Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

Seo Master present to you:
CCNA Interview Questions You'll Most Likely Be Asked

CCNA Interview Questions You'll Most Likely Be Asked is a perfect companion to stand ahead above the rest in today’s competitive job market. Rather than going through comprehensive, textbook-sized reference guides, this book includes only the information required immediately for job search to build an IT career. This book puts the interviewee in the driver's seat and helps them steer their way to impress the interviewer.


Table of Contents
1. TCP/IP and OSI Networking Models
2. LAN Fundamentals
3. WAN Fundamentals
4. IP Addressing and Routing
5. TCP/IP Applications
6. Network Security
7. LAN Switching Concepts
8. Cisco LAN Switches Operation and Configuration
9. Wireless LAN Concepts
10. IP Addressing and Subnetting
11. Cisco Routers Operation and Configuration
12. Routing Protocols Concepts and Troubleshooting
13. Ethernet Virtual LANs (VLAN)
14. Spanning-Tree Protocol
15. Troubleshooting LAN Switching
16. Static Routing
17. VLSM and Route Summarization
18. Control Network Traffic with Access Control Lists (ACLs)
19. OSPF Concepts
20. EIGRP Concepts
21. Point-To-Point WAN Links and Protocols
22. Frame-Relay Configuration and Troubleshooting
23. Virtual Private Networks (VPN)
24. Network Address Translation (NAT)
25. IP Version 6 (IPv6)
26. Subnet Masking
27. Networks and Protocols
28. Cisco IOS
29. HR Questions
INDEX
 
 
Includes:

a) 200 CCNA Interview Questions, Answers and Proven Strategies for getting hired as an IT professional
b) Dozens of examples to respond to interview questions
c) 51 HR Questions with Answers and Proven strategies to give specific, impressive, answers that help nail the interviews
d) 2 Aptitude Tests download available on www.vibrantpublishers.com


Sample from the book
(Below Questions and Answers are randomly taken from different pages of the book)
 

156: What is DHCP?
Answer:
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of IP addresses configured for a given network. DHCP also provides other configuration items to computers such as subnet mask, gateway IP address and DNS server IP address.

157: Describe the function of ICMP.
Answer:
Internet Control Message Protocol (ICMP) is a vital tool in network troubleshooting. It is a protocol used to test network connectivity between network devices by sending control messages to a destination and then analyze the reply. The “ping” command uses ICMP protocol and is used to test connectivity in the network.

158: Which of the below trunking protocols support native VLAN?
a) 802.1q
b) 802.11a
c) ISL
d) 802.1n
Answer:
a. 802.1q

159: Which trunking protocol below encapsulates the Ethernet frame into a new layer 2 header and trailer?
a) 802.3
b) 802.1q
c) 802.11q
d) ISL
Answer:
d. ISL

160: What does the character “S” means in the routing table?
Answer:
A route starting with the “S” character is a static route configured with the command “ip route”.

161: Which route is preferred by a router, a Static route or OSPF learned route? Why?
Answer:
The router will use administrative distance to select one route. The lower the administrative distance the better the route. Static routes have administrative distance of “1” while OSPF routes have administrative distance of “110”. So the static route will be selected.

162: What is the default Maximum Transmission Unit (MTU) of Ethernet interface?
a) 1000 bytes
b) 150 bytes
c) 10000 bytes
d) 1500 bytes
Answer:
d. 1500 bytes

163: What is VLSM and what does it mean in the networking terminology?
Answer:
Variable Length Subnet Mask (VLSM) is a term used to describe the feature of using variable mask length in a single Class A, B, or C network instead of using the default mask of these classes. As the subnet mask is not fixed length, VLSM mandates sending the subnet mask in the routing update of routing protocols.

164: Which routing protocols below support VLSM?
a) RIPv1
b) OSPF
c) IGRP
d) RIPv2
Answer:
b. OSPF, d. RIPv2

165: Which subnet mask would you use over point-to-point WAN links and why?
Answer:
Point-to-point links connect only two end devices to each other requiring only two IP addresses. To preserve network addresses, the /30 mask is recommended to be used over point-to-point links to provide these two IP addresses.

