Category: 120 Labs CCNA
120 Labs and solutions to give you the confidence and speed to pass the practical teste in your Cisco CCNA and CCENT exams: Exam CCNA 200-125, Exam ICND1 100-105, