Sunday, February 15, 2015

700-603 UCS Invicta for Field Engineers


QUESTION 1
Which type of workload does Iometer that is configured to generate 4 K blocks, 50% read. 50%
write, and 100% random operations represent?

A. Bulk data load of a database table
B. OLTP
C. OLAP multidimensional cube
D. Extract, transform, and load
E. Data warehouse

Answer: B

Explanation:


QUESTION 2
Which technology has had the weakest performance growth since the year 2000?

A. Hard drives
B. Memory
C. Bus
D. Broadband wireless
E. Network
F. Processors

Answer: A

Explanation:


QUESTION 3
Which two systems does Hadoop consists of? (Choose two.)

A. Atlas
B. Map reduce
C. ZFS
D. HDFS
E. A snowflake schema systems engine
F. Astar schema systems engine

Answer: B,D

Explanation:


QUESTION 4
Which settings must be configured on the management interface bond?

A. IP address, subnet mask, MTU,mode,and boot order
B. IP address, subnet mask, MTU, and mode
C. IP address and subnet mask
D. MAC address. IP address, subnet mask, and MTU
E. MAC address, subnet mask,MTU,and mode

Answer: A

Explanation:


QUESTION 5
Which statement about the creation of a new LUN when enabling LUN mirroring is true?

A. The new LUN must be created on a performance node.
B. The new LUN must not reside on the same scaling solution node as the original lun to be
mirrored.
C. The new LUN mustreside on the same scaling solution node as the original LUN to be mirrored.
D. The new LUN must be created on a data reduction node.

Answer: B

Explanation:


Thursday, February 12, 2015

600-503 Designing with Cisco Network Programmability


QUESTION 1
Which two advantages of an overlay network that consists of virtual switches on supervisors
compare with those of physical networks? (Choose two.)

A. Ability to change the logical network topology more easily.
B. Ability to experience higher performance of traffic forwarding.
C. Overlay networks integrate with virtual machines more closely
D. They can support more routing protocols.
E. They are more secure.

Answer: A,C

Explanation:


QUESTION 2
Which two options are challenges to migrate a traditional network to an SDN type of network?
(Choose two.)

A. would cost to replace traditional network devices to new devices
B. would need more operators to run a more complicated network
C. would need operators with more programming skill
D. would need more bandwidth to secure redundant paths
E. would need to remove existing network management tools

Answer: A,C

Explanation:


QUESTION 3
Which statement is an example of a requirement that is not well-formed?

A. The application should provide status messages every 60 seconds.
B. The application user interface must be easy to use.
C. The application must validate that the IP addresses that are input by users are valid IPv4 or
IPv6 addresses.
D. The application must be available for end users between 8am and 8pm EST/EDT, Monday
through Friday.
E. The application should restart within 15 seconds.

Answer: B

Explanation:


QUESTION 4
Which option is a requirement represented in an Agile software development methodology?

A. interviews
B. product functions
C. product requirements document
D. user stories
E. home stenographer

Answer: D

Explanation:


QUESTION 5
Which four components should be considered when gathering business requirements for a
customer project? (Choose four.)

A. alignment to corporate goals
B. compliance regulations
C. development team location
D. commitments to customers
E. supplier capabilities
F. business unit providing the developers

Answer: A,B,D,E

Explanation:



Best Cisco CCNP Training and Cisco 600-503 Certification and more Cisco exams log in to Certkingdom.com

Tuesday, February 10, 2015

300-135 Troubleshooting and Maintaining Cisco IP Networks (TSHOOT)


QUESTION 1
Exhibit:



A network administrator is troubleshooting an EIGRP connection between RouterA, IP address
10.1.2.1, and RouterB, IP address 10.1.2.2. Given the debug output on RouterA, which two
statements are true? (Choose two.)

A. RouterA received a hello packet with mismatched autonomous system numbers.
B. RouterA received a hello packet with mismatched hello timers.
C. RouterA received a hello packet with mismatched authentication parameters.
D. RouterA received a hello packet with mismatched metric-calculation mechanisms.
E. RouterA will form an adjacency with RouterB.
F. RouterA will not form an adjacency with RouterB.

Answer: D,F

Explanation:


QUESTION 2
When troubleshooting an EIGRP connectivity problem, you notice that two connected EIGRP
routers are not becoming EIGRP neighbors. A ping between the two routers was successful. What
is the next thing that should be checked?

