The two programs can be used to accomplish terminal emulation for configuring a router from a PC. The first program is known as Syntax Processor and the second is known as Shell Commands. Both programs take input from the user and produce output. The first program can be used to input the desired settings for the router and the second program can be used to produce output that will be used to configure the router.
plugging it and unplugging it. spilling water on it, humidity, high usage constantly, operating at extreme temps. the usual computer problems
I passed the 640-802 test last year. I've read the relevant books for about two weeks and have done some practice exams for the last three days, it's very important and useful for me. If you have no enough time you can try some real exams online. It might be very useful for you.
How do you break password of CISCO router?
Follow these steps in order to recover your password:
Attach a terminal or PC with terminal emulation to the console port of the router.
Use these terminal settings:
9600 baud rate
No parity
8 data bits
1 stop bit
No flow control
Refer to these documents for information on how to cable and connect a terminal to the console port or the AUX port:
Cabling Guide for Console and AUX Ports
Connecting a Terminal to the Console Port on Catalyst Switches
Connect a Terminal to Catalyst 2948G-L3, 4908G-L3, and 4840G Series Switches
If you can access the router, type show version at the prompt, and record the configuration register setting. See Example of Password Recovery Procedure in order to view the output of a show version command
Note: The configuration register is usually set to 0x2102 or 0x102. If you can no longer access the router (because of a lost login or TACACS password), you can safely assume that your configuration register is set to 0x2102.
Use the power switch in order to turn off the router, and then turn the router back on.
Important Notes:
In order to simulate this step on a Cisco 6400, pull out and then plug in the Node Route Processor (NRP) or Node Switch Processor (NSP) card.
In order to simulate this step on a Cisco 6x00 with NI-2, pull out and then plug in the NI-2 card.
Press Break on the terminal keyboard within 60 seconds of power up in order to put the router into ROMMON.
If the break sequence does not work, refer to Standard Break Key Sequence Combinations During Password Recovery for other key combinations.
Type confreg 0x2142 at the rommon 1> prompt in order to boot from Flash.
This step bypasses the startup configuration where the passwords are stored.
Type reset at the rommon 2> prompt.
The router reboots, but ignores the saved configuration.
Type no after each setup question, or press Ctrl-Cin order to skip the initial setup procedure.
Type enable at the Router> prompt.
You are in enable mode and should see the Router# prompt.
Type configure memory or copy startup-config running-config in order to copy the nonvolatile RAM (NVRAM) into memory.
Important: Do not type copy running-config startup-config or write. These commands erase your startup configuration.
Type show running-config.
The show running-config command shows the configuration of the router. In this configuration, the shutdown command appears under all interfaces, which indicates all interfaces are currently shut down. In addition, the passwords (enable password, enable secret, vty, console passwords) are in either an encrypted or unencrypted format. You can reuse unencrypted passwords. You must change encrypted passwords to a new password.
Type configure terminal.
The hostname(config)# prompt appears.
Type enable secret <password> in order to change the enable secret password. For example:
hostname(config)#enable secret ciscoIssue the no shutdown command on every interface that you use.
If you issue a show ip interface brief command, every interface that you want to use should display up up.
Type config-register <configuration_register_setting>. Where configuration_register_setting is either the value you recorded in step 2 or 0x2102 . For example:
hostname(config)#config-register 0x2102Press Ctrl-z or end in order to leave the configuration mode.
The hostname# prompt appears.
Type write memory or copy running-config startup-config in order to commit the changes.
What is accomplished by the command copy tftp running-config?
This command will allow you to copy a configuration from a TFTP server to the running configuration of a Cisco device.
When you issue the command you will be prompted for further details about the TFTP server.
The new configuration will replace the active one (or running configuration) and make any necessary changes.
What is the difference between Link state routing and distance vector routing through examples?
In a distance vector routing protocol, such as RIP or EIGRP, each router sends its routing table to neighboring routers. The routers don't know the topology, i.e., how other routers are interconnected.
In a link state routing protocol, such as OSPF or IS-IS, routers first exchange information about connections within the network (or an area of the network), and build a topology table. Then each router uses Dijkstra's algorithm to calculate the best route to each destination.
What is a primary function of the trailer information added by the data link layer encapsulation?
to represent the frames sequence number
I believe this is wrong in the 5th edition....Network+ Guide to Networks on page57 it states that protocols in the data link layer add a header to the front of each packet and a trailer to the end of each packet to make frames. (The trailer indicates where a frame ends.)
paragraph 4
Switches and Bridges
Where can one sell used Cisco equipment?
To order Cisco gear you have four options:
You can find more details by visiting Cisco's website.
How do you reset Cisco router password?
Power on the router and press the reset switch for 30 second which is located bottom of the router, after restart the router and it will asked u to give the user name and password for use. By default the user name : Admin & the password : Admin.
Who was the creator of the cisco?
The founders or Cisco Systems Inc were Len Bosack, Sandy Lerner, and Richard Troiano.
A rational number is any number that can be made by dividing oneinteger by another.0.5 is a rational number as it can be made by dividing the number 1by the number 22 is a rational number because it can be made by dividing 2 by 1-6.6 is a rational number because it can be made by dividing -66 by10---------------------------------------------------------Note there are number that are called irrational numbers.Irrational numbers are all "real" numbers (numbers with a decimalpoint) that cannot be written as a simple fraction - the decimalgoes on forever without repeating.For instance the number Pi is an irrational number.A rational number is a real number that can be expressed as a ratio of two integers. Another way to think about it is this: if you can write a number as a fraction then it's a rational number.
