tag:blogger.com,1999:blog-56552462455413184212024-02-18T17:42:05.250-08:00CCNA Security Jforcejcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.comBlogger42125tag:blogger.com,1999:blog-5655246245541318421.post-81279471207658999002016-07-09T18:32:00.001-07:002016-07-09T18:32:17.641-07:00Daily $140-$150 Dollars | 1000$ IN 1 WEEK | BTC<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
<img alt="10-Easy-ways-to-earn-money-online-by-home-2016-2017" class="alignnone size-full wp-image-40350" data-mce-src="http://bi3.xyz/wp-content/uploads/2016/07/10-Easy-ways-to-earn-money-online-by-home-2016-2017.jpg" height="1500" src="http://bi3.xyz/wp-content/uploads/2016/07/10-Easy-ways-to-earn-money-online-by-home-2016-2017.jpg" style="height: auto; max-width: 100%;" width="2000" /> <img alt="img141" class="alignnone size-full wp-image-40351" data-mce-src="http://bi3.xyz/wp-content/uploads/2016/07/img141.jpg" height="370" src="http://bi3.xyz/wp-content/uploads/2016/07/img141.jpg" style="height: auto; max-width: 100%;" width="600" /></div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
BEFORE STARTING, IF YOU WANT BITCOIN, PLEASE go to <a data-mce-href="https://www.coinbase.com/join/57817277dff5a80bd40001b4?src=bi3" href="https://www.coinbase.com/join/57817277dff5a80bd40001b4?src=bi3"><strong>http://www.coinbase.com</strong></a> and MAKE AN ACCOUNT, with zero BALANCE, even if you have a coinbase account, MAKE, A NEW ONE.</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
If you want PAYPAL, continue with the following:</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
Firstly you’re going to have to create an account on this site:</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
<a data-mce-href="http://referrals.trhou.se/taoussielhoussine" href="http://referrals.trhou.se/taoussielhoussine"><strong>http://programmingknowledge.rf.gd/</strong></a></div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
you’ll be at TREEHOUSE</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
CREATE A FREE TRIAL account at Treehouse and pick PRO, MONTHLY so you can download the files.</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
When it tells you to give your CREDIT CARD, Give your PAYPAL or COINBASE BITCOIN ACCOUNT instead.</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
THEN CLICK SIGN UP</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
Now go to this link</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
<strong>https://teamtreehouse.com/library/how-to-make-a-website/creating-html-content/build-the-footer</strong></div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
and go to DOWNLOADs, and DOWNLOAD PROJECT FILE. You should be able to do this if you picked PRO account at Treehouse, if you didn’t make a new account you have to pick PRO to download the project files<br />Next make an account at:</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
<a data-mce-href="https://perinstallbucks.com/?r=jcreator" href="https://perinstallbucks.com/?r=jcreator"><strong>https://perinstallbucks.com</strong></a></div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
Now create an account and add your PAYAPL / BTC to it.</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
Now there are two things you can do for this:</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
1. EXE BUNDLER</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
From the files you just downloded upload to DropBox or GoogleDrive</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
and then add that link to the EXE BUNDLER on</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
Make a very quick youtube video about “LEARN PROGRAMMING FOR FREE” You can make it or steal a youtube video (like this)</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
<strong>https://www.youtube.com/watch?v=7VDp1HmxBVE</strong></div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
and use “<a data-mce-href="http://www.clipconverter.xyz/" href="http://www.clipconverter.xyz/">http://www.clipconverter.xyz/</a>” to download the youtube video and upload it on your own Youtube account</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
Then Use the download link of perinstallbucks, otherwise the installation will not be counted by the system. in your YOUTUBE DESCIRIPTION</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
2. Search on you YouTube for videos like “Gift Card Generators” or similar videos. Download them</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
<a data-mce-href="http://www.clipconverter.xyz/" href="http://www.clipconverter.xyz/">http://www.clipconverter.xyz/</a></div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
nd edit them a bit. (Use your own intro or something like this) </div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
Go in your perinstallbucks account and click on “Exe bundler”. Enter the name of your software in the first textbox. (for example “GooglePlay GiftCard Generator”)</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
Now, click on “Generate link”. Put the download you’ll get in your YouTube video description.</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
(Use the download link of perinstallbucks, otherwise the installation will not be counted by the system)</div>
<div style="color: #333333; font-family: Georgia, "Times New Roman", "Bitstream Charter", Times, serif; font-size: 16px; line-height: 24px;">
EVERY DOWNLOAD is 1.40 USD that means just as little as 100 downloads on your application will set you to earn $1000 DOLLARS EVERY WEEK</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-88401382530184199212015-12-19T13:19:00.003-08:002015-12-19T13:19:52.657-08:00cpagrip secrets<span style="background-color: white;"><img border="0" class="linked-image" src="http://cpagrip.com/img/logo_big.png" style="border: 0px; font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; margin: 0px; padding: 0px; text-align: -webkit-center; vertical-align: middle;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /></span><br />
<div class="resized-linked-image" style="border: 0px; cursor: pointer; float: none; font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 10px; line-height: 19.2px; margin: 1px 0px 0px; padding: 2px; text-align: -webkit-center; width: 679px;" title="Click to view full image">
<span style="background-color: white;"><img alt="" border="0" src="http://www.moneymakergroup.com/style_images/mmg_2/img-resized.png" style="border: 0px; margin: 0px; vertical-align: middle;" /> Reduced: 44% of original size [ 1545 x 729 ] - Click to view full image</span></div>
<span style="background-color: white;"><img border="0" class="linked-image" id="--ipb-img-resizer-2" src="http://cpagrip.com/img/ss/publisher_dashboard.png" style="border: 0px; font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; margin: 0px; padding: 0px; text-align: -webkit-center; vertical-align: middle;" width="683" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">CPAGrip's sophisticated analytics engine keeps you up to date with the most relevent lead-related information. You're always in the know. You can check on our leading EPC offers or access our world-class support, all through your publisher panel. Of course, we also provide traditional email and IM support which is also accessible via the panel. Make sure you're always in the know as an affiliate! </span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><b style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Benefits:</b><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Industry leading 5% referral commission</span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">On demand Publisher Support</span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Custom Publisher content tools</span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Always on-time payments</span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Home integrated analytics engine</span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">2,000+ Campaigns</span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Instant Acceptance</span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><b style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Content Locker</b><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">CPAGrip's Content locker is an outstanding solution for monetizing web content. Content locking has been a proven model of outperforming other types of advertising models.</span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><b style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Url & File Locker</b><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Our link locker allows you to lock online media so that a user must complete an incentive offer in order to gain access to the said link or file. This type of advertising has a proven track record for monetizing your file sites. Find out what all the fuss is about and learn how to monetize your site with our leading Download Unlocking Technology! </span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /></span><br />