A. Verify that the EIGRP hello and hold timers match exactly.
B. Verify that EIGRP broadcast packets are not being dropped between the two routers with the
show ip EIGRP peer command.
C. Verify that EIGRP broadcast packets are not being dropped between the two routers with the
show ip EIGRP traffic command.
D. Verify that EIGRP is enabled for the appropriate networks on the local and neighboring router.

Answer: D

Explanation:


QUESTION 3
Refer to the exhibit.



How would you confirm on R1 that load balancing is actually occurring on the default-network
(0.0.0.0)?

A. Use ping and the show ip route command to confirm the timers for each default network resets
to 0.
B. Load balancing does not occur over default networks; the second route will only be used for
failover.
C. Use an extended ping along with repeated show ip route commands to confirm the gateway of
last resort address toggles back and forth.
D. Use the traceroute command to an address that is not explicitly in the routing table.

Answer: D

Explanation:


QUESTION 4
Which IPsec mode will encrypt a GRE tunnel to provide multiprotocol support and reduced
overhead?

A. 3DES
B. multipoint GRE
C. tunnel
D. transport

Answer: D

Explanation:


QUESTION 5
Which three features are benefits of using GRE tunnels in conjunction with IPsec for building siteto-
site VPNs? (Choose three.)

A. allows dynamic routing over the tunnel
B. supports multi-protocol (non-IP) traffic over the tunnel
C. reduces IPsec headers overhead since tunnel mode is used
D. simplifies the ACL used in the crypto map
E. uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

Answer: A,B,D

Explanation:



Sunday, February 1, 2015

Microsoft tells Windows 10 users to uninstall Office

Office conflicts with one of Patch Tuesday's security updates, manager cautions on Twitter

Microsoft today took the unusual step of telling users running Windows 10's Technical Preview to uninstall Office before applying one of December's security updates.

"We just made a tough call after working through the night that I thought I should share with you," wrote Gabe Aul, the engineering general manager for Microsoft's operating system group, in a four-part Twitter understatement Tuesday.

"We have a security update going out today, and the installer fails on 9879 if Office is installed," Aul continued. "Rather than rolling a new fix (losing several days in the process) we're going to publish it as is. The workaround is painful: uninstall Office, install the hotfix, reinstall Office. Sorry. We're working hard to fix."

Aul's mention of "9879" referred to the latest "build" of the preview; Microsoft issued Build 9879 four weeks ago.

Somewhat later, Aul identified the update as KB3022827, the Knowledge Base identifier displayed in Windows Update on the preview. (Computerworld was unable to find an associated page on Microsoft's support site that matched KB3022827.) He also partly retracted his advice to uninstall Office: "Please try to install KB3022827 before the workaround to uninstall Office first. It will work for many, no harm if not," he tweeted.

Several people chimed in on Aul's Twitter feed to say that they had tried the update before uninstalling Office and had no problems.

According to Microsoft, only one of today's seven security updates was to be applied to Windows 10's preview. That update, pegged as MS14-080, patched 14 vulnerabilities in Internet Explorer (IE) 11, the browser bundled with the OS.

Andrew Storms, vice president of security services at New Context, weighed in on Aul's odd workaround.

"There are always upsides and downsides to being on the bleeding edge," Storms said in an interview conducted via instant messaging. "Users who chose to grab the Windows 10 Technical Preview are now stuck between the proverbial rock and a hard place. Today, Microsoft admitted that some number of their users are plagued with Explorer crashes and what's worse, an update that won't be easy to install. I, like Microsoft, hope that these users are adept enough to figure out the workaround/fix on their own."

As Storms said, Microsoft acknowledged that one in eight users of the preview had been unable to install an earlier fix that was supposed to stop crashes of the operating system's Explorer file manager.

"On a shipping OS, if we hit an issue like this we'd normally pull the update," Aul admitted in talking about the Explorer screw-up. "But since the Windows Insider audience is technical, we decided to leave it up while we work on the fix so that people hitting the Explorer crash can get some relief."

Storms echoed Aul's confidence in Windows 10 users' skills. "Preview users are generally the most willing to nuke and repave their systems," Storms said.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, January 22, 2015

Changes to Patch Tuesday underscore bigger shakeup in Microsoft security

Some see bad signs in Microsoft's changes to its security reporting processes.

Microsoft has made a change in its Patch Tuesday reporting, along with changing the name of the initiative, and some people see it as a sign that things are getting shaky within the company.