166: What is route summarization and what are the benefits of it?
Answer:
Route summarization is a method to consolidate selected multiple routes into a single route advertisement. This improves routing performance as the router takes less time searching for a matching route in the routing table and saves router memory by storing less routing information.

167: What is the broadcast address of the subnet 183.15.32.0/20?
a) 183.15.32.255
b) 183.15.32.254
c) 183.15.31.255
d) 183.15.74.255
Answer:
d. 183.15.74.255

168: Which routing protocols below support Manual route summarization?
a) OSPF
b) EIGRP
c) RIPv1
d) RIPv2
Answer:
a. OSPF, b. EIGRP, d. RIPv2
- See more at: http://www.vibrantpublishers.com/ccna-interview-questions-youll-most-likely-be-asked-p-69.html#sthash.Sru3qiTo.dpuf
2013, By: Seo Master
Seo Master present to you:
This is a special post about animated label cloud widget. This widget works in all blogger templates. It is very easy to install in Blogger. Just follow this post if you want to get this widget.



To add this widget to your blog, Log in to Blogger

Go to Layout -> Add a Gadget -> HTML/JavaScripttype, then add this code to it.


Copy This Code
<div id="w2bFlashContent"><p style="display:none;">Flash Labels 
by <a href="http://www.entertainer001.blogspot.com/">Entertainment</a></p></div>
<script
type="text/javascript">
/*<![CDATA[*/
var w2bFlashLabelSettings =
{
blogurl : "http://www.entertainer001.blogspot.com",

color : "ffffff",
hoverColor :
"f50000",
backgroundColor: "ed0e21",
size : 12,
speed : 100,
width : 250,
height : 250,
transparency :
true
};
/*]]>*/
</script>
<script type="text/javascript"
src="http://bloggerblogwidgets.googlecode.com/svn/trunk/w2b_new_flash_label_cloud.js"></script>




Edit red color with your idea. You must change website url(red color) with your website url.  Save it.


 ..........................................END........................................
2013, By: Seo Master
salam every one, this is a topic from google web master centrale blog:
You're a good webmaster or web developer, and you've done everything you can to keep your site from being hacked and keep your forums and comment sections free of spam. You're now the proud owner of a buzzing web2.0 social community, filling the web with user-generated content, and probably getting lots of visitors from Google and other search engines.

Many of your site's visitors will create user profiles, and some will spend hours posting in forums, joining groups, and getting the sparkles exactly right on the rainbow-and-unicorn image for their BFF's birthday. This is all great.

Others, however, will create accounts and fill their profiles with gibberish, blatherskite and palaver. Even worse, they'll add a sneaky link, a bit of redirecting JavaScript code, or a big fake embedded video that takes your users off to the seediest corners of the web.

Welcome to the world of spam profiles. The social web is growing incredibly quickly and spammers look at every kind of user content on the web as an opportunity for traffic. I've spoken with a number of experienced webmasters who were surprised to find out this was even a problem, so I thought I would talk a little bit about spam profiles and what you might do to find and clean them out of your site.

Why is this important?

Imagine the following scenario:

"Hello there, welcome to our new web2.0 social networking site. Boy, have I got a new friend for you. His name is Mr. BuyMaleEnhancementRingtonesNow, and he'd love for you to check out his profile. He's a NaN-year-old from Pharmadelphia, PA and you can check out his exciting home page at http://example.com/obviousflimflam.


Not interested? Then let me introduce you to my dear friend PrettyGirlsWebCam1234, she says she's an old college friend of yours and has exciting photos and videos you might want to see."


You probably don't want your visitors' first impression of your site to include inappropriate images or bogus business offers. You definitely don't want your users hounded by fake invites to the point where they stop visiting altogether. If your site becomes filled with spammy content and links to bad parts of the web, search engines may lose trust in your otherwise fine site.

Why would anyone create spam profiles?

Spammers create fake profiles for a number of nefarious purposes. Sometimes they're just a way to reach users internally on a social networking site. This is somewhat similar to the way email spam works - the point is to send your users messages or friend invites and trick them into following a link, making a purchase, or downloading malware by sending a fake or low-quality proposition.