<div class="resized-linked-image" style="border: 0px; float: none; font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 10px; line-height: 19.2px; margin: 1px 0px 0px; padding: 2px; text-align: -webkit-center; width: 679px;" title="Click to view full image">
<span style="background-color: white;"><img alt="" border="0" src="http://www.moneymakergroup.com/style_images/mmg_2/img-resized.png" style="border: 0px; margin: 0px; vertical-align: middle;" /> Reduced: 63% of original size [ 1079 x 593 ] - Click to view full image</span></div>
<span style="background-color: white;"><img border="0" class="linked-image" id="--ipb-img-resizer-4" src="http://miscpix.com/files/2/28811.png" style="border: 0px; font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; margin: 0px; padding: 0px; text-align: -webkit-center; vertical-align: middle;" width="683" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><b style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Video Locker</b><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Video lockling allows you to place an overlay onto a video element on your website. The user can still interact with other site functions, but in order to see the video content, the user must complete an offer in order to access video playback. This is an amazing way to monetize your videos for small content publishers. </span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><b style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Offer Wall</b><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Offer walls allow you to display the correct geotargeted offers to your users generally used with point rewards. This allows you to easily leverage multiple offers and reward your users with virtual currency for each offer completed. </span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><b style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Virtual Currency</b><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Our offer wall and offer feed (xml/csv) platform can be leveraged in combination with our global or multi-postback systems to allow you the flexability to define your own virtual currency and conversion rates, while giving your end users a seamless experience. </span><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><b style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Offers</b></span><br />
<div class="resized-linked-image" style="border: 0px; float: none; font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 10px; line-height: 19.2px; margin: 1px 0px 0px; padding: 2px; text-align: -webkit-center; width: 679px;" title="Click to view full image">
<span style="background-color: white;"><img alt="" border="0" src="http://www.moneymakergroup.com/style_images/mmg_2/img-resized.png" style="border: 0px; margin: 0px; vertical-align: middle;" /> Reduced: 65% of original size [ 1045 x 519 ] - Click to view full image</span></div>
<span style="background-color: white;"><img border="0" class="linked-image" id="--ipb-img-resizer-6" src="http://i.imgur.com/ZvnJ3WQ.png" style="border: 0px; font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; margin: 0px; padding: 0px; text-align: -webkit-center; vertical-align: middle;" width="683" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><img border="0" class="linked-image" src="http://image.offgamers.com/affiliate/200912/signup_button.gif" style="border: 0px; margin: 0px; padding: 0px; vertical-align: middle;" /><a href="https://www.cpagrip.com/admin/panels_register.php?ref=58796" target="_blank">https://www.cpagrip.com/admin/panels_register.php?ref=58796</a><br style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;" /><b style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">Note</b><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;">: If you don't have a website, enter </span><i style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;"><b>none</b></i><span style="font-family: Verdana, Arial, Tahoma, 'Trebuchet MS', sans-serif, Georgia, Courier, 'Times New Roman', serif; font-size: 12px; line-height: 19.2px; text-align: -webkit-center;"> in the website field. Activation is almost instant.</span></span>jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-72332846372518284052015-12-19T02:37:00.002-08:002015-12-19T02:38:42.065-08:00Types of hackers and how hackers are classified<h3 style="color: #424242; font-family: droidsansregularregular; font-size: 20px; line-height: 22px; margin: 5px 0px; text-align: center; text-decoration: underline;">
Types of Hackers</h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCzz7Pz6E8YpfTw87VuopUphdbJE7_uR_fMZlBavaaC-Hy0qK5vD6CSY4sytcxTki-09WW7rZJK3rMX1_31keVamRy31fuvhxs28h9NUzRQyqYXiAPdv01A-7yKgWuOwErlxshoZoBAjKq/s1600/ethical-hacking-Types+of+hackers+and+how+hackers+are+classified.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCzz7Pz6E8YpfTw87VuopUphdbJE7_uR_fMZlBavaaC-Hy0qK5vD6CSY4sytcxTki-09WW7rZJK3rMX1_31keVamRy31fuvhxs28h9NUzRQyqYXiAPdv01A-7yKgWuOwErlxshoZoBAjKq/s320/ethical-hacking-Types+of+hackers+and+how+hackers+are+classified.jpg" width="320" /></a></div>
<div>
<br /></div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
"Hacker" is a loose term and has different meanings. Generally the term "Hacker" is someone who breaks into computer networks for the happiness he gets from the challenge of doint it or with some other intentions like stealing data for money or with political motivations. Hackers are classified to different types. Some of them are listed below.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>White Hat:</strong> A White Hat hacker is a computer network security professional and has non-malicious intent whenever he breaks into security systems. A White Hat hacker has deep knowledge in Computer Networking, Network Protocols and System Administration (at least three or four Operating Systems and very good skills in Scripting and Programming). White Hat hacker has also good knowledge in hacking tools and know how to program hacking tools. </div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
A White Hat hacker has the skills to break into networks but he uses his skills to protect organizations. A White Hat hacker can conduct vulnerability assessments and penetration tests are also known as an Ethical Hacker. Often White Hat hackers are employed by companies and organizations to check the vulnerabilities of their network and make sure that no hole is available in their network for an intruder.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Black Hat:</strong> A Black Hat hacker, also known as a cracker, is a computer professional with deep knowledge in Computer Networking, Network Protocols and System Administration (at least three or four Operating Systems and very good skills in Scripting and Programming). Black Hat hacker has also good knowledge in many hacking tools and know how to program hacking tools. A Black Hat hacker uses his skills for unethical reasons. A Black Hat hacker always has malicious intention for intruding a network. Example: To steal research data from a company, To steal money from credit cards, Hack Email Accounts etc.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Grey Hat:</strong> A Grey Hat hacker is someone who is between White Hat hacker and Black Hat hacker. Grey Hat normally do the hacking without the permissions from the administrators of the network he is hacking. But he will expose the network vulnerabilities to the network admins and offer a fix for the vulnerability for money.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Script Kiddie:</strong> A Script Kiddie is basically a hacker amateur who doesn’t has much knowledge to program tools to breaks into computer networks. He often use downloaded hacking tools from internet written by other hackers/security experts.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Hacktivist:</strong> A Hacktivist is a hacker with political intentions. The hacktivist has the same skills as that of a hacker and uses the same tools as the hacker. The primary intention of an hacktivist is to bring public attention to a political matter.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Phreaker:</strong> Phreaker is a telecom network hacker who hacks a telephone system illegally to make calls without paying for them.</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-9891250267160166362015-11-09T11:57:00.000-08:002015-11-09T11:57:40.652-08:00Network Threats and Countermeasures<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS8WoVf4Vuc6N0fKOETzbvT_rqQXxNTAHX4o4qGgUVXDqYW7CIkC3oGrq9j-K00_nO6zKeVSUqoXTvVai7go3H-siTn2BMq8CtCJQA2ViW31817v_9iSRDBr0SOWL2acEXojNdJlxkyQCi/s1600/Untitled-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="302" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS8WoVf4Vuc6N0fKOETzbvT_rqQXxNTAHX4o4qGgUVXDqYW7CIkC3oGrq9j-K00_nO6zKeVSUqoXTvVai7go3H-siTn2BMq8CtCJQA2ViW31817v_9iSRDBr0SOWL2acEXojNdJlxkyQCi/s640/Untitled-1.png" width="640" /></a></div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<br /></div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<br /></div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
A Threat can be defined as anything which is danger to an organization's Asset. Threats can be physical threat of network based threats. An attacker may exploit poorly configured network infrastructure devices like a firewall, router network servers or switches. Default settings network infrastructure devices, loose access controls, applications and operating system without proper updates etc. are vulnerabilities and can be exploited by an attacker.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
Countermeasure is any action to prevent a threat against a vulnerability. Countermeasures can be of following types.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Administrative Countermeasures:</strong> Security policies, general procedures, accepted safety guidelines etc can be considered as Administrative Countermeasures.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Physical Countermeasures:</strong> Physical security for Server Rooms, Network Infrastructure devices, Data centers, Accident and Fire Prevention, Uninterrupted Power Supply, Video Surveillance etc can be considered as Physical Countermeasures.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Logical Countermeasures:</strong> Proper configuration of network Firewalls, application and operating system password security, IPS (Intrusion Prevention Systems), VPN (Virtual Private Network), etc are examples of Logical Countermeasures .</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-52158647168103550782015-11-09T11:55:00.001-08:002015-11-09T11:55:37.302-08:00Enterprise Risk Management - Key Definitions<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
Business world is ever evolving. Many key business factors are complex in nature and unpredictable. Network Security and Enterprise Risk Management (ERM) are related. If Network Security measures are implemented properly, enterprise risks can be avoided to a large extent.</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
Risk assessment provides a mechanism for identifying which risks represent opportunities and which represent potential pitfalls. Enterprise risk assessments and proper security measures provide more clear view about internal or external business risks.</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
Key technical terms which Network Security administrators must know are 1) Asset, 2) Vulnerability, 3) Exploit, 4) Threat, 5) Attack, 6) Risk and 7) Countermeasures.</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>1) Asset:</strong> Asset is anything which the organization is invested and which is valuable to the organization. Examples: Properties, Vehicles, Heavy Equipments, Plants, Buildings, Employees, Computers, Data, Intellectual Properties etc. Protecting the organization's assets is the prime function of security (physical security or network security).</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>2) Vulnerability:</strong> Vulnerability can be defined as an exploitable weakness in a system or its design. Every system is human created. Chances for errors, mistakes are always there in every human created systems. Vulnerabilities are always there in Applications, Network Protocols, Operating Systems etc. Vulnerability can be exploited by an attacker to gain access to an organization's network.</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>3) Exploit:</strong> An Exploit can be defined as a way, method or tool which is used by an attacker, on a vulnerability, to cause damage to the target network or system. The exploit can be software that may cause a buffer overflow or a method of social engineering to hack a password.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>4) Threat:</strong> Threat can be defined as anything danger to an Asset. Threats can be accidentally triggered or intentionally exploited.</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>5) Attack:</strong> Attack can be defined as action taken by an attacker to harm an asset.</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>6) Risk:</strong> The term "Risk" can be defined as potential for loss, compromise, damage, destruction or other negative consequence of an organization's Asset. Risk arises from a threat, multiple threats, exploiting vulnerability. Risk forms an adverse negative impact on an organization's Asset.</div>
<div align="center" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px;">
Risk = Asset + Threat + Vulnerability</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>7) Countermeasure:</strong> Countermeasure is an action initiated by the organization (typically security professionals) to mitigate a threat.</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-25353803073256812662015-11-02T08:40:00.005-08:002015-12-19T02:40:05.002-08:00Free CCNA Security Tutorials and Study Guides<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvyYb31opAn86E-ysoJux0VV9RKRiJmTTqYnwpiutpG_RM4Y-Z5asu8wkz6hLTtvTa7jTLrhGBylKuB9XUbyVx3HrbBuWqBy3pjNCtngquad3arhe6SzNMu07Z25y3PiQHRJ7ZByBQ2RJh/s1600/clip_image001_0010.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="302" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvyYb31opAn86E-ysoJux0VV9RKRiJmTTqYnwpiutpG_RM4Y-Z5asu8wkz6hLTtvTa7jTLrhGBylKuB9XUbyVx3HrbBuWqBy3pjNCtngquad3arhe6SzNMu07Z25y3PiQHRJ7ZByBQ2RJh/s640/clip_image001_0010.jpg" width="640" /></a></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<br /></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<br /></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<a href="http://ccnase.blogspot.com/2015/11/introduction-to-ccna-security.html" style="color: #333333; line-height: 18px; text-decoration: none;" target="_blank">Lesson 01 - Introduction to CCNA Security</a></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<a href="http://ccnase.blogspot.com/2015/11/what-is-network-security-and-why-we.html" style="color: #333333; line-height: 18px; text-decoration: none;" target="_blank">Lesson 02 - What is Network Security and why we need Network Security</a></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<a href="http://www.jforce.xyz/2015/11/primary-goals-of-network-security.html" target="_blank">Lesson 03 - Primary Goals of Network Security</a> </div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
Lesson 04 - <a href="http://www.jforce.xyz/2015/11/enterprise-risk-management-key.html" target="_blank">Enterprise Risk Management - Key Definitions</a></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 05 - <a href="http://www.jforce.xyz/2015/11/network-threats-and-countermeasures.html" target="_blank">Network Threats and Countermeasures</a> **</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 06 - <a href="http://www.jforce.xyz/2015/12/types-of-hackers-and-how-hackers-are.html" target="_blank">Types of Hackers and how hackers are classified</a></span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 07 - Types of Network Attacks against Confidentiality, Integrity and Avilability</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 08 - Different Classes of Network attacks and how to defend them</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 09 - How Hackers attack networks and a Hacker's mindset</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 10 - How to provide better security to your enterprise network</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 11 - Disaster Recovery Business Continuity Plan</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 12 - Types of Backup - Full backup, Incremental backup, Differential backup and Copy backup</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 13 - Types of Backup Sites - Hot Site, Warm Site, Cold Site</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 14 - Business Data Classification</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 15 - Organizational Policies, Procedures, Standards and Guidelines</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 16 - Testing Enterprise Security</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 17 - Cisco Network Foundation Protection (NFP) Framework - Management plane, Control plane and Data plane</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 18 - Management Plane Protection - Cisco NFP (Network Foundation Protection)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 19 - Control Plane Protection - Cisco NFP (Network Foundation Protection)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 20 - Data Plane Protection - Cisco NFP (Network Foundation Protection)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 21 - How to configure Cisco Router/Switch to enable SSH (Secure Shell) and How to connect Cisco Router/Switch using SSH (Secure Shell)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 22 - How to install Cisco CCP and how to configure Cisco router for CCP</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 23 - How to install Cisco SDM and how to configure Cisco router for SDM</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 24 - Cisco Router/Switch Common Security Vulnerabilities and Router/Switch Hardening</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 25 - Security Audit and One-step lockdown using CCP</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 26 - Cisco IOS CLI Shell Pivilege levels, user EXEC mode and privilege EXEC modes</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 27 - How to configure multiple Privilege Levels Cisco IOS CLI Shell</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 28 - Strong Passwords and Password Encryption to protect Management Plane</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 28 - AAA Authentication Authorization and Accounting</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 30 - AAA RADIUS and TACACS+, Difference between RADIUS and TACACS+</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 31 - Cisco ACS Secure Access Control System Products</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 32 - How to install Cisco ACS (Secure Access Control Server ) 5.4 on VMware Workstation</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 33 - How to connect manage and configure Cisco ACS using web browser</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 34 - How to create and add an internal user in Cisco ACS</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 35 - How to create and add AAA clients (Network devices like Routers and Switches) in Cisco ACS</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 36 - What are AAA Method Lists and IOS commands for creating AAA Method Lists in Cisco Router or Switch</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 37 - Cisco Router/Switch AAA Login Authentication configuration using TACACS+ and RADIUS Protocols through IOS Commands</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 38 - Cisco Router/Switch AAA Login Authentication configuration using TACACS+ and RADIUS Protocols through CCP (Cisco Configuration Professional)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 39 - Cisco Secure ACS Shell Profiles and Command sets, How to configure Shell Profiles and Command sets in ACS</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 40 - How to configure Cisco Routers and Switches with AAA Authorization and Accouting using TACACS+ protocol through IOS Commands</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 41 - Troubleshooting AAA using Debug Commands</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 42 - Parser Views - Role Based Access Control (RBAC)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 43 - Introduction to Syslog in Cisco Routers and Switches</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 44 - How to install and configure Kiwi Syslog Server for Cisco Routers and Swiches</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 45 - How to use CCP to view Syslog messages stored in Cisco Router/Switch Memory</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 46 - What is SNMP (Simple Network Management Protocol)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 47 - How to configure Cisco Router/Switch for SNMP through IOS CLI</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 48 - How to configure Cisco Router/Switch for SNMP through CCP</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 49 - Why Network Time Synchronization is important</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 50 - Introduction to NTP (Network Time Protocol), NTP Stratum Levels</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 51 - NTP (Network Time Protocol) Modes of Operation</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 52 - How to configure Cisco Routers and Switches to synchronize time using NTP through IOS CLI</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 53 - How to configure Cisco Routers and Switches to synchronize time using NTP through CCP</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 54 - Out-of-Band (OOB) Management of Network Devices</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 55 - Layer 2 Technologies - A revisit to VLAN and STP</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 56 - What is VLAN Hopping attack</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 57 - What is Switch spoofing attack and how to prevent Switch spoofing attack</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 58 - What is Double tagging attack and how to prevent Double tagging attack</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 59 - What is MAC flooding attack (CAM table flooding attack) and How to prevent MAC flooding attack</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 60 - How to prevent MAC flooding attacks by configuring switchport port-security</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 61 - How to enable an interface, after a Port Security violation related shutdown (Errdisable state)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 62 - Root Guard, BPDU Guard and BPDU Filter</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 63 - What is Root Guard and how to configure Root Guard in Cisco Switches</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 64 - What is BPDU Guard and how to configure BPDU Guard in Cisco Switches</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 65 - What is BPDU Filter and how to configure BPDU Filter in Cisco Switches</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 66 - DHCP Starvation attacks and DHCP spoofing attacks</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 67 - How to configure DHCP Snooping</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 68 - ARP Spoofing attack</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 69 - Preventing ARP spoofing attacks with Dynamic ARP inspection (DAI)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 70 - IP spoofing attacks and IP Source Guard (IPSG)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 71 - What are PVLANs (Private VLANs)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 72 - How to configure PVLANs (Private VLANs)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 73 - Best Security practices to protect layer 2</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 74 - Access Control Lists (ACLs)</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 75 - What is Cisco IOS Zone Based Firewall</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 76 - C3PL (Cisco Common Classification Policy Language), Class Map, Policy Map and Service Policy</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 77 - What are Zones and Zone Pairs</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 78 - How to configure Cisco IOS Zone Based Firewall</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 79 - Introduction to Cisco IPSec VPN Technologies</span></span></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; line-height: 22px; text-align: justify;">
<div style="color: #424242; font-family: droidsansregularregular; line-height: 22px;">
<span style="color: #333333;"><span style="line-height: 18px;">Lesson 80 - How to configure Site-to-Site IPSec VPN using IKEv1 (Main Mode) using Pre-shared Key Authentication</span></span></div>
<div style="color: #424242; font-family: droidsansregularregular; line-height: 22px;">
<span style="color: #333333;"><span style="line-height: 18px;"><br /></span></span></div>
<span style="color: #333333;"><span style="color: #333333; font-family: "droidsansregularregular"; line-height: 18px;">omnisecu.com/ccna-security/network-threats-and-countermeasures.php</span></span></div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-89195337598129185712015-11-02T08:39:00.001-08:002015-11-02T08:39:52.772-08:00Primary Goals of Network Security - Confidentiality, Integrity and Availability<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
Three primary goals of Network Security are</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>• Confidentiality</strong></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>• Integrity</strong></div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>• Availability</strong></div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
These three pillars of Network Security are often represented as CIA Triangle, as shown below.</div>
<div align="center" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px;">
