all command at the host?s command prompt.
X Use the ping 127.0.0.1 command at the command prompt.
Use the traceroute command at the command prompt to identify any failures on the path to the     gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting tool from the PC manufacturer's website.

2  Refer to the exhibit. Which set of devices contains only intermediary devices?

X A, B, D, G
A, B, E, F
C, D, G, I
G, H, I, J

3  Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?
X only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers