Wednesday 25 February 2015

600-211 Implementing Cisco Service Provider Mobility CDMA Networks (SPCDMA)


QUESTION 1
Which interface carries signaling information between PCF and PDSN?

A. A8
B. A9
C. A10
D. A11

Answer: D

Explanation:


QUESTION 2
Which underlying protocol is used for RADIUS messages in CDMA?

A. TCP
B. SCTP
C. UDP
D. ICMP

Answer: C

Explanation:


QUESTION 3
Which protocol is used during PPP negotiation to assign an IP address to the mobile device for a
simple IP call?

A. LCP
B. IPCP
C. CHAP
D. EAP

Answer: B

Explanation:


QUESTION 4
Which is an attribute in MIP RRQ?

A. Correlation ID
B. NAS-Identifier
C. Framed-IP-Address
D. Care-of-Address
E. Framed-Interface-ID

Answer: D

Explanation:


QUESTION 5
Which bit in HA Registration Revocation message is used by PDSN/FA to determine Mobile
notification?

A. 'A' bit
B. 'I' bit
C. 'M' bit
D. 'R' bit

Answer: B

Explanation:


Sunday 22 February 2015

7 critical things to cover in your disaster-recovery plan

As always, you never know when a disaster will strike, so better to have a checklist on hand so that panic doesn’t set in when the network goes down.

1. Creating a plan
Cloud services company Evolve IP has created a list of suggestions for executives to evaluate their current disaster avoidance plans or, should a plan not exist, provide directional measures to protect their information and communications systems.

2. Establish a disaster recovery functional team
Elect one spokesperson from the group for communication. In the event of a multi-location organization each location should have a core team or representative that works with the corporate entity.

3. Risk assessment
Identify risks in the following areas:

Information – What information and information systems are most vital to continue to run the business at an acceptable level?

Communication Infrastructure – What communications (email, toll free lines, call centers, VPNs, Terminal Services) are most vital to continue to run the business at an acceptable level?

Access and Authorization – Who needs to access the above systems and in what secure manner (VPN, SSL, DR Site) in the event of a disaster?

Physical Work Environment – What is necessary to conduct business in an emergency should the affected location not be available?

Internal and External Communication – Who do we need to contact in the event of an emergency and with what information?

4. Cloud-based data centers and applications
Create a written recovery plan that is hosted remotely in a secure and redundant data center. Schedule and test your plan at least once per year or in accordance with regulatory/compliance requirements. Ensure employees can access the hosted environment (both from within the business confines and remotely) during fail-over mode from the designated locations.

5. Premise-based data centers
Produce a written recovery plan that is stored remotely. Identify water entry areas throughout the building and have sandbags available. Install VESDA smoke detection and thermal detectors. Have a fail-safe alarm system. Place high-temperature sensors on fire sprinkler heads if non-water based fire-suppression is unavailable. Keep your data center above street level. If you are in a single-floor building, raise your racks from the floor. Employ multiple Internet service/data providers and test for failover regularly.

6. Data back-up
Tape back-ups should be removed daily and stored in a secure, easily accessed public building with at least 2-3 individuals having keys to the location. Back-up data to a geographically distant location, either electronically, or ensure physical media is in a diverse location.

7. Hosted telephony systems
Employ multiple Internet providers and test for failover regularly. Verify that critical phone numbers have the ability to call forward in an unreachable condition.

8. Call center
Identify key business applications required and how call center staff will access these applications from alternative locations. Identify critical call types that must be answered and determine mechanism to segregate those calls. Identify alternative locations to house the staff with the appropriate systems, phones, and work environment. Ensure administrative staff has the ability to remotely change call routing, messaging, and related call center functionality.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Friday 20 February 2015

600-503 Designing with Cisco Network Programmability


QUESTION 1
Which two advantages of an overlay network that consists of virtual switches on supervisors
compare with those of physical networks? (Choose two.)

A. Ability to change the logical network topology more easily.
B. Ability to experience higher performance of traffic forwarding.
C. Overlay networks integrate with virtual machines more closely
D. They can support more routing protocols.
E. They are more secure.

Answer: A,C

Explanation:


QUESTION 2
Which two options are challenges to migrate a traditional network to an SDN type of network?
(Choose two.)

A. would cost to replace traditional network devices to new devices
B. would need more operators to run a more complicated network
C. would need operators with more programming skill
D. would need more bandwidth to secure redundant paths
E. would need to remove existing network management tools

Answer: A,C

Explanation:


QUESTION 3
Which statement is an example of a requirement that is not well-formed?

A. The application should provide status messages every 60 seconds.
B. The application user interface must be easy to use.
C. The application must validate that the IP addresses that are input by users are valid IPv4 or
IPv6 addresses.
D. The application must be available for end users between 8am and 8pm EST/EDT, Monday
through Friday.
E. The application should restart within 15 seconds.

Answer: B

Explanation:


QUESTION 4
Which option is a requirement represented in an Agile software development methodology?

A. interviews
B. product functions
C. product requirements document
D. user stories
E. home stenographer

Answer: D

Explanation:


QUESTION 5
Which four components should be considered when gathering business requirements for a
customer project? (Choose four.)

A. alignment to corporate goals
B. compliance regulations
C. development team location
D. commitments to customers
E. supplier capabilities
F. business unit providing the developers

Answer: A,B,D,E

Explanation:



Sunday 8 February 2015

People don't trust mobile wallets and apps

Worries over security and privacy hold back mobile phone users, survey finds

Trust is eroding among mobile device users when it comes to making purchases or app downloads.

A survey of 15,000 mobile users in 15 countries found that their trust level is degraded because they believe that payment systems aren't secure or they don't trust a service or online merchant. Mobile users are also worried about having to share too much personal information when downloading an app.

This lack of trust grew the most in the U.S. The lack of trust across all areas jumped from 26% in 2013 to 35% in 2014 among U.S. respondents. The latest survey was conducted in the third quarter of 2014, but was made public last week. Smartphone and feature phone users were sent an SMS to join the survey and completed the survey on their devices.

The implications of the survey could limit and possibly diminish the rollout of mobile payment and electronic wallet systems, such as Apple Pay, and the growth in app downloads, according to analysts.

Near half of the respondents said this overall lack of trust limits the the number of apps they download, while 72% said they were unhappy sharing location data or contact details.

The survey was commissioned by MEF, an international trade association focused on mobile content and commerce. MEF, based in London, includes hundreds of large companies as members, including Samsung, Microsoft, and MasterCard, with more than 35 companies from North America alone.

Andrew Bud, chairman of MEF, said the survey results should prompt companies offering mobile payments, content and services to consistently apply "high levels of transparency, security and privacy to every mobile transaction."

The MEF launched a privacy policy initiative in 2014 to make it easy for app developers to integrate a line of code within an app that offers customers a short explanation of privacy in plain English. Details are on the MEF website at appprivacy.net.

One of the most dramatic findings in the survey shows that 72% of respondents said they were unhappy sharing personal information when using an app, an increase from 65% in 2013. In the U.S., the 2014 number was 79% who said they were not comfortable sharing personal information. And 69% said they had the right to own any data collected through their smart devices.

"These figures have significant consequences for those looking to develop the Internet of Things which seeks to connect billions of devices to the Internet and to each other," the survey report said.

Because of a lack of trust over security, 36% in the overall survey said they hadn't tried out a mobile wallet on a smartphone. Meanwhile, only 15% said they had already used a mobile wallet or were thinking of doing so. Mobile users are concerned their personal information might be used without their consent, including 22% who are concerned their financial data might be stolen.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com