<img alt="CIA Triangle Confidentiality Integrity Availability" height="351" src="http://www.omnisecu.com/images/ccna-security/CIA-triangle-confidentiality-integrity-availability.jpg" style="border: 0px;" width="440" /></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Confidentiality:</strong> The first goal of Network Security is "Confidentiality". The function of "Confidentiality" is in protecting precious business data (in storage or in motion) from unauthorized persons. Confidentiality part of Network Security makes sure that the data is available OLNY to intended and authorized persons. Access to business data should be only for those individuals who are permitted to use that data.</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1n8d9amUc8O5InUn2fSJNb-Z3aPTOUWA5bnZ9xgQFIofCdKQcZVGy0tFjU851F0znVlSee3rxH04gCRWGdJo4CyRzha3dqpYx9uqiA7nVl1rhy7cTOJFtls9Wd-SmYb53cafHQ_eOGLKG/s1600/confidentiality.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1n8d9amUc8O5InUn2fSJNb-Z3aPTOUWA5bnZ9xgQFIofCdKQcZVGy0tFjU851F0znVlSee3rxH04gCRWGdJo4CyRzha3dqpYx9uqiA7nVl1rhy7cTOJFtls9Wd-SmYb53cafHQ_eOGLKG/s400/confidentiality.jpg" width="400" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div align="center" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px;">
</div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Integrity:</strong> The second goal of Network Security is "Integrity". Integrity aims at maintaining and assuring the accuracy and consistency of data. The function of Integrity is to make sure that the date is accurate and reliable and is not changed by unauthorized persons or hackers. The data received by the recipient must be exactly same as the data sent from the sender, without change in even single bit of data.</div>
<div align="center" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0GNLIPjcRvQm7ZJ1A9qfu4YgWO_9zIsB6qzuT2OrXsKBNEhY5XtaECz9G9DukvMCXBleeFUXyyqjrWIY6r2IM0hyphenhyphenUlTBI7SpadSCpgaeQpavO8-Ga5k5UDDDSrRbjLCzDWxYJf6X2a4Rp/s1600/integrity.jpg" imageanchor="1" style="font-family: 'Times New Roman'; font-size: medium; line-height: normal; margin-left: 1em; margin-right: 1em;"><img border="0" height="277" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0GNLIPjcRvQm7ZJ1A9qfu4YgWO_9zIsB6qzuT2OrXsKBNEhY5XtaECz9G9DukvMCXBleeFUXyyqjrWIY6r2IM0hyphenhyphenUlTBI7SpadSCpgaeQpavO8-Ga5k5UDDDSrRbjLCzDWxYJf6X2a4Rp/s400/integrity.jpg" width="400" /></a></div>
<div align="justify" style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
<strong>Availability:</strong> The third goal of network security is "Availability". The function of "Availability" in Network Security is to make sure that the Data, Network Resources or Network Services are continuously available to the legitimate users, whenever they require it.</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-33742444396286952852015-11-02T08:37:00.002-08:002015-11-02T08:37:07.820-08:00What is Network Security and why we need Network Security<table align="center" border="0" cellpadding="0" cellspacing="0" style="font-family: droidsansregularregular; height: 100%px; padding-bottom: 10px; width: 98%px;"><tbody>
<tr><td class="text" style="color: #424242; font-size: 14px; line-height: 22px; text-align: justify;" valign="top"><div align="justify" class="content-bottom-space" style="float: left; margin-bottom: 20px; width: 693px;">
<div align="justify">
Network Security is a branch of computer science that involves in securing a computer network and network infrastructure devices to prevent unauthorized access, data theft, network misuse, device and data modification. Another function of Network Security is in preventing DoS (Denial of Service) attacks and assuring continuous service for legitimate network users. Network Security involves proactive defence methods and mechanisms to protect data, network and network devices from external and internal threats.</div>
<div align="justify">
Data is the most precious factor of today’s businesses. Top business organizations spend billions of dollers every year to secure their computer networks and to keep their business data safe. Imagine the loss of all important research data on which the company has invested millions of dollers and working for years !!!</div>
<div align="justify">
We are dependent on computers today for controlling large money transfers between banks, insurance, markets, telecommunication, electrical power distribution, health and medical fields, nuclear power plants, space research and satellites. We cannot negotiate security in these critical areas.</div>
<div align="center">
<img alt="Computer Keyboard" height="282" src="http://www.omnisecu.com/images/ccna-security/Computer-Keyboard.jpg" style="border: 0px;" width="457" /></div>
<div align="justify">
As the complexity of the systems and the networks are increasing, vulnerabilities are also increasing and the task of securing the networks is becoming more complex.</div>
<div align="center">
<img alt="data protected" height="282" src="http://www.omnisecu.com/images/ccna-security/data-protected.jpg" style="border: 0px;" width="457" /></div>
<div align="justify">
This makes Network Security an essential part of today's businesses.</div>
</div>
</td></tr>
<tr><td><center>
</center>
</td></tr>
<tr><td align="center"></td></tr>
<tr><td></td></tr>
</tbody></table>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-50231148644470381162015-11-02T08:36:00.002-08:002015-11-02T08:36:07.958-08:00Introduction to CCNA Security<h3 style="color: #424242; font-family: droidsansregularregular; font-size: 20px; line-height: 22px; margin: 5px 0px; text-align: center; text-decoration: underline;">
CCNA Security (640-554 IINS - Implementing Cisco IOS Network Security)</h3>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
The Cisco CCNA Security certification title is an entry level network security certification offered by Cisco Systems. The Cisco CCNA Security certification provides a stepping stone for IT Security professionals who want to enhance their CCNA-level skills can fill the huge demand for network security professionals.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
The Cisco CCNA Security certification curriculum provides an introduction to the core security concepts. The Cisco CCNA Security certification also provides the tools and skills needed for an IT security beginner for installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of data and devices.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
CCNA Security (640-554 IINS - Implementing Cisco IOS Network Security) covers the following topics.</div>
<div style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">
The candidates who wish to attend CCNA Security training and examination should have a thorough knowledge in Basic Networking, TCP/IP, CCNA and basics of Network Security. Please visit thee blow links to study Basic Networking, TCP/IP, CCNA and basics of Network Security</div>
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
Common Security Threats</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe common security threats</span><br />
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
Security and Cisco Routers</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement security on Cisco routers</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe securing the control, data, and management plane</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe Cisco Security Manager</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe IPv4 to IPv6 transition</span><br />
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
AAA on Cisco Devices</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement AAA (authentication, authorization, and accounting)</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe TACACS+</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe RADIUS</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe AAA</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Verify AAA functionality</span><br />
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
IOS ACLs</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe standard, extended, and named IP IOS access control lists (ACLs) to filter packets</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe considerations when building ACLs</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement IP ACLs to mitigate threats in a network</span><br />
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
Secure Network Management and Reporting</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe secure network management</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement secure network management</span><br />
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
Common Layer 2 Attacks</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe Layer 2 security using Cisco switches</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe VLAN security</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement VLANs and trunking</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement spanning tree</span><br />
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
Cisco Firewall Technologies</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe operational strengths and weaknesses of the different firewall technologies</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe stateful firewalls</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe the types of NAT used in firewall technologies</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement zone-based policy firewall using CCP</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement the Cisco Adaptive Security Appliance (ASA)</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement Network Address Translation (NAT) and Port Address Translation (PAT)</span><br />