For the first time since it initiated Patch Tuesday, Microsoft did not issue a widespread alert on the Thursday prior to the monthly fixes. Normally, Microsoft issues an email alert through its Advanced Notification Service, or ANS, on the content of Patch Tuesday, which takes place on the second Tuesday of every month. The ANS warning said which Microsoft products would be impacted and how severe the bugs were. It cautiously omitted key details to keep from tipping off malicious hackers as to where to look for the bugs.

However, this month Microsoft put the alerts and information to customers who pay for premium support. "Moving forward, we will provide ANS information directly to Premier customers and current organizations involved in our security programs, and will no longer make this information broadly available through a blog post and Web page," Chris Betz, senior director at the Microsoft Security Response Center (MSRC) wrote in a blog post.

Betz explained that Microsoft was dropping the public ANS notifications because customers weren't using them.

"Customer feedback indicates that many of our large customers no longer use ANS in the same way they did in the past due to optimized testing and deployment methodologies," he wrote. "While some customers still rely on ANS, the vast majority wait for Update Tuesday, or take no action, allowing updates to occur automatically."

As his quote shows, Microsoft now refers to its monthly bug fixes as "Update Tuesday." Apparently it didn't like the term "Patch Tuesday," even if it was accurate.

When I asked for a comment, a Microsoft spokesperson stuck to the statement made by Betz. "We understand why some question this change after more than a decade. The feedback we've received indicates that many of our customers no longer use ANS in the same way they did in the past, due to optimized testing and deployment methodologies," the company said.

To be honest, they have a point. I never read the Thursday notices, either. The fixes always showed up on the second Tuesday right on time, and Microsoft hasn't changed anything about that except the name.

But with other events, it does show that security in general seems to be undergoing a real shakeup at Microsoft. The company shut down its Trustworthy Computing group last September, and in December it had to withdraw two Patch Tuesday fixes because they caused more harm than good.

Some people are pretty upset with this, as was documented in a story over on Computerworld. The folks I spoke with weren't as judgmental.

"Indeed this situation is weird, but maybe it is just that they are trying to include a last-minute patch and do not want to say anything until they know for sure if it is going to be included," Luis Corrons, technical director of PandaLabs, says.

Chris Goettl, product manager with Shavlik, says, "I do not like the move to be sure. It will cut a lot of lead time for companies who care about what is coming and want to plan well for it...I have long been a proponent for the standard of disclosure that Microsoft had set. I have openly criticized vendors who do not disclose enough information to stress the importance of what they are updating. Others, like Adobe and Oracle, had started adopting many of the same practices of predictable release schedules, some advanced warnings or notifications, etc. Will this change send a message back to other late adopters of this mentality?"

Adam Kujawa, head of malware intelligence for Malwarebytes Labs, saw both sides of the issue. Google has been publicly disclosing vulnerabilities, including those in Windows, which Microsoft has slammed.

"The vulnerability disclosure and vulnerability patching processes are very broken at this point...The arguments from Microsoft's side and from Google's side are both valid. Google wants Microsoft to fix the bug so bad guys can't use it. Microsoft wants to fix the bug too but also wants to make sure that it's done in a fashion that protects their users. Either way, the threat approach doesn't do much but force software developers to release quick fixes that could potentially harm systems in the future, and when the demands of the identifier are not met, releasing the knowledge to the public means that the bad guys will be employing it that much sooner," he said.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, November 18, 2014

How to set up 802.1X client settings in Windows

802.1X provides security for wired and Wi-Fi networks

Understanding all the 802.1X client settings in Windows can certainly help during deployment and support of an 802.1X network. This is especially true when manual configuration of the settings is required, such as in a domain environment or when fine-tuning wireless roaming for latency-sensitive clients and applications, like VoIP and video.

An understanding of the client settings can certainly be beneficial for simple environments as well, where no manual configuration is required before users can login. You still may want to enable additive security measures and fine-tune other settings.

Though the exact network and 802.1X settings and interfaces vary across the different versions of Windows, most are quite similar between Windows Vista and Windows 8.1. In this article, we show and discuss those in Windows 7.

+ ALSO ON NETWORK WORLD: WHAT IS 802.1X +
Protected EAP (PEAP) Properties

Let’s start with the basic settings for Protected EAP (PEAP), the most popular 802.1X authentication method.
111714 network connection dialog

On a Network Connection’s Properties dialog window you can access the basic PEAP settings by clicking the Settings button.

Next, you move through the settings on this PEAP Properties dialog window.

