Skip to main content

Posts

Packet Tracer 5.1 for Windows with Cisco Official tutorials

Cisco has very recently launched the new version of Packet Tracer 5.1. I have uploaded the software with tutorials for the users who are preparing of Cisco exams or improving their network design concepts Enjoy! Packet Tracer 5.1 Version CODE http://rapidshare.com/files/182507939/PacketTracer_5.1_windows_setup___cisco_official_tutorials_by_heightofglory.part1 of2.rar http://rapidshare.com/files/182486892/PacketTracer_5.1_windows_setup___cisco_official_tutorials_by_heightofglory.part2 of2.rar Packet Tracer 5 Version CODE http://rapidshare.com/files/169210783/Packet_Tracer_5_with_Official_Tutorial_CCNA_v4.0_640-802_by_heightofglory.part1of3.rar http://rapidshare.com/files/169226160/Packet_Tracer_5_with_Official_Tutorial_CCNA_v4.0_640-802_by_heightofglory.part2of3.rar http://rapidshare.com/files/169196881/Packet_Tracer_5_with_Official_Tutorial_CCNA_v4.0_640-802_by_heightofglory.part3of3.rar http://www.mediafire.com/?mimk1gudtyg http://www.mediafire.com/?yzxyjy2lzqz Download 25MB (without

CCNA 4 Final

1. A network administrator is asked to design a system to allow simultaneous access to the Internet for 250 users. The ISP for this network can only supply five public IPs. What can be used to accomplish this task? routable translation dynamic translation static translation • port address translation 2. The LAN attached to the Ethernet interface of the Raleigh router shown in the graphic is addressed with private IP addresses. If one public IP is assigned to the company, which commands could be used in a configuration that allows all devices with private IPs in this network to access the Internet? (Choose two.) • ip nat inside source list 1 interface serial0 overload ip nat outside source list 1 interface serial0 overload ip nat inside serial0 • ip nat inside source list 1 pool Raleigh overload ip nat inside Raleigh overload ip inside nat source list 1 interface serial0 Raleigh 3. The command output shown in the graphic was taken from a Cisco 806 broadband router. Which kind of address

CCNA3 Final

1 Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. The show ip interface brief is issued on Router1 and the show interfaces trunk command is issued on the Switch1 to verify the current status. The administrator applies the additional configuration shown in the exhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be applied to the switch? Switch(config)# interface vlan 1 Switch(config-if)# ip address 10.1.1.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254 Switch(config)# interface vlan 1 Switch(config-if)# ip address 10.1.50.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.50.254 Switch(config)# interface vlan 10 Switch(config-if)# ip address 10.1.10.250 255.255.255.0 Switch(config-if)# no shutdown Switch(config-if)# ip default-gateway 10.1.10.254 ==> Switch(config)# interface vlan 10 Switch(config-if)#

BitDefender Total Security 2010 – Proactive Protection Against Viruses, Spyware, Hackers, Spam

Download Trial Version (32 bit) Download Trial Version (64 bit) BitDefender Total Security application was designed to provide comprehensive proactive protection against viruses, spyware, hackers, spam and other Internet security threats, along with system maintenance and data backup . Here are some key features of “BitDefender Total Security”: Confidently download, share and open files from friends, family, co-workers – and even total strangers: · Protects against viruses and other malware using industry-leading technology NEW · Scans all Web, e-mail and instant messaging traffic in real-time · Provides an unmatched detection rate of new threats based on two different proactive technologies · Blocks spyware programs that track your online activities Protect your identity: shop, bank, listen and watch, privately and securely: · Blocks web pages that attempt to steal your credit card data · Prevents personal information from leaking via e-mail, Web or instant messagingNEW · F

ICND 2 - Nat Sim Question

Here you will find answers to SIMULATION Questions  Question: A network associate is configuring a router for the weaver company to provide internet access. The ISP has provided the company six public IP addresses of 198.18.184.105 198.18.184.110. The company has 14 hosts that need to access the internet simultaneously. The hosts in the company LAN have been assigned private space addresses in the range of 192.168.100.17 – 192.168.100.30. The following have already been configured on the router: - The basic router configuration - The appropriate interfaces have been configured for NAT inside and NAT outside - The appropriate static routes have also been configured (since the company will be a stub network, no routing protocol will be required.) - All passwords have been temporarily set to "cisco" Solution: The company has 14 hosts that need to access the internet simultaneously but we just have 6 public IP addresses from 198.18.184.105 to 198.18.184.110/29. Therefore we have

CCNA2 Chapter 10 (NEW)

1 What action does a link-state router take immediately upon receipt of an LSP from a neighboring router? • floods the LSP to neighbors calculates the SPF algorithm runs the Bellman-Ford algorithm computes the best path to the destination network 2 Why is it difficult for routing loops to occur in networks that use link-state routing? Each router builds a simple view of the network based on hop count. Routers flood the network with LSAs to discover routing loops. • Each router builds a complete and synchronized view of the network. Routers use hold-down timers to prevent routing loops. 3 Refer to the exhibit. What kind of information would be seen in an LSP sent from router JAX to router ATL? hop count uptime of the route • cost of the link a list of all the routing protocols in use 4 To achieve network convergence, what three steps does each link state router take? (Choose three.) use automatic summarization to reduce the size of routing tables • build a Link State Packet (LSP) contai

CCNA2 Chapter 9 (new)

1 What two actions will the EIGRP DUAL FSM take if a link to a network goes down? (Choose two.) put the route into passive mode *query neighbors for a new route search routing table for a feasible successor run the SPF algorithm to find a new successor *search topology table for a feasible successor 2 Host 192.168.1.66 in the network illustrated is unable to ping host 192.168.1.130. How must EIGRP be configured to enable connectivity between the two hosts? (Choose two.) R1(config-router)# network 192.168.1.128 R1(config-router)# auto-summary * R1(config-router)# no auto-summary * R2(config-router)# no auto-summary R2(config-router)# auto-summary R2(config-router)# network 192.168.1.64 3 Refer to the exhibit. The company is using EIGRP with an autonomous system number of 10. Pings between hosts on networks that are connected to router A and those that are connected to router B are successful. However, users on the 192.168.3.0 network are unable to reach users on the 192.168.1.32 network