Which Cisco IOS command is used to configure encapsulation for a PPP serial link on a Cisco router?
A. encapsulation ppp
B. encapsulation ip ppp
C. ip encapsulation ppp
D. encapsulation ppp-synch
Answer: A
Which service is denoted by TCP/UDP port number 53?
A. Domain Name Service (DNS)
B. File Transfer Protocol (FTP)
C. Telnet
D. HTTP
Answer: A
Friday, 4 October 2019
Monday, 8 October 2018
Cisco 200-105 Question Answer
In the network exhibit, the routers are running OSPF and are set to the default configurations. (Click the Exhibit(s) button to view the network.)
What would be the effect of configuring a loopback interface on RouterA with an address of 192.168.1.50/24?
A. Router B would become the DR
B. Router A would become the DR
C. Router C would become the DR
D. Router A would become the BDR
Answer: B
What would be the effect of configuring a loopback interface on RouterA with an address of 192.168.1.50/24?
A. Router B would become the DR
B. Router A would become the DR
C. Router C would become the DR
D. Router A would become the BDR
Answer: B
Friday, 2 March 2018
Cisco 200-105 Question Answer
Which protocol authenticates connected devices before allowing them to access the LAN?
A. 802.1d
B. 802.11
C. 802.1w
D. 802.1x
Answer: D 200-105 Dumps
What is a difference between TACACS+ and RADIUS in AAA?
A. Only TACACS+ allows for separate authentication.
B. Only RADIUS encrypts the entire access-request packet.
C. Only RADIUS uses TCP.
D. Only TACACS+ couples authentication and authorization.
Answer: A
A. 802.1d
B. 802.11
C. 802.1w
D. 802.1x
Answer: D 200-105 Dumps
What is a difference between TACACS+ and RADIUS in AAA?
A. Only TACACS+ allows for separate authentication.
B. Only RADIUS encrypts the entire access-request packet.
C. Only RADIUS uses TCP.
D. Only TACACS+ couples authentication and authorization.
Answer: A
Monday, 1 January 2018
Global Photonic IC Market 2018 Infinera, Avago, NeoPhotonics, HUAWEI, Cisco
Market Study ” Global Photonic IC Market ” in-depth Research of the Photonic IC market state and the competitive landscape globally. Analyses the important factors of the Photonic IC market based on present industry situations, market Size And demands, business strategies utilized by Photonic IC market players and the future prospects from various angles in detail. The report also presents forecasts for Photonic IC Market from 2018 till 2023.
In this report, the Photonic IC market worth about X billion USD in 2018 and it is expected to reach XX billion USD in 2023 with an average growth rate of X%. United States is the largest production of Photonic IC Market and consumption region in the world, while China is fastest growing region.
Geographically, Photonic IC market report is segmented into several key Regions, with production, consumption, revenue. The major regions involved in Photonic IC Market are (United States, EU, China, and Japan).
Top Companies Analysis Mentioned
1. Infinera
2. Alcatel-Lucent
3. Avago
4. NeoPhotonics
5. HUAWEI
6. Cisco
7. Ciena
8. Intel
9. Oclaro
10. JDS Uniphase
11. Finisar
12. Luxtera
13. Mellanox
14. OneChip
The Photonic IC research report includes the products that are currently in demand and available in the market along with their cost breakup, manufacturing volume, import/export scheme and contribution to the Photonic IC market revenue worldwide.
Key Highlights Of the Photonic IC Market:
• The fundamental details related to Photonic IC industry like the product definition, cost, variety of applications, Photonic IC market demand and supply statistics are covered in this report.
• Competitive study of the major Photonic IC players will help all the market players in analyzing the latest trends and Photonic IC business strategies.
• The deep research study of Photonic IC market based on development opportunities, growth limiting factors and feasibility of investment will forecast the Photonic IC market growth.
Finally, Photonic IC market report gives you details about the market research findings and conclusion which helps you to develop profitable market strategies to gain competitive advantage.
Thursday, 14 September 2017
Cisco 200-105 Question Answer
Which three options are the HSRP states for a router? (Choose three.)
A. initialize
B. learn
C. secondary
D. listen
E. speak
F. primary
Answer: B, D, E
While you were troubleshooting a connection issue, a ping from one VLAN to another VLAN on the same switch failed. Which command verifies that IP routing is enabled on interfaces and the local VLANs are up?
