Wednesday 25 February 2015

600-211 Implementing Cisco Service Provider Mobility CDMA Networks (SPCDMA)


QUESTION 1
Which interface carries signaling information between PCF and PDSN?

A. A8
B. A9
C. A10
D. A11

Answer: D

Explanation:


QUESTION 2
Which underlying protocol is used for RADIUS messages in CDMA?

A. TCP
B. SCTP
C. UDP
D. ICMP

Answer: C

Explanation:


QUESTION 3
Which protocol is used during PPP negotiation to assign an IP address to the mobile device for a
simple IP call?

A. LCP
B. IPCP
C. CHAP
D. EAP

Answer: B

Explanation:


QUESTION 4
Which is an attribute in MIP RRQ?

A. Correlation ID
B. NAS-Identifier
C. Framed-IP-Address
D. Care-of-Address
E. Framed-Interface-ID

Answer: D

Explanation:


QUESTION 5
Which bit in HA Registration Revocation message is used by PDSN/FA to determine Mobile
notification?

A. 'A' bit
B. 'I' bit
C. 'M' bit
D. 'R' bit

Answer: B

Explanation:


Sunday 22 February 2015

7 critical things to cover in your disaster-recovery plan

As always, you never know when a disaster will strike, so better to have a checklist on hand so that panic doesn’t set in when the network goes down.

1. Creating a plan
Cloud services company Evolve IP has created a list of suggestions for executives to evaluate their current disaster avoidance plans or, should a plan not exist, provide directional measures to protect their information and communications systems.

2. Establish a disaster recovery functional team
Elect one spokesperson from the group for communication. In the event of a multi-location organization each location should have a core team or representative that works with the corporate entity.

3. Risk assessment
Identify risks in the following areas:

Information – What information and information systems are most vital to continue to run the business at an acceptable level?

Communication Infrastructure – What communications (email, toll free lines, call centers, VPNs, Terminal Services) are most vital to continue to run the business at an acceptable level?

Access and Authorization – Who needs to access the above systems and in what secure manner (VPN, SSL, DR Site) in the event of a disaster?

Physical Work Environment – What is necessary to conduct business in an emergency should the affected location not be available?

Internal and External Communication – Who do we need to contact in the event of an emergency and with what information?

4. Cloud-based data centers and applications
Create a written recovery plan that is hosted remotely in a secure and redundant data center. Schedule and test your plan at least once per year or in accordance with regulatory/compliance requirements. Ensure employees can access the hosted environment (both from within the business confines and remotely) during fail-over mode from the designated locations.

5. Premise-based data centers
Produce a written recovery plan that is stored remotely. Identify water entry areas throughout the building and have sandbags available. Install VESDA smoke detection and thermal detectors. Have a fail-safe alarm system. Place high-temperature sensors on fire sprinkler heads if non-water based fire-suppression is unavailable. Keep your data center above street level. If you are in a single-floor building, raise your racks from the floor. Employ multiple Internet service/data providers and test for failover regularly.

6. Data back-up
Tape back-ups should be removed daily and stored in a secure, easily accessed public building with at least 2-3 individuals having keys to the location. Back-up data to a geographically distant location, either electronically, or ensure physical media is in a diverse location.

7. Hosted telephony systems
Employ multiple Internet providers and test for failover regularly. Verify that critical phone numbers have the ability to call forward in an unreachable condition.

8. Call center
Identify key business applications required and how call center staff will access these applications from alternative locations. Identify critical call types that must be answered and determine mechanism to segregate those calls. Identify alternative locations to house the staff with the appropriate systems, phones, and work environment. Ensure administrative staff has the ability to remotely change call routing, messaging, and related call center functionality.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Friday 20 February 2015

600-503 Designing with Cisco Network Programmability


QUESTION 1
Which two advantages of an overlay network that consists of virtual switches on supervisors
compare with those of physical networks? (Choose two.)

A. Ability to change the logical network topology more easily.
B. Ability to experience higher performance of traffic forwarding.
C. Overlay networks integrate with virtual machines more closely
D. They can support more routing protocols.
E. They are more secure.

Answer: A,C

Explanation:


QUESTION 2
Which two options are challenges to migrate a traditional network to an SDN type of network?
(Choose two.)

A. would cost to replace traditional network devices to new devices
B. would need more operators to run a more complicated network
C. would need operators with more programming skill
D. would need more bandwidth to secure redundant paths
E. would need to remove existing network management tools

Answer: A,C

Explanation:


QUESTION 3
Which statement is an example of a requirement that is not well-formed?

A. The application should provide status messages every 60 seconds.
B. The application user interface must be easy to use.
C. The application must validate that the IP addresses that are input by users are valid IPv4 or
IPv6 addresses.
D. The application must be available for end users between 8am and 8pm EST/EDT, Monday
through Friday.
E. The application should restart within 15 seconds.

Answer: B

Explanation:


QUESTION 4
Which option is a requirement represented in an Agile software development methodology?

A. interviews
B. product functions
C. product requirements document
D. user stories
E. home stenographer

Answer: D

Explanation:


QUESTION 5
Which four components should be considered when gathering business requirements for a
customer project? (Choose four.)

A. alignment to corporate goals
B. compliance regulations
C. development team location
D. commitments to customers
E. supplier capabilities
F. business unit providing the developers

Answer: A,B,D,E

Explanation:



Sunday 8 February 2015

The top demographic trends for every major social network

The demographics of who's on what social network are shifting — older social networks are reaching maturity, while newer social messaging apps are gaining younger users fast.

In a report from BI Intelligence, we unpack data from over a dozen sources to understand how social media demographics are still shifting.

Here are a few of the key takeaways from the BI Intelligence report:

Facebook still skews significantly female. Women in the U.S. are more likely to use Facebook than men by about 10 percentage points, according to a 2013 survey of social network adoption.

Facebook remains the top social network for U.S. teens. Nearly half of teen Facebook users say they're using the site more than last year, and Facebook has more daily teen users than any other social network.

That said, Instagram has edged out Facebook and Twitter in terms of prestige among young users. U.S. teens now describe Instagram as "most important," while Facebook and Twitter lost ground on this measure, according to Piper Jaffray's twice yearly teen survey. The survey also found that 83% of U.S. teens in wealthy households were on Instagram.

LinkedIn is actually more popular than Twitter among U.S. adults. LinkedIn's core demographic are those aged between 30 and 49, i.e. those in the prime of their career-rising years. Not surprisingly, LinkedIn also has a pronounced skew toward well-educated users.

Twitter has begun to lean worryingly toward male users, whereas previously it was a more gender-balanced social network. Pew found that 22% of men use Twitter, while only 15% of women do.

YouTube reaches more adults aged 18 to 34 than any single cable TV network. Nearly half of people in this age group visited YouTube between December 2013 and February 2014, according to Nielsen. It was rated by millennials as the top place to watch content, ahead of digital and TV properties like Facebook and ESPN.

Snapchat is the youngest social network of all. More than six out of 10 Snapchat users are in the 18-to-24 age group, compared to 28% of Instagram users, according to a survey by Informate.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com