Sunday, 13 September 2015

350-018 Sample Question


Which three statements are correct concerning AES? (Choose three.)

A. AES is faster to compute than 3DES.
B. AES is not subject to known-plaintext attacks, while DES is subject to them.
C. AES is a block cipher, while 3DES and DES are stream ciphers.
D. AES can be used with longer keys than 3DES.

Answer: A,B,D

Sunday, 26 July 2015

Cisco Pulls out of Another Business

The networking titan will no longer sell storage equipment which had $ 415 million of acquisition Whiptail storage starting in 2013.

Cisco Systems continues to trim the fat before Chuck Robbins acts as CEO next week after the longtime leader John Chambers, steps down.

The networking titan no longer sell storage equipment, an industry, it has inherited from its acquisition of storage startup Whiptail $ 415 million in 2013. The company will also sell a line of servers that has the capabilities of storage, but not a product that is the only purpose it to store data.

Analysts said the Wall Street Journal that the movement to the Cisco storage equipment to sell in contradiction with some of its longstanding partners like EMC EMC -1.35% and -0.96% NTAP NetApp.

"Cisco is the priority to elements of our portfolio to drive more value for our customers today and in the future, and today we announce the end of life (EOL) for the Invicta Scaling system products and appliances, "a spokesman of the company told CRN.

The decision to throw the business is logical given Cisco CSCO 1.39% just sold its set-top box company $ 600 million Thursday to remove a line over less profitable products slide down the heart of business enterprise network technology.

On Monday, Robbins, Cisco senior vice president of field operations worldwide, will begin its first working day as company CEO. Chambers will remain as chairman.

Wednesday, 4 February 2015

350-018 Sample Question


You are the network administrator. Two remote LANs connected via a serial connection are exchanging routing updates via RIP. An alternate path exists with a higher hop count. When the serial link fails, you receive complaints of users regarding the time it takes to transfer to the alternate path. How will you ameliorate this situation?

A. You could change the hop count on an alternate path to be the same cost.
B. You could reduce or disable the holdown timer by making use of the timers basic command.
C. You could increase the bandwidth of the alternate serial connection.
D. You could configure a static route with the appropriate administratice cost via the alternate route.

Answer: B

Sunday, 21 December 2014

350-018 Sample Question

Question No : 11

Refer to the exhibit. Which option describes the behavior of this configuration?

A. The peer session is dropped when 80 prefixes are received.
B. A warning message is displayed when 1000 prefixes are received.
C. The peer session is dropped when 800 prefixes are received.
D. An Initial warning message is displayed when 800 prefixes are received. A different message is displayed when 1000 prefixes received and the session will not be disconnected
E. An Initial warning message is displayed when 80 prefixes received. The same warning message is displayed when 1000 prefixes are received and the session will be disconnected.

Answer : D

350-018 Sample Question

Question No : 10

Drag and Drop Question


Monday, 24 November 2014

350-018 Sample Question

Question No : 9

Which three statements about LDAP are true? (Choose three.)

A. LDAP uses UDP port 389 by default.
B. LDAP is defined in terms of ASN.1 and transmitted using BER.
C. LDAP is used for accessing X.500 directory services.
D. An LDAP directory entry is uniquely identified by its DN.
E. A secure connection via TLS is established via the UseTLS operation.

Answer : BCD

Tuesday, 30 September 2014

Cisco Systems Makes Competitive Push Into Security

It is expected that Cisco network equipment computers a series of security products hardware and reviewed software begin to help thwart increasing cyber attacks against companies from around the world and strengthen its range against growing competition from rivals such as check Point Software Technologies (NASDAQ: CHKP), Palo Alto Networks (NYSE: PANW) and Fortinet (NASDAQ: FTNT) by Cisco Systems (NASDAQ: CSCO) product launch comes nearly a year after the acquisition of the power security provider $ 2.7 billion. The closure in October.

To integrate new products firewall products from Cisco systems with intrusion prevention Sourcefire next-generation, and protection against advanced malware, designed to stop cyber attacks on the injury business networks, says Martin Roesch, chief architect business Unit Cisco security and founder of Source. We bring all this under one roof, so it is really a powerful offering in the integration of technology and our new company forward direction of "IBD Roesch said.

Cisco builds more security products,wireless networks,data centers, the decline in sales of its switches and routers compensated in the core network.Combined, switches and routers accounted for 46% of total sales of Cisco for fiscal 2014, which ended August 26.In July, Cisco announced would be released 8% of the workforce, or 6,000 employees, as part of a restructuring.Source acquisition helps to support a large hole in the security portfolio of Cisco, said John Grady, an analyst at market research firm IDC.

Cisco was strong in the basics firewall technology, politics and segmentation, but from the standpoint of safety and the prevention of the threat that had been something in relation to the rest of the market, Grady said. It's really the core of the two companies come together. Cisco also coincides with a growing number of cyber-attacks to steal movement to strengthen the security business to credit card numbers and other personal information.