A. show ip interface brief
B. show ip nat statistics
C. show ip statistics
D. show ip route
Answer: A
A. initialize
B. learn
C. secondary
D. listen
E. speak
F. primary
Answer: B, D, E
While you were troubleshooting a connection issue, a ping from one VLAN to another VLAN on the same switch failed. Which command verifies that IP routing is enabled on interfaces and the local VLANs are up?
A. show ip interface brief
B. show ip nat statistics
C. show ip statistics
D. show ip route
Answer: A
Friday, 8 September 2017
Cisco 200-105 Exam Question Answer
Which identification number is valid for an extended ACL?
A. 1
B. 64
C. 99
D. 100
E. 299
F. 1099
Answer: D
Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.)
A. the type of cable that is connected to the interface.
B. The uptime of the interface
C. the status of the physical layer of the interface
D. the full configuration of the interface
E. the interface's duplex settings
Answer: A, C
A. 1
B. 64
C. 99
D. 100
E. 299
F. 1099
Answer: D
Which two pieces of information are provided by the show controllers serial 0 command? (Choose two.)
A. the type of cable that is connected to the interface.
B. The uptime of the interface
C. the status of the physical layer of the interface
D. the full configuration of the interface
E. the interface's duplex settings
Answer: A, C
Sunday, 11 June 2017
Cisco Patches Critical Flaws in Prime Data Center Network Manager
A debugging tool left on in deployments of Cisco’s large-scale data center management software could be remotely accessed and allow an attacker to run code with root privileges.
Cisco made an update available that patches this and one other critical vulnerability in the same management software, the company said in an advisory published Wednesday.
Cisco said the vulnerability affects Cisco Prime Data Center Network Manager 10.1(1) and 10.1(2) for Windows, Linux and virtual appliance platforms.
The debugging tool in each version of the software lacked authentication and authorization mechanisms, Cisco said. The flaw lies in the role-based access control functionality of the management software.
“An attacker could exploit this vulnerability by remotely connecting to the debugging tool via TCP,” Cisco said in its advisory. “A successful exploit could allow the attacker to access sensitive information about the affected software or execute arbitrary code with root privileges on the affected system.”
The management software is used to oversee a number of Cisco Nexus switches and Cisco NX-OS and MDS SAN switches. Managers should ensure the software they’re running is version 10.2(1) or later.
The second critical vulnerability addressed is a hard-coded static credential that could be used by an attacker to log in to the management console. A default user account that is created upon installation of the software contains the default password, and by leveraging the credential, an attacker could gain root- or system-level privileges.
“A successful exploit could allow the attacker to use this default user account to log in to the affected software and gain access to the administrative console of a DCNM server,” Cisco said in its advisory.
All versions of Cisco Prime Data Center Network Manager prior to 10.2(1) are affected on Windows, Linux and virtual appliance platforms, Cisco said.
There are no workarounds, nor public exploits for either critical vulnerability, Cisco said.
Cisco also released patches on Wednesday for high-severity vulnerabilities in Cisco AnyConnect, the company’s mobile VPN product, and TelePresence Endpoint, the company’s teleconferencing and collaboration product.
The vulnerability in AnyConnect affects only the Windows version of the client, and allows a local, authenticated attacker to run an executable and elevate privileges to that of the Windows SYSTEM account. Cisco said DLL path and file names are not properly validated.
“An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory,” Cisco said in its advisory. “A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. The attacker would need valid user credentials to exploit this vulnerability.”
Versions of Cisco AnyConnect Secure Mobility Client for Windows prior to 4.4.02034 are affected. The iOS, Android and Windows Phone versions are not affected, nor are the clients for MacOS or Linux, Cisco Said.
The Telepresence vulnerability is in its implementation of the Session Initiation Protocol (SIP in the TelePresence Codec and Collaboration Endpoint. Remote attackers could exploit the flaw and cause the software to reload unexpectedly.
“The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device,” Cisco said in its advisory. “An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition.”
Cisco said versions of TelePresence Codec prior to 7.3.8 and Collaboration Endpoint prior to 8.3.0 are affected. There is a long list of specific models within the MX, Profile, SX, MXP, DX, EX, and Integrator C series that are affected in Cisco’s advisory. Cisco added that the Cisco Spark Room series is not affected, and neither is TelePresence CE 9.0.1.
Subscribe to:
Posts (Atom)