Sunday, 22 February 2015

7 critical things to cover in your disaster-recovery plan

As always, you never know when a disaster will strike, so better to have a checklist on hand so that panic doesn’t set in when the network goes down.

1. Creating a plan
Cloud services company Evolve IP has created a list of suggestions for executives to evaluate their current disaster avoidance plans or, should a plan not exist, provide directional measures to protect their information and communications systems.

2. Establish a disaster recovery functional team
Elect one spokesperson from the group for communication. In the event of a multi-location organization each location should have a core team or representative that works with the corporate entity.

3. Risk assessment
Identify risks in the following areas:

Information – What information and information systems are most vital to continue to run the business at an acceptable level?

Communication Infrastructure – What communications (email, toll free lines, call centers, VPNs, Terminal Services) are most vital to continue to run the business at an acceptable level?

Access and Authorization – Who needs to access the above systems and in what secure manner (VPN, SSL, DR Site) in the event of a disaster?

Physical Work Environment – What is necessary to conduct business in an emergency should the affected location not be available?

Internal and External Communication – Who do we need to contact in the event of an emergency and with what information?

4. Cloud-based data centers and applications
Create a written recovery plan that is hosted remotely in a secure and redundant data center. Schedule and test your plan at least once per year or in accordance with regulatory/compliance requirements. Ensure employees can access the hosted environment (both from within the business confines and remotely) during fail-over mode from the designated locations.

5. Premise-based data centers
Produce a written recovery plan that is stored remotely. Identify water entry areas throughout the building and have sandbags available. Install VESDA smoke detection and thermal detectors. Have a fail-safe alarm system. Place high-temperature sensors on fire sprinkler heads if non-water based fire-suppression is unavailable. Keep your data center above street level. If you are in a single-floor building, raise your racks from the floor. Employ multiple Internet service/data providers and test for failover regularly.

6. Data back-up
Tape back-ups should be removed daily and stored in a secure, easily accessed public building with at least 2-3 individuals having keys to the location. Back-up data to a geographically distant location, either electronically, or ensure physical media is in a diverse location.

7. Hosted telephony systems
Employ multiple Internet providers and test for failover regularly. Verify that critical phone numbers have the ability to call forward in an unreachable condition.

8. Call center
Identify key business applications required and how call center staff will access these applications from alternative locations. Identify critical call types that must be answered and determine mechanism to segregate those calls. Identify alternative locations to house the staff with the appropriate systems, phones, and work environment. Ensure administrative staff has the ability to remotely change call routing, messaging, and related call center functionality.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Friday, 20 February 2015

600-501 Integrating Business Applications with Network Programmability (NPIBA)


QUESTION 1
Which option best describes explicit routing?

A. MPLS Traffic Engineering
B. destination-based routing
C. link-state routing
D. Shortest Path First
E. static routes

Answer: A

Explanation:


QUESTION 2
What is the purpose of Address Resolution Protocol in an IP data network?

A. Given a known MAC address, Address Resolution Protocol discovers the relevant IP address.
B. Given a known IP address, Address Resolution Protocol discovers the relevant MAC address.
C. Given a known URL, Address Resolution Protocol discovers the relevant IP address.
D. Given a known IP address, Address Resolution Protocol discovers the relevant URL.

Answer: B

Explanation:


QUESTION 3
Which factor limits the maximum number of IEEE 802.1Q VLANs to 4096?

A. the length of the VLAN ID field of the 802.1Q frame
B. the length of the Tag Protocol ID field of the 802.1Q frame
C. the size of the TCAM memory of the Layer 2 switch
D. the size of the VLAN table of the Layer 2 switch

Answer: A

Explanation:


QUESTION 4
Refer to the exhibit.



What is the correct way to summarize these different routes into a single route?

A. 10.0.0.0/8
B. 10.10.0.0/16
C. 10.10.0.0/22
D. 10.10.3.0/22
E. 10.10.1.0/22

Answer: C

Explanation:


QUESTION 5
What is the default administrative distance for a static route?

A. 0
B. 255
C. 1
D. 110
E. 254

Answer: C

Explanation:


Wednesday, 11 February 2015

98-366 Networking Fundamentals


QUESTION 1
You are employed as a network designer at ABC.com.
A ABC.com client has requested a network setup for his home office. The network has to be cost
effective, and easy to extend and implement. Furthermore, the client wants his workstations
connected by a single cable.
Which of the following network topologies should you use?

A. A star network topology.
B. A bus network topology.
C. A mesh network topology.
D. A ring network topology.

Answer: B


QUESTION 2
You are employed as a network designer at ABC.com.
You have recently designed a home office network for ABC.com that includes a switch.
Which of the following are TRUE with regards to network switches? (Choose all that apply.)

A. It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for
a particular address only to the port to which it is attached.
B. It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a
particular address only to the port to which it is attached.
C. It operates at the Physical layer of the OSI model.
D. It operates at the Data-Link layer of the OSI model.