Difference between segmentation and fragmentation?
As for Segmentation in Computer Architecture logic, it's a meaningful unit of information eg procedures, large data structures etc. In segmentation every segment is in its own logical memory. # it has higher hit ratio # meaningful protection of segments # simplified sharing of code via dynamic linking # dynamic data structures OR Segmentation is one of the most common ways to achieve memory-protection; another common one is paging. Segmentation means that a part or parts of the memory will be sealed off from the currently running process computing, through the use of hardware-register. If the data that is about to be read or written to be outside the permitted address-space of that process, a segmentation-fault will result. Segmentation is a memory-management scheme that supports this user view of memory. A logical address space is actually a collection of segments. Each segment has a name and a length. The address specifies both the segment name and the offset within the segment. The user therefore specifies each address by 2 parameter: a segment name and an offset.
Which OSI layer uses a connection-oriented protocol to ensure reliable delivery of data?
transport layer
RFC 1918 is Address Allocation for Private Internets The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private internets: 10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix) We will refer to the first block as "24-bit block", the second as "20-bit block", and to the third as "16-bit" block. Note that (in pre-CIDR notation) the first block is nothing but a single class A network number, while the second block is a set of 16 contiguous class B network numbers, and third block is a set of 256 contiguous class C network numbers.
What are the main functions of each layer of OSI model?
layer 7- Application layer layer 6- Presentation layer layer 5- Session layer layer 4-Transport layer layer 3-Network layer layer 2- Data Link layer layer 1- Physical layer
What is the ticker symbol for Citrix Systems Incorporated?
The ticker symbol for Citigroup is C and it is traded on the New York Stock Exchange. Citicorp became Citigroup in 1998 when they merged with Traveler's Insurance which has since been split off. Citibank is a subsidiary of Citigroup.
What is rollover cable for on Cisco router?
A rollover cable is used in a networking environment where a router/switch is to be configured from a computer. One end is wired one way but on the other it is reversed. You would typically use one end into a serial port on a PC and the other into the console port of the switch/router. It is common within cisco configurations.
Hope I helped
What are three main safety features of an F1 car?
Formula One racing is considered one of the most dangerous sports for drivers because of the high speeds and challenging courses. Many of the rules in Formula One racing are designed with driver safety in mind and constructors are always looking at new design features to enhance driver safety. Formula One racing rules require that a driver must be able to get out of the racecar quickly. The exit must be accomplished in less than five seconds with the removal of nothing more than the steering wheel. According to FIA rules the steering wheel must also be able to be re-installed within five seconds to allow for quick removal of a car from the track to insure the safety of other Formula One racing drivers. The cockpit area of a Formula One racing car is referred to as the survival cell. In Formula One racing, the survival cell is equipped with a rollover protection hoop as well as front and rear crash protection features. Recent changes have focused on making side walls taller and stronger to protect the driver's head from flying debris. Formula One racing cars are put through crash tests to determine their ability to safely protect the driver. Although fires are rare in Formula One racing today, fire safety precautions are still an important part of driver safety. The clothing worn by race drivers are made from fireproof materials designed to protect the driver in case of fire until it can be extinguished. Design of the clothing must also take into account the extreme conditions that Formula One racing drivers face during a race. During a race drivers must endure extremely high temperatures inside the care and must wear items that allow sweat to escape to avoid overheating. Specially designed fabric that meets both the fireproof and wear-ability factors is used for everything, including the thread and sponsor patches on the uniform as well as the underwear worn by the driver. The shoulders on overalls worn by Formula One racing drivers have to large safety handles. Because FIA rules require that a driver be removed quickly from his car while strapped into the seat they are held in place with only two standardized bolts that can be removed with a tool carried by every rescue team. The long and strong straps make it possible to remove both driver and seat together. Helmets play a key role in Formula One racing safety. It is important that helmets be as lightweight as possible since added weight increases the severity of whiplash during a crash. Today's Formula One racing helmets weigh just under three pounds. The helmet is comprised of layers made of carbon fiber, a plastic like that used in bulletproof vests, a softer plastic and a covering of flameproof material. Visors are composed of a polycarbonate. The leading causes of death in auto racing accidents are skull and neck fractures resulting from rapid deceleration during accidents. The Head and Neck Support system (HANS) was designed to reduce these whiplash effects. The system consists of a collar that is attached to the safety belt and strapped to the helmet to hold the helmet in place during an accident. HANS usage became mandatory in Formula One racing in 2003. Injuries and accidents are unavoidable. Formula One racing sets high standards for medical care at each Grand Prix. Trained medical and extraction teams are in place at each race, each circuit has a fully equipped medical center and local hospitals are on standby during races. * http://www.carsaddiction.info/formula-one/security-first-drivers-safety-in-f-1.html
Seat belts. Air bags. Sexy person ;)
Why would one choose to use a Cisco VPN?
A Cisco VPN is a Virtual Private Network and used to extend a private network over a wider public network. One might use such a network from Cisco to access a private network from a remote location.