December 07, 2012

CCNA SYLLABUS NEW 640-802


1. Internetworking
1.1. Internetworking Basic
1.2. Internetworking Models
1.3. The OSI Reference Model
1.4. Ethernet Networking
1.5. Ethernet Cabling
1.6. Data Encapsulation
1.7. The Cisco Three-Layer Hierarchical Model
2. Introduction to TCP/IP
2.1. TCP/IP and the DoD Model
2.2. IP Addressing
2.3. Broadcast Address
3. Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP
3.1. Subnetting Basics
3.2. Variable Length Subnet Masks (VLSMs)
3.3. Summarization
3.4. Troubleshooting IP Addressing
4. Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM)
4.1. The IOS User Interface
4.2. Command-Line Interface
4.3. Router and Switch Administrative Configurations
4.4. Cisco’s Security Device Manager (SDM)
5. Managing a Cisco Internetwork
5.1. The Internal Components of a Cisco Router
5.2. The Router Boot Sequence
5.3. Managing Configuration Register
5.4. Backing up and Restoring the Cisco IOS
5.5. Backing Up and Restoring the Cisco Configuration
5.6. Using Cisco Discovery Protocols (CDP)
5.7. Using Telnet
5.8. Resolving Hostnames
5.9. Checking Network Connectivity and Troubleshooting
6. IP Routing
6.1. Routing Basics
6.2. The IP Routing Process
6.3. Configuring IP Routing in Our Network
6.4. Dynamic Routing
6.5. Distance-Vector Routing Protocols
6.6. Routing Information Protocol (RIP)
6.7. Inferior Gateway Routing Protocol (IGRP)
6.8. Verifying your Configuration
7. Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF)
7.1. EIGRP Features and Operation
7.2. Using EIGRP to Support Large Networks
7.3. Configuring EIGRP
7.4. Load Balancing with EIGRP
7.5. Verifying EIGRP
7.6. Open Shortest Path First (OSPF) Basics
7.7. Configuring OSPF
7.8. Verifying OSPF Configuration
7.9. OSPF DR and BDR Elections
7.10. OSPF and Loopback Interfaces
7.11. Troubleshooting OSPF
7.12. Configuring EIGRP and OSPF Summary Routes
8. Layer 2 Switching and Spanning Tree Protocol (STP)
8.1. Before Layer 2 Switching
8.2. Switching Services
8.3. Spanning Tree Protocol (STP)
8.4. Configuring Catalyst Switches
8.5. Cisco Network Assistant
9. Virtual LANs (VLANs)
9.1. VLAN Basics
9.2. VLAN Memberships
9.3. Identifying VLANs
9.4. VLAN Trunking Protocol (VTP)
9.5. Routing between VLANs
9.6. Configuring VLANs
9.7. Configuring VTP
9.8. Telephony: Configuring Voice VLANs
9.9. Using the CAN to Configure VLANs and Inter-VLAN Routing
10. Security
10.1. Perimeter, Firewall and Internal Routers
10.2. Recognizing Security Threats
10.3. Mitigating Security Threats
10.4. Introduction to Access Lists
10.5. Standard Access Lists
10.6. Extended Access Lists
10.7. Advanced Access Lists
10.8. Monitoring Access Lists
10.9. Configuring Access Lists Using SDM
11. Network Address Translation (NAT)
11.1. When Do We Use NAT?
11.2. Types of Network Address Translation
11.3. NAT Names
11.4. How NAT Works
11.5. Testing and Troubleshooting NAT
11.6. Configuring NAT on Our Internetwork
11.7. Configuring NAT Using SDM
12. Cisco’s Wireless Technologies
12.1. Introduction to Wireless Technology
12.2. Cisco’s Unified Wireless Solution
12.3. Configuring Our Wireless Internetwork
13. Internet Protocol Version 6 (IPv6)
13.1. Why Do We Need IPv6
13.2. The Benefits and Uses of IPv6
13.3. IPv6 Addressing and Expressions
13.4. How IPv6 Works in an Internetwork
13.5. IPv6 Routing Protocols
13.6. Migrating to IPv6
13.7. Configuring IPv6 on Our Internetwork
14. Wide Area Networks
14.1. Introduction to Wide Area Networks
14.2. Cable and DSL
14.3. Cabling the Serial Wide Area Network
14.4. High-Level Data-Link Control (HDLC) Protocol
14.5. Point-to-Point Protocol (PPP)
14.6. Frame Relay
14.7. Using SDM for WAN Connections
14.8. Virtual Private Networks

March 27, 2012

CCNA INTERVIEW QUESTIONS AND ANSWERS

CCNA INTERVIEW Q&A

Q. What is a router?
A. A router is a device that connects more than one physical network, or segments of a network, using IP routing software. As packets reach the router, the router reads them and forwards them to their destination.