Answer: A,D


QUESTION 3
You are employed as a network administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
As part of a training exercise, you have been asked to identify the layer that allows applications
and a number of user functions access to the network.
Which of the following options represents your response?

A. The document layer.
B. The application layer.
C. The system layer.
D. The Data-link layer.

Answer: B

Explanation:


QUESTION 4
You are employed as a network administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
You have been tasked with making sure that ABC.com’s network includes a server that converts
NetBIOS names to IP addresses.
Which of the following actions should you take?

A. You should consider adding a DHCP server to the ABC.com network.
B. You should consider adding a DNS server to the ABC.com network.
C. You should consider adding a Web server to the ABC.com network.
D. You should consider adding a WINS server to the ABC.com network.

Answer: D


QUESTION 5
You are employed as a network designer at ABC.com.
ABC.com’s network is made up of two network segments, named Subnet A and Subnet B. DHCP
clients are located on Subnet
A. A DHCP server, named ABC-SR07, is located on Subnet B.
You need to make sure that DHCP clients are able to connect to ABC-SR07.
Which of the following actions should you take?

A. You should make sure that the RRAS service is configured.
B. You should make sure that the Web service is configured.
C. You should make sure that the DNS service is configured.
D. You should make sure that the DHCP relay agent service is configured.

Answer: D

Explanation:


Tuesday, 3 February 2015

10 new features expected in Windows 10

Later this week, Microsoft is expected to reveal more details about Windows 10. But why wait for Microsoft’s announcement? Here’s what we think is coming.

New features
Later this week, Microsoft is expected to reveal more details about Windows 10. We’ve already covered some of the major new features that are in the works, such as the return of the classic Start menu UI, resizable Windows apps, the ability to launch separate instances of the desktop environment and the inclusion of Microsoft’s personal digital assistant called Cortana. But why wait for Microsoft’s announcement? Here’s what we think is coming.

PC Settings replaces Control Panel
One of the confusing things about Windows 8 for desktop users is its “PC Settings” screen, because it includes a number of settings that can also be found in the classic Control Panel. In Windows 10, more of the Control Panel settings will probably be replicated under PC Settings.

Battery Saver setting
This setting will automatically take steps to conserve the battery of your notebook or tablet when it hits a certain percentage of remaining power. We wonder if its final version will be more sophisticated than what has shown up in the Windows 10 Technical Preview versions thus far. It would make sense if it looked similar to Windows Phone 8.1’s, which shows through bars and charts the amount of power that each program uses on your device.

Customizable lock screens
Some evidence in the Windows 10 Technical Preview suggests developers may be able to make custom lock screens. This could be similar to the way lock screens can be customized in Windows Phone 8.1.

Touch targeting
Touch targeting could be implemented throughout the Windows 10 UI. The basic idea is that the design will have icons, menus, and gesture functions tuned to be more responsive for touchscreens. The UI would adjust itself automatically based on whether you are using a mouse or a touchscreen.

Continuum
This looks to be a buzzword Microsoft came up with to market Windows 10’s ability to automatically switch between its two UI modes by recognizing if you are using your device as a notebook or tablet. For example, when you attach a keyboard to a tablet, Windows 10 will switch to the desktop environment. When you remove the keyboard, the OS returns to the tile-based Modern UI.

Updated File Explorer
It’s been hinted that the Windows file manager will get an update. Most likely, the new File Explorer will incorporate touch targeting to make it more accessible for touchscreens, but we’d like to see some new functionality that would benefit its desktop OS use, too: How about allowing for multiple instances of File Explorer to be opened as tabs within the program?

New security measures
There are going to be stronger security options, including two-factor authentication where you can use a device, like a smartphone, to authorize signing into your Windows 10 user account. Also, user access tokens could be stored in a secure "container" to protect them from exposure to hackers. Other measures are aimed at the business environment: users' personal and work files kept separate from one another; and restricting employees from installing programs that haven’t been digitally signed.

New updating methods
Multiple options will give businesses more control over how they want to update their Windows 10 systems: high priority updates that brings bug fixes and security improvements; updates that add new features to Windows 10; and a third option which lets administrators schedule when they want new features to be installed on their Windows 10 systems.

New animations
Besides refreshed icon designs and background wallpaper that you expect to see in any OS release, there will be new animated effects when you interact with Windows 10, such as a window expanding or shrinking when you launch or close an application. A lingering question has been if the classic Aero theme in an updated form, or other such transparency effects, will return.

Spartan
Lastly, one of the biggies is a brand-new web browser. Appropriately named Spartan, it’s speculated that it will take design inspiration from Google’s Chrome, with emphasis on a minimal UI and performance speed. Internet Explorer will still be available in Windows 10 to ensure compatibility with sites and enterprise services that require this browser, but it looks like Microsoft wants to start moving away from IE (and its less-than-stellar reputation) and have a fresh start with the everyday user in the browser market.



Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkillers.com