Thursday 29 March 2018

Cisco 642-887 Exam Questions

Question: 25

A DSCP value of 41 in decimal corresponds to which IP precedence value?

A. 3 ?Flash
B. 4 ?Flash Override
C. 5 ?Critical
D. 6 ?Internet Control
E. 7 ?Network Control

Answer: C

Sunday 4 March 2018

Cisco 642-887 Practice Exam Questions

Question: 24

Which two statements are correct in describing ISP environments that are running IP/MPLS in the core network? (Choose two.)

A. On the PE routers, each BGP route must use a unique label to reach the BGP next hop.
B. The BGP next hops point to the PE routers, and only the PE routers are required to run BGP.
C. A full mesh of IBGP sessions are required between all of the PE and P routers to ensure proper packets forwarding.
D. The PE and P routers run LDP to learn the labels for reaching the BGP next-hop addresses.

Answer: BD

Thursday 1 March 2018

Cisco 642-887 Exam Questions

Question: 23

Which two statements are correct in describing ISP environments that are running IP/MPLS in the core network? (Choose two.)

A. On the PE routers, each BGP route must use a unique label to reach the BGP next hop.
B. The BGP next hops point to the PE routers, and only the PE routers are required to run BGP.
C. A full mesh of IBGP sessions are required between all of the PE and P routers to ensure proper packets forwarding.
D. The PE and P routers run LDP to learn the labels for reaching the BGP next-hop addresses.

Answer: BD

https://testcollection.us/642-887-vce-download.html

Thursday 1 February 2018

If Your Businesses Uses a Cisco VPN, Patch It Now To Avoid Critical Flaw


  • Cisco has issued a patch for a critical vulnerability in the SSL VPN functionality of the Cisco Adaptive Security Appliance Software.
  • A Cisco VPN bug achieved a CVSS Score of 10 out of 10, and could have affected as many as 200,000 devices.


Cisco is inviting users of its Cisco Adaptive Security Appliance to patch their systems to protect them from a critical VPN vulnerability. In a security advisory, Cisco noted that the failure received a Common Vulnerability Score System (CVSS) score of 10 out of 10, the highest possible score.

cisco news 2018 The vulnerability specifically affects devices that are running the vulnerable version of the device software that also has the webvpn feature enabled, says the notice. In this case, webvpn must be configured globally, but it must also be "an enabled interface via enable <if_name> in the configuration", says the notice. To determine if this is the case in your organization, an administrator must "use the show running-config webvpn command in the CLI and verify that the command returns at least one enable line <if_name>," the notice says.

Obviously, IT administrators in a vulnerable organization must immediately patch their systems. The urgency in the patch is particularly important now, as a security researcher will show how to exploit it next weekend, as reported by Liam Tung of our ZDNet site.

SEE: System Update Policy (Tech Pro Research)

According to the notice, the affected software works on the following systems:

3000 Series Industrial Safety Device (ISA)
ASA 5500 Series Adaptive Security Devices
Next-generation ASA 5500-X Series Firewall
ASA Service Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
ASA 1000V cloud firewall
Adaptive Security Virtual Appliance (ASAv)
Safety device of the Firepower 2100 series
Safety device Firepower 4110
Firepower 9300 ASA Security Module
Firepower Threat Defense Software (FTD)
Vulnerabilities in this vulnerability occur when an attacker sends specialized XML packages to the interface configured by webvpn. If successful, the exploit "could allow the attacker to execute arbitrary code and take full control of the system, or cause reloading of the affected device," the notice says.

The vulnerability was reported for the first time by Cedric Halbronn of the NCC group, and security researcher Kevin Beaumont posted on Twitter that there could be up to 200,000 affected devices.

If you are thinking about skipping the correction process, do not do it. According to Cisco, there is no other solution known today than just updating the software. Follow the instructions in the notice to determine if the version of your software is vulnerable.

Wednesday 20 December 2017

Apple and Cisco just improved security in the iOS enterprise

Apple and Cisco have struck yet another blow for big business IT. They realize that iOS is the most secure portable arrangement, however that is not everything in light of the fact that versatile dangers are unfathomably perplexing nowadays.