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
Cisco IPS</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe Cisco Intrusion Prevention System (IPS) deployment considerations</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe IPS technologies</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Configure Cisco IOS IPS using CCP</span><br />
<h4 style="color: #424242; font-family: droidsansregularregular; font-size: 18px; line-height: 22px; margin: 5px 0px; text-decoration: underline;">
VPN Technologies</h4>
<span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe the different methods used in cryptography</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe VPN technologies</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Describe the building blocks of IPSec</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement an IOS IPSec site-to-site VPN with pre-shared key authentication</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Verify VPN operations</span><br style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;" /><span style="color: #424242; font-family: droidsansregularregular; font-size: 14px; line-height: 22px; text-align: justify;">• Implement Secure Sockets Layer (SSL) VPN using ASA device manager </span>jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-18087129691627930162015-07-18T09:04:00.002-07:002015-07-18T09:04:11.872-07:00Share your SNAF Experience<h1>
Share your SNAF Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
As you know, the CCSP certification requires you to pass 3 exams:
SNRS, SNAF, IPS and one of three optional exams CANAC, MARS or SNAA but
currently this site has only materials for CCNA Security 640-553. Many
candidates have requested us to put up materials for other exams but it
is a time-consuming work. In the mean time, we created the “Share your
experience” for the SNAF exam. We really hope anyone who read
securitytut, 9tut, digitaltut, certprepare, networktut and voicetut
contribute to these sections as your experience is invaluable for CCSP
learners to complete their goals.<br />
<div class="pinkandbold">
Please share with us your experience after taking the SNAF exam, your materials, the way you learned, your recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-38299188068309627772015-07-18T08:59:00.008-07:002015-07-18T08:59:57.360-07:00Share your CCIE Security Lab Experience<h1>
Share your CCIE Security Lab Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
<div class="pinkandbold">
Please share with us your experience after
taking the CCIE Security Lab Exam, your materials, the way you learned,
your recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-89359607125078379602015-07-18T08:59:00.004-07:002015-07-18T08:59:36.334-07:00Share your CCIE Security Written Experience<h1>
Share your CCIE Security Written Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
<div class="pinkandbold">
Please share with us your experience after
taking the CCIE Security Written 350-018 exam, your materials, the way
you learned, your recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-1583139723943768622015-07-18T08:59:00.002-07:002015-07-18T08:59:17.964-07:00Share your VPN Experience<h1>
Share your VPN Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Cisco has made changes for the Security exams by replacing the old
CCSP with the new CCNP Security Certification with 4 modules: Secure,
Firewall, IPS and VPN. In fact, the old CCSP and the new CCNP Security
are very similar. Many candidates have requested us to put up materials
for these new exams but it is a time-consuming work. In the mean time,
we created the “Share your experience” for the VPN exam. We really hope
anyone who read securitytut, 9tut, digitaltut, certprepare, networktut
and voicetut contribute to these sections as your experience is
invaluable for CCNP Security learners to complete their goals.<br />
<div class="pinkandbold">
Please share with us your experience after taking
the VPN 642-647 exam, your materials, the way you learned, your
recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-12842248785007332292015-07-18T08:58:00.008-07:002015-07-18T08:58:57.576-07:00Share your FIREWALL Experience<h1>
Share your FIREWALL Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Cisco has made changes for the Security exams by replacing the old
CCSP with the new CCNP Security Certification with 4 modules: Secure,
Firewall, IPS and VPN. In fact, the old CCSP and the new CCNP Security
are very similar. Many candidates have requested us to put up materials
for these new exams but it is a time-consuming work. In the mean time,
we created the “Share your experience” for the FIREWALL exam. We really
hope anyone who read securitytut, 9tut, digitaltut, certprepare,
networktut and voicetut contribute to these sections as your experience
is invaluable for CCNP Security learners to complete their goals.<br />
Please share with us your experience after taking
the FIREWALL 642-617 exam, your materials, the way you learned, your
recommendationsjcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-35866672181078343192015-07-18T08:58:00.005-07:002015-07-18T08:58:33.392-07:00Share your IPS v7.0 Experience<h1>
Share your IPS v7.0 Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Cisco has made changes for the Security exams by replacing the old
CCSP with the new CCNP Security Certification with 4 modules: Secure,
Firewall, IPS and VPN. In fact, the old CCSP and the new CCNP Security
are very similar. Many candidates have requested us to put up materials
for these new exams but it is a time-consuming work. In the mean time,
we created the “Share your experience” for the IPS v7.0 exam. We really
hope anyone who read securitytut, 9tut, digitaltut, certprepare,
networktut and voicetut contribute to these sections as your experience
is invaluable for CCNP Security learners to complete their goals.<br />
<div class="pinkandbold">
Please share with us your experience after taking
the IPS v7.0 642-627 exam, your materials, the way you learned, your
recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-37590431599448942322015-07-18T08:58:00.002-07:002015-07-18T08:58:15.625-07:00Share your SECURE Experience<h1>
Share your SECURE Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Cisco has made changes for the Security exams by replacing the old
CCSP with the new CCNP Security Certification with 4 modules: Secure,
Firewall, IPS and VPN. In fact, the old CCSP and the new CCNP Security
are very similar. Many candidates have requested us to put up materials
for these new exams but it is a time-consuming work. In the mean time,
we created the “Share your experience” for the SECURE exam. We really
hope anyone who read securitytut, 9tut, digitaltut, certprepare,
networktut and voicetut contribute to these sections as your experience
is invaluable for CCNP Security learners to complete their goals.<br />
<div class="pinkandbold">
Please share with us your experience after taking
the SECURE 642-637 exam, your materials, the way you learned, your
recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-66107810726572900942015-07-18T08:57:00.005-07:002015-07-18T08:57:58.917-07:00Share your SNAA Experience<h1>
Share your SNAA Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
As you know, the CCSP certification requires you to pass 3 exams:
SNRS, SNAF, IPS and one of three optional exams CANAC, MARS or SNAA but
currently this site has only materials for CCNA Security 640-553. Many
candidates have requested us to put up materials for other exams but it
is a time-consuming work. In the mean time, we created the “Share your
experience” for the SNAA exam. We really hope anyone who read
securitytut, 9tut, digitaltut, certprepare, networktut and voicetut
contribute to these sections as your experience is invaluable for CCSP
learners to complete their goals.<br />
<div class="pinkandbold">
Please share with us your experience after taking the SNAA exam, your materials, the way you learned, your recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-80182269671779532732015-07-18T08:57:00.003-07:002015-07-18T08:57:38.265-07:00Share your MARS Experience<h1>
Share your MARS Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
As you know, the CCSP certification requires you to pass 3 exams:
SNRS, SNAF, IPS and one of three optional exams CANAC, MARS or SNAA but
currently this site has only materials for CCNA Security 640-553. Many
candidates have requested us to put up materials for other exams but it
is a time-consuming work. In the mean time, we created the “Share your
experience” for the MARS exam. We really hope anyone who read
securitytut, 9tut, digitaltut, certprepare, networktut and voicetut
contribute to these sections as your experience is invaluable for CCSP