Spammers are also using spam profiles as yet another avenue to generate webspam on otherwise good domains. They scour the web for opportunities to get their links, redirects, and malware to users. They use your site because it's no cost to them and they hope to piggyback off your good reputation.

The latter case is becoming more and more common. Some fake profiles are obvious, using popular pharmaceuticals as the profile name, for example; but we've noticed an increase in savvier spammers that try to use real names and realistic data to sneak in their bad links. To make sure their newly-minted gibberish profile shows up in searches they will also generate links on hacked sites, comment spam, and yes, other spam profiles. This results in a lot of bad content on your domain, unwanted incoming links from spam sites, and annoyed users.

Which sites are being abused?

You may be thinking to yourself, "But my site isn't a huge social networking juggernaut; surely I don't need to worry." Unfortunately, we see spam profiles on everything from the largest social networking sites to the smallest forums and bulletin boards. Many popular bulletin boards and content management systems (CMS) such as vBulletin, phpBB, Moodle, Joomla, etc. generate member pages for every user that creates an account. In general CMSs are great because they make it easy for you to deploy content and interactive features to your site, but auto-generated pages can be abused if you're not aware.

For all of you out there who do work for huge social networking juggernauts, your site is a target as well. Spammers want access to your large userbase, hoping that users on social sites will be more trusting of incoming friend requests, leading to larger success rates.

What can you do?

This isn't an easy problem to solve - the bad guys are attacking a wide range of sites and seem to be able to adapt their scripts to get around countermeasures. Google is constantly under attack by spammers trying to create fake accounts and generate spam profiles on our sites, and despite all of our efforts some have managed to slip through. Here are some things you can do to make their lives more difficult and keep your site clean and useful:

  • Make sure you have standard security features in place, including CAPTCHAs, to make it harder for spammers to create accounts en masse. Watch out for unlikely behavior - thousands of new user accounts created from the same IP address, new users sending out thousands of friend requests, etc. There is no simple solution to this problem, but often some simple checks will catch most of the worst spam.
  • Use a blacklist to prevent repetitive spamming attempts. We often see large numbers of fake profiles on one innocent site all linking to the same domain, so once you find one, you should make it simple to remove all of them.
  • Watch out for cross-site scripting (XSS) vulnerabilities and other security holes that allow spammers to inject questionable code onto their profile pages. We've seen techniques such as JavaScript used to redirect users to other sites, iframes that attempt to give users malware, and custom CSS code used to cover over your page with spammy content.
  • Consider nofollowing the links on untrusted user profile pages. This makes your site less attractive to anyone trying to pass PageRank from your site to their spammy site. Spammers seem to go after the low-hanging fruit, so even just nofollowing new profiles with few signals of trustworthiness will go a long way toward mitigating the problem. On the flip side, you could also consider manually or automatically lifting the nofollow attribute on links created by community members that are likely more trustworthy, such as those who have contributed substantive content over time.
  • Consider noindexing profile pages for new, not yet trustworthy users. You may even want to make initial profile pages completely private, especially if the bulk of the content on your site is in blogs, forums, or other types of pages.
  • Add a "report spam" feature to user profiles and friend invitations. Let your users help you solve the problem - they care about your community and are annoyed by spam too.
  • Monitor your site for spammy pages. One of the best tools for this is Google Alerts - set up a site: query along with commercial or adult keywords that you wouldn't expect to see on your site. This is also a great tool to help detect hacked pages. You can also check 'Keywords' data in Webmaster Tools for strange, volatile vocabulary.
  • Watch for spikes in traffic from suspicious queries. It's always great to see the line on your pageviews chart head upward, but pay attention to commercial or adult queries that don't fit your site's content. In cases like this where a spammer has abused your site, that traffic will provide little if any benefit while introducing users to your site as "the place that redirected me to that virus."


Have any other tips to share? Please feel free to comment below. If you have any questions, you can always ask in our Webmaster Help Forum.

this is a topic published in 2013... to get contents for your blog or your forum, just contact me at: devnasser@gmail.com
Powered by Blogger.