Q. Discuss wireless networking.
A. This is a network configured to use communication techniques such as infrared, cellular, or microwave, so that cable connections are not required.

Q. Discuss WAN (wide area network).
A. A WAN is extended over longer distances that a LAN (local area network). It can range from a few miles to across the world. TCP/IP is the primary WAN protocol and was developed to provide reliable, secure data transmissions over long distances.

Q. What is OSPF?
A. Open Shortest Path First is a routing protocol that supports the concept of a core area to which everything attaches.

Q. What is BGP?
A. Border Gateway Protocol is used for routing between networks on the Internet core, and it supports many advanced routing features.

Q. What is an autonomous system?
A. An autonomous system is a community of interest. Used in conjunction with routing protocols, it breaks up parts of the network into manageable chunks.

Q. What is dial on demand?
A. Dial on demand is a technology that only activates network connection when “interesting” packets are to be sent across the infrastructure.

Q. What mask would you use to supernet two class C addresses?
A. The subnet would be 255.255.254.0.

Q. What is VLANing?
A. Virtual LAN is used on large LANs to break up the network into smaller broadcast domains. This creates communities of interest. These communities can be based around organizational structures.

Q. What is CIDR?
A. Classless Internet domain routing is used in conjunction with classless routing protocols to summarize the Internet into smaller routing tables.

Q. What is VLSM?
A. Variable Length Subnet Mask is used to allocate the amount of address space required by the end network.

Q. What is a class D IP address?
A. Class D addresses are multicast addresses.

Q. What addresses do multicasts start with?
A. Multicasts start with the address 224.0.0.0.

Q. Which name resolution system is implemented with TCP/IP by default?
A. Although WINS is a name resolution that is implemented by TCP/IP by default, it only works on Windows-based networks. The only true name resolution system that almost every TCP/IP networks uses is DNS.

Q. You are the administrator of a 100-station Ethernet network. Your users are complaining of slow network speeds. What could you replace your hub with to increase your network throughput?
A. A switch would increase performance by making virtual, direct connections between sender and receiver. A bridge and router would actually decrease performance because these devices introduce latency into the communication.

Q. Which TCP/IP utility is most often used to test whether an IP host is up and functional?
A. The Ping utility is the most often used TCP/IP utility because it allows you to test individual hosts.

Q. Which utility can you use to find the MAC and TCP/IP address of your Windows NT or 2000 workstation?
A. The ipconfig utility is available for both these operating systems. It displays information like the MAC and TCP/IP address of your workstation as well as other TCP/IP configuration information.

Q. Which utility can you use to verify a packet’s path?
A. The tracert utility traces the route from the source IP host to the destination host.



Q. Which WAN technology uses digital signaling from sender to receiver?
A. The T-series of WAN connection (such as T1, T3, and so on) uses digital signaling from sending hardware to receiving hardware.

Q. You are setting up a workstation for remote access to the office. The office has a modem pool configured, and it is working correctly. The required results are that the workstation and modem bank must establish a connection and that the server at the office must authenticate the workstation. Optionally, the workstation and office must be able to communicate by using a single protocol, and the workstation must be able to access all network devices at the office. The proposed solution is to install a POTS telephone line, modem cable, and modem connected to the workstation. How would you configure the protocols to achieve the desired results?
A. This question tests your ability to configure protocols and select the best one to meet the connectivity requirements. The recommended protocol here would be TCP/IP since it can be used across the different access methods.

Q. Which remote access protocol can run over both serial and parallel connections?
A. Because PPP doesn’t contain a physical layer specification as part of the protocol, it can run over any kind of medium.

Q. What Microsoft TCP/IP protocol can be used over the Internet to create a secure, virtual network?
A. The Point-to-Point Tunneling Protocol (PPTP) allows you to create a secure, virtual connection between two points by tunneling one protocol inside another. Usually, a PPP connection is opened over a TCP/IP link.