learners to complete their goals.<br />
Please share with us your experience after taking the MARS exam, your materials, the way you learned, your recommendationsjcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-80954834742588614482015-07-18T08:57:00.001-07:002015-07-18T08:57:20.397-07:00Share your CANAC Experience<h1>
Share your CANAC Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
As you know, the CCSP certification requires you to pass 3 exams:
SNRS, SNAF, SNAF and one of three optional exams CANAC, MARS or SNAA but
currently this site has only materials for CCNA Security 640-553. Many
candidates have requested us to put up materials for other exams but it
is a time-consuming work. In the mean time, we created the “Share your
experience” for the CANAC exam. We really hope anyone who read
securitytut, 9tut, digitaltut, certprepare, networktut and voicetut
contribute to these sections as your experience is invaluable for CCSP
learners to complete their goals.<br />
<div class="pinkandbold">
Please share with us your experience after taking the CANAC exam, your materials, the way you learned, your recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-28606272039761549272015-07-18T08:56:00.001-07:002015-07-18T08:56:58.224-07:00Share your IPS Experience<h1>
Share your IPS Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
As you know, the CCSP certification requires you to pass 3 exams:
SNRS, SNAF, IPS and one of three optional exams CANAC, MARS or SNAA but
currently this site has only materials for CCNA Security 640-553. Many
candidates have requested us to put up materials for other exams but it
is a time-consuming work. In the mean time, we created the “Share your
experience” for the IPS exam. We really hope anyone who read
securitytut, 9tut, digitaltut, certprepare, networktut and voicetut
contribute to these sections as your experience is invaluable for CCSP
learners to complete their goals.<br />
<div class="pinkandbold">
Please share with us your experience after taking the IPS exam, your materials, the way you learned, your recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-25459388974420906862015-07-18T08:54:00.003-07:002015-07-18T08:54:42.648-07:00Share your SNRS Experience<h1>
Share your SNRS Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
As you know, the CCSP certification requires you to pass 3 exams:
SNRS, SNAF, SNAF and one of three optional exams CANAC, MARS or SNAA but
currently this site has only materials for CCNA Security 640-553. Many
candidates have requested us to put up materials for other exams but it
is a time-consuming work. In the mean time, we created the “Share your
experience” for the SNRS exam. We really hope anyone who read
securitytut, 9tut, digitaltut, certprepare, networktut and voicetut
contribute to these sections as your experience is invaluable for CCSP
learners to complete their goals.<br />
<div class="pinkandbold">
Please share with us your experience after taking the SNRS exam, your materials, the way you learned, your recommendations…</div>
jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-28281759820464324862015-07-18T08:48:00.002-07:002015-07-18T08:48:34.371-07:00Managing a Secure Network<h1>
Managing a Secure Network</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Managing a Secure Network Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
For the following attempts, which one is to ensure that no employee
becomes a pervasive security threat, that data can be recovered from
backups, and that information system changes do not compromise a
system’s security?<br />
A. Disaster recovery<br />
B. Strategic security planning<br />
C. Implementation security<br />
D. Operations security<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<strong>Note:</strong><br />
Operations security: day-to-day security operations entail responding
to an incident, monitoring and maintaining a system, and auditing a
system (to ensure compliance with an organization’s security policy).<br />
<div class="ccnaquestionsnumber">
Question 2</div>
Which three options are network evaluation techniques? (Choose three)<br />
A. Scanning a network for active IP addresses and open ports on those IP addresses<br />
B. Using password-cracking utilities<br />
C. Performing end-user training on the use of antispyware software<br />
D. Performing virus scans<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> A B D<br />
<div class="ccnaquestionsnumber">
Question 3</div>
Which is the main difference between host-based and network-based intrusion prevention?<br />
A. Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.<br />
B. Host-based IPS can work in promiscuous mode or inline mode.<br />
C. Network-based IPS can provide protection to desktops and servers
without the need of installing specialized software on the end hosts and
servers. <br />
D. Host-based IPS deployment requires less planning than network-based IPS.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 4</div>
The enable secret password appears as an MD5 hash in a router’s
configuration file, whereas the enable password is not hashed (or
encrypted, if the password-encryption service is not enabled). What is
the reason that Cisco still support the use of both enable secret and
enable passwords in a router’s configuration?<br />
A. The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.<br />
B. The enable password is considered to be a router’s public key,
whereas the enable secret password is considered to be a router’s
private key.<br />
C. Because the enable secret password is a hash, it cannot be
decrypted. Therefore, the enable password is used to match the password
that was entered, and the enable secret is used to verify that the
enable password has not been modified since the hash was generated.<br />
D. The enable password is present for backward compatibility.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 5</div>
Which type of MAC address is dynamically learned by a switch port and then added to the switch’s running configuration?<br />
A. Pervasive secure MAC address <br />
B. Static secure MAC address <br />
C. Sticky secure MAC address <br />
D. Dynamic secure MAC address<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Which are the best practices for attack mitigations?<br />
<table border="1">
<tbody>
<tr>
<td>1</td>
<td>Store sensitive data on stand-alone devices</td>
</tr>
<tr>
<td>2</td>
<td>Keep patches up to date</td>
</tr>
<tr>
<td>3</td>
<td>Use password that cannot be broken</td>
</tr>
<tr>
<td>4</td>
<td>Develop a static tested security policy</td>
</tr>
<tr>
<td>5</td>
<td>Inform users about social engineering</td>
</tr>
<tr>
<td>6</td>
<td>Develop a dynamic security policy</td>
</tr>
<tr>
<td>7</td>
<td>Log everything to a syslog server for forensic purposes</td>
</tr>
<tr>
<td>8</td>
<td>Disable unnecessary services</td>
</tr>
</tbody>
</table>
A. 1, 2, 3 and 5<br />
B. 2, 5, 6 and 8<br />
C. 2, 5, 6 and 7 <br />
D. 2, 3, 6 and 8<br />
E. 3, 4, 6 and 7<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 7</div>
Which one of the Cisco IOS commands can be used to verify that either
the Cisco IOS image, the configuration files, or both have been
properly backed up and secured?<br />
A. show flash <br />
B. show secure bootset <br />
C. show archive <br />
D. show file systems<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaexplanation">
Explanation</div>
We use <strong>secure boot-image</strong> command to protect the IOS image, and the command <strong>secure boot-config</strong> to protect<br />
the running configuration. These protected files will not even appear in a <strong>dir </strong>listing of flash. To see these protected files, use the<strong> show secure bootset</strong> command.<br />
<div class="ccnaquestionsnumber">
Question 8</div>
Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?<br />
A. IronPort M-Series <br />
B. E-Base <br />
C. TrafMon <br />
D. SenderBase<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>D<br />
<div class="ccnaquestionsnumber">
Question 9</div>
Based on the username global configuration mode command displayed in
the exhibit. What does the option secret 5 indicate about the enable
secret password?<br />
<table border="1" style="background-color: #ffff99;">
<tbody>
<tr>
<td><strong>Router# show run | include username<br />
</strong><br />
<strong>Username test secret 5 $1$knm. $GOGQBIL8TK77POLWxvX400</strong></td>
</tr>
</tbody>
</table>
A. It is encrypted using DH group 5. <br />
B. It is hashed using SHA. <br />
C. It is hashed using MD5.<br />
D. It is encrypted using a proprietary Cisco encryption algorithm.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>C<br />
Question 10<br />
What will be disabled as a result of the no service password-recovery command?<br />
A. password encryption service <br />
B. ROMMON<br />
C. changes to the config-register setting<br />
D. the xmodem privilege EXEC mode command to recover the Cisco IOS image<br />
<br class="spacer_" />
Answer: Bjcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-9471540835919014372015-07-18T08:46:00.000-07:002015-07-18T08:46:32.069-07:00Share your CCNA Security Experience<h1>
Share your CCNA Security Experience</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
<div class="pinkandbold">
Please share with us your experience after
taking the CCNA Security 640-553 exam, your materials, the way you
learned, your recommendations…</div>
Your posts are warmly welcome!<br />
Please don’t ask for links to download copyright materials here…jcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-47629087438161077332015-07-18T08:41:00.005-07:002015-07-18T08:41:55.876-07:00Implementing Virtual Private Networks<h1>
Implementing Virtual Private Networks</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Implementing Virtual Private Networks Questions<br />
<div class="ccnaquestionsnumber">
Question 1</div>
You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of which type of tunnel?<br />
A. GRE tunnel <br />
B. L2TP tunnel <br />
C. L2F tunnel <br />
D. ISAKMP tunnel<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>D<br />
Question 2<br />
For the following items, which one acts as a VPN termination device and is located at a primary network location?<br />
A. Headend VPN device <br />
B. Tunnel <br />
C. Broadband service <br />
D. VPN access device<br />
<br class="spacer_" />
Answer: Ajcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0tag:blogger.com,1999:blog-5655246245541318421.post-58777023631084530082015-07-18T08:41:00.003-07:002015-07-18T08:41:31.363-07:00Cryptographic Systems<h1>
Cryptographic Systems</h1>
<div class="info">
<span class="date"></span><span class="comments"><br /></span>
</div>
Here you will find answers to Cryptographic Systems Questions<br />
<br class="spacer_" />
<div class="ccnaquestionsnumber">
Question 1</div>
Please choose the correct matching relationships between the cryptography algorithms and the type of algorithm.<br />
<table border="1">
<tbody>
<tr>
<td>1</td>
<td>3DES</td>
</tr>
<tr>
<td>2</td>
<td>RSA</td>
</tr>
<tr>
<td>3</td>
<td>Diffie-Hellman</td>
</tr>
<tr>
<td>4</td>
<td>AES</td>
</tr>
<tr>
<td>5</td>
<td>IDEA</td>
</tr>
<tr>
<td>6</td>
<td>Elliptical Curve</td>
</tr>
</tbody>
</table>
A. Symmetric – 1, 2 and 3 <br />
Asymmetric – 4, 5 and 6<br />
B. Symmetric – 1, 4 and 5 <br />
Asymmetric – 2, 3 and 6<br />
C. Symmetric – 2, 4 and 5 <br />
Asymmetric – 1, 3 and 6<br />
D. Symmetric – 2, 5 and 6 <br />
Asymmetric – 1, 3 and 4<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaquestionsnumber">
Question 2</div>
What is the objective of Diffie-Hellman?<br />
A. used for asymmetric public key encryption<br />
B. used between the initiator and the responder to establish a basic security policy <br />
C. used to verify the identity of the peer<br />
D. used to establish a symmetric shared key via a public key exchange process<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>D<br />
<div class="ccnaquestionsnumber">
Question 3</div>
Which description about asymmetric encryption algorithms is correct?<br />
A. They use different keys for decryption but the same key for encryption of data<br />
B. They use the same key for encryption and decryption of data<br />
C. They use different keys for encryption and decryption of data<br />
D. They use the same key for decryption but different keys for encryption of data<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 4</div>
Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?<br />
A. Changing only a few bits of a plain-text message causes the ciphertext to be completely different<br />
B. Changing only a few bits of a ciphertext message causes the plain text to be completely different <br />
C. Altering the key length causes the plain text to be completely different<br />
D. Altering the key length causes the ciphertext to be completely different<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A<br />
<div class="ccnaquestionsnumber">
Question 5</div>
Stream ciphers run on which of the following?<br />
A. Individual blocks, one at a time, with the transformations varying during the encryption <br />
B. Individual digits, one at a time, with the transformations varying during the encryption <br />
C. Fixed-length groups of digits called blocks <br />
D. Fixed-length groups of bits called blocks<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> B<br />
<div class="ccnaquestionsnumber">
Question 6</div>
Which description is true about ECB mode?<br />
A. ECB mode uses the same 64-bit key to serially encrypt each 56-bit plain-text block.<br />
B. In ECB mode, each 56-bit plain-text block is exclusive ORed (XORed) bitwise with the previous ciphertext block.<br />
C. ECB mode uses the same 56-bit key to serially encrypt each 64-bit plain-text block.<br />
D. In ECB mode, each 64-bit plain-text block is exclusive ORed (XORed) bitwise with the previous ciphertext block.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaexplanation">
Explanation</div>
ECB mode serially encrypts each 64-bit plaintext block using the same
56-bit key. If two identical plaintext blocks are encrypted using the
same key, their ciphertext blocks are the same. Therefore, an attacker
could identify similar or identical traffic flowing through a
communications channel, and use this information. The attacker could
then build a catalogue of messages, which have a certain meaning, and
replay them later, without knowing their real meaning. For example, an
attacker might capture a login sequence of someone with administrative
privilege whose traffic is protected by DES-ECB and then replay it. That
risk is undesirable so CBC mode was invented to mitigate this risk.<br />
(Reference: Implementing Cisco IOS Network Security Self Study)<br />
<div class="ccnaquestionsnumber">
Question 7</div>
Which example is of a function intended for cryptographic hashing?<br />
A. SHA-135 <br />
B. MD65 <br />
C. XR12 <br />
D. MD5<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>D<br />
<div class="ccnaquestionsnumber">
Question 8</div>
What is the MD5 algorithm used for?<br />
A. takes a variable-length message and produces a 168-bit message digest <br />
B. takes a fixed-length message and produces a 128-bit message digest <br />
C. takes a variable-length message and produces a 128-bit message digest <br />
D. takes a message less than 2A64 bits as input and produces a 160-bit message digest<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 9</div>
Which algorithm was the first to be found suitable for both digital signing and encryption?<br />
A. SHA-1 <br />
B. MD5 <br />
C. HMAC <br />
D. RSA<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> D<br />
<div class="ccnaquestionsnumber">
Question 10</div>
Before a Diffie-Hellman exchange may begin, the two parties involved must agree on what?<br />
A. Two nonsecret keys <br />
B. Two secret numbers <br />
C. Two secret keys <br />
D. Two nonsecret numbers<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>D<br />
<div class="ccnaquestionsnumber">
Question 11</div>
Which item is the correct matching relationships associated with IKE Phase?<br />
<table border="1">
<tbody>
<tr>
<td>1</td>
<td>Perform a Diffie-Hellman exchange</td>
</tr>
<tr>
<td>2</td>
<td>Establish Ipsec SAs</td>
</tr>
<tr>
<td>3</td>
<td>Negotiate Ipsec security policies</td>
</tr>
<tr>
<td>4</td>
<td>Negotiate IKE policy sets and authenticate peers</td>
</tr>
<tr>
<td>5</td>
<td>Perform an optional Diffie-Hellman exchange</td>
</tr>
</tbody>
</table>
A.IKE Phase 1 – 1 and 2<br />
IKE Phase 2 – 3, 4 and 5<br />
B. IKE Phase 1 – 1 and 4<br />
IKE Phase 2 – 2, 3 and 5<br />
C. IKE Phase 1 – 2 and 3<br />
IKE Phase 2 – 1, 4 and 5<br />
D. IKE Phase 1 – 2 and 4<br />
IKE Phase 2 – 1, 3 and 5<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>B<br />
<div class="ccnaquestionsnumber">
Question 12</div>
Which three are distinctions between asymmetric and symmetric algorithms? (Choose all that apply)<br />
A. Asymmetric algorithms are based on more complex mathematical computations.<br />
B. Only symmetric algorithms have a key exchange technology built in. <br />
C. Only asymmetric algorithms have a key exchange technology built in.<br />
D. Asymmetric algorithms are used quite often as key exchange protocols for symmetric algorithms.<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer: </span>A C D<br />
<div class="ccnaquestionsnumber">
Question 13</div>
For the following statements, which one is the strongest symmetrical encryption algorithm?<br />
A. 3DES <br />
B. DES <br />
C. AES <br />
D. Diffie-Hellman<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> C<br />
<div class="ccnaquestionsnumber">
Question 14</div>
Which Public Key Cryptographic Standards (PKCS) defines the syntax for encrypted messages and messages with digital signatures?<br />
A. PKCS #12 <br />
B. PKCS #10 <br />
C. PKCS #8 <br />
D. PKCS #7<br />
<br class="spacer_" />
<span class="ccnacorrectanswers">Answer:</span> Djcreatorhttp://www.blogger.com/profile/17926347588908332596noreply@blogger.com0