Validate server certificate: When enabled, Windows will try to ensure the authentication server that the client uses is legitimate before passing on its login credentials. This server certificate validation tries to prevent man-in-the-middle attacks, where someone sets up a fake network and authentication server so they can capture your login credentials.

By default, server certificate validation is turned on and we certainly recommend keeping it enabled, but temporarily disabling it can help troubleshoot client connectivity issues.

Connect to these servers: When server certificate validation is used, here you can optionally define the server name that should match the one identified on the server’s certificate. If matching, the authentication process proceeds, otherwise it doesn’t.

Typically, Windows will automatically populate this field based upon the server certificate used and trusted the first time a user connects.

Trusted Root Certification Authorities: This is the list of certification authority (CA) certificates installed on the machine. You select which CA the server’s certificate was issued by, and authentication proceeds if it matches.

Typically, Windows will also automatically choose the CA used by the server certificate the first time a user connects.

Do not prompt user to authorize new servers or trusted certification authorities: This optional feature will automatically deny authentication to servers that don’t match the defined server name and chosen CA certificate. When this is disabled, users would be asked if they’d like to trust the new server certificate instead, which they likely won’t understand.

We recommend this additive security as well. It can help users from unknowingly connecting to a fake network and authentication server, falling victim to a man-in-the-middle attack. Unlike the two previous settings, you must manually enable this one.

The next setting is where you choose the tunneled authentication method used by PEAP. Since Secured password (EAP-MSCHAP v2) is the most popular, we’ll go through it. Clicking the Configure button shows one setting for EAP-MSCHAP v2: Automatically use my Windows logon name and password (and domain if any).
111714 geier eap mschap

This is the dialog box you see after clicking the Configure button for the EAP-MSCHAP v2 authentication method.

This should only be enabled if your Windows login credentials match those in the authentication server, for instance if the server is connected to Active Directory. After connecting to an 802.1X network for the first time, Windows should automatically set this appropriately.

Back on the PEAP Properties dialog window, under the authentication method, are four more settings:

Enable Fast Reconnect: Fast Reconnect, also referred to as EAP Session Resumption, caches the TLS session from the initial connection and uses it to simplify and shorten the TLS handshake process for re-authentication attempts. Since it helps prevent clients roaming between access points from having to do full authentication, it reduces overhead on the network and improves roaming of sensitive applications.

Fast Reconnect is usually enabled by default when a client connects to an 802.1X network that supports it, but if you push network settings to clients you may want to ensure Fast Reconnect is enabled.

Enforce Network Access Protection: When enabled, this forces the client to comply with the Network Access Protection (NAP) policies of a NAP server setup on the network. For instance, NAP can restrict connections of clients that don’t have antivirus, a firewall, the latest updates, or other health related vulnerabilities.

Disconnect if server does not present cryptobinding TLV: When manually enabled, this requires the server use cryptobinding Type-Length-Value (TLV), otherwise the client won’t proceed with authentication. For RADIUS servers that support cryptobinding TLV, it increases the security of the TLS tunnel in PEAP by combining the inner method and the outer method authentications so that attackers cannot perform man-in-the-middle attacks.

Enable Identify Privacy: When using tunneled EAP authentication (like PEAP), the username (identity) of the client is sent twice to the authentication server. First, it’s sent unencrypted, called the outer identity, and then inside an encrypted tunnel, called the inner identity. In most cases, you don’t have to use the real username on the outer identity, which prevents any eavesdroppers from discovering it. However, depending upon your authentication server you may have to include the correct domain or realm.

This setting is disabled by default and I recommend manually enabling it. After enabling identify privacy, you can type whatever you want as the username, such as “anonymous”. Alternatively, if the domain or realm is required: “anonymous@domain.com”.
Advanced 802.1X Settings

On a Network Connection’s Properties dialog window you can access advanced settings by clicking the Advanced Settings button.
111714 geier advanced 8021x

The first tab is the advanced 802.1X settings.
On the 802.1X Settings tab, you can specify the authentication mode: User, Computer, User or Computer, or Guest authentication.

User authentication will use only the credentials provided by the user, while Computer authentication uses only the computer’s credentials. Guest authentication allows connections to the network that are regulated by the restrictions and permissions set for the Guest user account.

Using the combined User or Computer authentication option allows the computer to log into the network before a user logs into Windows and then also enables the user to login with their own credentials afterward. This enables, for instance, the ability to use 802.1X within a domain environment, as the computer can connect to the network and domain controller before a user actually logs into Windows.