Q. Which type of firewall checks for a current communication and the next packet needed?
A. A proxy provides firewall services by keeping track of all communications sessions and “prefetching” the next packets.

Q. Which type of security uses a file that identifies predefined IP addresses that are allowed to send data through a router?
A. Access Control List security uses a file (the ACL) that identifies which addresses can send data through a particular firewall or router.


A broadcast domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN or it can be routed towards other LAN segments.

A collision domain is a physical network segment where data packets can "collide" with one another for being sent on a shared medium, in particular in the Ethernet networking protocol. A network collision is a scenario wherein one particular device sends a packet on a network segment, forcing every other device on that same segment to pay attention to it. Meanwhile, another device does the same, and the two competing packets are discarded and re-sent one at a time. This becomes a source of inefficiency in the network

March 24, 2012

How to set unlimited no of ip on a router interface?



router#conf t
router(config)#interface serial 0
router(config-if)#ip address 192.168.1.1 255.255.255.0
router(config-if)#ip address 192.168.2.1 255.255.255.0 secondary



March 23, 2012

CCNA INTERVIEW QUESTIONS FOR FREE

Test questions
Question
LAN stands for which of the following?
WAN stands for which of the following?
The two sublayers of the IEEE Data Link layer are which of the following?
Bridges work at which layer of the OSI reference model?
Repeaters work at which layer of the OSI reference model?
What is the Network layer of the OSI reference model responsible for?
Which three pairs of the following are Presentation layer standards?
Which of the following are Session layer standards?

How to pass CCNA guaranteed

The two most significant things to study on the test are the OSI model and TCP/IP addressing and subnetting.  If you know both of those very, very well, then you are guaranteed about 50% on the exam.  The rest comes from this sheet.

The last bit of advice is that you didn’t believe me on the importance of knowing the OSI model, learn it backwards, forwards, sideways, and be prepared to answer really nit-picky questions about it.


OSI Model
Application
               File, print, message, database, and applications
               Determines availability of the target host.
               www, email, ftp, telnet, edi, quake
Presentation
               Data Encryption, compression, and

MCITP SYLLABUS NEW 2012

WINDOWS SERVER 2003 TOPICS

CCNA Study Questions


The five steps of Encapsulation:
1) User information is converted to data.
2) Data is converted to segments.
3) Segments are converted to packets or datagrams.
4) Packets or datagrams are converted to frames.
5) Frames are converted to bits.

What kind of services are provided by the Presentation layer ?
JPEG, TIFF, PICT, EBCDIC to ASCII, MIDI, MPEG, QuickTime

Pass CCNA /CCNP to Remember these commands

 Basic:

copy tftp flash                                                     copy from tftp server to the flash memory
copy flash tftp                                                     copy from the flash to the tftp server
copy running-config tftp                                    copy configuration to the tftp server
copy tftp running-config                                    copy the config from tftp server to running-config
show version                                                         show the IOS/Flash/DRAM/Config Register/ROM
show flash                                                             show contents of the flash memory
show running-config                                           show configuration of the router
show config                                                          show the configuration of the router
show ip route                                                        show all routing enabled, static and dynamic
show interface                                                      show detailed info on the interfaces
show controller                                                     show detailed info on the controller
show access-list                                                    show all of the active access-list config on router
show ip arp                                                           show mac address on each interface
write erase                                                             erasing the entire configuration and NVRAM

March 22, 2012

Usesful Acronyms for CCNA/CCNP



  1. 3DES Triple DES
  2. 6-to-4 IPv6-to-IPv4
  3. AAA Authentication, authorization, accounting
  4. ABR Area Border Router
  5. ACK acknowledge, acknowledgment, acknowledgment bit in a TCP segment
  6. ACL access control list
  7. ACS Access Control Server
  8. AD advertised distance
  9. ADSL asymmetric DSL

PACKET FILTERING ?

 PACKET FILTERING ?

  1. A malicious user can still discover what is packets meet the pix firewall criteria and send arbitary traffic.
  2. Packet can get through by being fragmented.
  3. complex access control lists are difficult to configure and cumbersome to maintain.
  4. Not all services can be packet filtered.

Firewall

what is firewall ?
firewall is a system of hardware and or software that controls access between 2 or more networks.

Basics of Networking

WHAT IS VLAN