The puzzle code 

Here's a situation: You work in an endeavor with maybe 1,000 different representatives. One morning, maybe you 50 woke to locate a real appearing email in your in-box that solicitations you tap on a connection to refresh some framework identified with the work you do. While numerous workers recollected not to tap on that connection, a modest number clicked. Nobody thought excessively of the email — spam is visit and most just idea the mail was gone for them.

It wasn't. 

The assault was arranged, and the assailants have now assembled somewhat more insight about a portion of the organization's representatives, including passwords.

This data enables assailants to make sense of secret key structure and maybe empowers them to make another accumulation of endeavors that utilization those stolen subtle elements to help infiltrate somewhat more profound into the venture's IT frameworks.

They will search for privileged insights they can offer, dollars they can take, and information they can mishandle. They may even be sitting in neighborhood bistros utilizing Wi-Fi organize sniffers to screen and split inside the venture frameworks when gotten to by representatives on their meal break.

What's occurred here is that while traditional security frameworks can ensure end clients against a considerable measure of things, it's less extraordinary at securing against multi-faceted dangers.

Visibility is everything 

Apple's iOS gadgets are presently profoundly dug in big business IT.

Effectively, more than 70 percent of big business clients give workers cell phones, yet traditional security strategies don't really see all the distinctive assaults that do exist. The as of late distinguished Blueborne Bluetooth defenselessness is a decent case of an assault that current security insurances most likely wouldn't perceive.

Note that heaps of endeavors utilize iPhones and iPads on the grounds that Apple's gadgets are as yet the most secure in the business.

That stage multiplication implies assailants who do prevail with regards to undermining that security could profit. That is the reason it is a little interesting that Apple pays only $200,000 to individuals who distinguish vulnerabilities on its stages, even while private firms pay $500,000 for a similar data. There's cash in question and nobody ought to be smug.

Cisco's Security Connector helps discover assaults you can't see 

The huge issue is that a few assaults are very straightforward. The greater part of us would not know they were occurring.

They occur at a profound gadget level that doesn't appear to meddle with our client experience, and they are not effortlessly spotted by more conventional security insurances.

That is the reason the Apple/Cisco bargain bodes well. To enable better to ensure iOS gadgets against assault, Cisco has presented Security Connector, an application that screens organize action on gadgets, with no huge effect on gadget execution or battery life. Cisco's iOS security application offers security usefulness from Cisco Umbrella and Cisco Clarity.

"Ransomware and malware are spreading over the web and progressively focusing on cell phones. Together with Apple, we are helping ventures turn into the most associated, synergistic, and secure organizations on the planet," said David Ulevitch, senior VP and general administrator of Cisco's Security Business Group.

There's a Cisco blog that reveals to you somewhat more about how this functions here, yet at its most straightforward on the off chance that one of those workers at the highest point of this story had clicked a phishing join, Security Connector would have kept the association.

Astute risk administration 

The energy of this approach is that the arrangement can screen organize movement for the sorts of abnormalities that deceive an effective hack, for example, a lot of active information being created by an unapproved application.

The arrangement likewise keeps iOS clients from getting to noxious web destinations, and causes them abstain from sharing basic information utilizing unsecured Wi-Fi systems. You can likewise utilize Security Connector to distinguish what happened, who was influenced, and what information was in danger, in the occasion an organization endures an assault.

The thought behind arrangements like these is that by checking action and recognizing dangers that may somehow or another be less unmistakable, security groups can help enhance the insurance around big business tech. In a setting in which security abuses are winding up perpetually unpredictable and progressively less noticeable, Cisco's answer bodes well.

It's not exactly the venture IT security protection bargain Apple CEO Tim Cook proposed recently, yet it's a positive development.

Thursday 6 April 2017

642-887 Sample Question: 23

Question: 23

What is the term that is used for the label that an LSR assigns and distributes to other LSRs in MPLS?

A. Local
B. Remote
C. Explicit
D. Explicit Null
E. Aggregate

Answer: A

Friday 17 March 2017

642-887 Sample Question: 22

Question: 22

When troubleshooting LDP operations on the Cisco IOS and IOS XE routers, what is one of the first things that should be verified?

A. if running OSPF as the IGP, ensure that OSPFv3 has been enabled
B. check if the ip cef command has been enabled
C. verify in the running configurations that all of the required LDP interfaces are defined under the mpls ldp command configuration mode
D. verify if there are any access lists that are denying TCP and UDP port 464 packets

Answer: B