When User only authentication is used, you can click the Save Credentials button to input the username and password. Additionally, you can remove saved credentials by marking the Delete credentials for all users checkbox.

The second section of the 802.1X Settings tab is where you can enable and configure Single Sign On functionality. If the system and network are set up properly, using this feature eliminates the need to provide separate login credentials for Windows and 802.1X. Instead of having to input a username and password during the 802.1X authentication, it uses the Windows account credentials. Single sign-on (SSO) features save time for both users and administrators and help to create an overall more secure network.

Advanced 802.11 Settings

On the Advanced Settings dialog box you’ll see an 802.11 settings tab if WPA2 security is used. First are the Fast Roaming settings:
111714 geier advanced 80211

The second tab on the Advanced Settings window is the advanced 802.1X settings.
Enable Pairwise Master Key (PMK) Caching: This allows clients to perform a partial authentication process when roaming back to the access point the client had originally performed the full authentication on. This is typically enabled by default in Windows, with a default expiration time of 720 minutes (12 hours).

This network uses pre-authentication: When both the client and access points supports pre-authentication, you can manually enable this setting so the client doesn’t have to perform a full 802.1X authentication process when connecting or roaming to new access points on the network. This can help make the roaming process even more seamless, useful for sensitive clients and traffic, such as voice and video. Once a client authenticates via one access point, the authentication details are conveyed to the other access points. Basically it's like doing PMK caching with all access points on the network after connecting to just one.

Enable Federal Information Processing Standard (FIPS) compliance for this network: When manually enabled, the AES encryption will be performed in a FIPS 140-2 certified mode, which is a government computer security standard. It would make Windows 7 perform the AES encryption in software, rather than relying on the wireless network adapter.

Thursday, November 6, 2014

Apple mobile devices in China targeted by WireLurker malware

Researchers at Palo Alto Networks said they've discovered an impressive malware attack against Apple devices, which for now appears to be limited to users of a Chinese application store.

The campaign revolves around infecting Mac OS X applications with "WireLurker," which collects call logs, phone book contacts and other sensitive information on Apple mobile devices.

MORE: Apple iOS, OS X universe reacts to WireLurker malware threat

Some 467 Mac OS X applications offered on a Chinese third-party application store called Maiyadi were found to have been seeded with WireLurker, including "The Sims 3," "International Snooker 2012" and "Pro Evolution Soccer 2014," according to Palo Alto's research paper.

Over the last six months, those applications and others have been downloaded 356,104 times "and may have impacted hundreds of thousands of users," the paper said.

Apple advises that users stick to downloading applications from its App Store, which it closely vets, and stay away from third-party stores for security reasons.

It would appear some people turn to the Maiyadi store because it offers applications for free, said Ryan Olson, intelligence director for Palo Alto Network's Unit 42, the company's threat intelligence branch.

Palo Alto analyzed three versions of WireLurker, each of which were improvements on the previous one, Olson said in a phone interview Wednesday. But it doesn't appear the WireLurker attack progressed beyond collecting data from mobile devices.

"We think we sort of caught someone developing the attack, and they haven't gotten to the point of launching the full attack," Olson said. "From our perspective, it still looks like an information gathering operation."

The WireLurker attack is notable for how it leverages desktop Mac applications as part of the attack on iOS. If someone downloaded a Mac OS X desktop application from Maiyadi, WireLurker came along with it.

WireLurker then waits for when an iOS device is connected by a USB cable. A second version of WireLurker checks if the Apple device was "jailbroken," the term for removing restrictions that Apple uses to prevent users from running applications it has not approved.

Then it would look to see if applications such as Taobao, Alipay or Meitu, a photo editing application, were installed, Olson said. If so, it would copy the application to the desktop Mac, infect it with WireLurker and copy it back to the device.

The third iteration of WireLurker targets iOS devices that are not jailbroken as well. In that version, WireLurker used a digital certificate that Apple issues to enterprise developers so they can run their own applications in-house that do not appear on the App Store.

Using the digital certificate means iOS would allow a third-party application to be installed, although it would display a warning to users, Olson said. If a user approves the installation, WireLurker could be installed along with a legitimate application.

Olson said Palo Alto Networks has been in contact with Apple in the last few days, which is now aware of WireLurker.

"There's no vulnerability here for them to patch, but they certainly want to be aware of malware and how it works," Olson said.

Apple could first revoke the enterprise digital certificate that WireLurker's creators are using, Olson said. The company could also issue an update to detect WireLurker in XProtect, Apple's antivirus engine, he said.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com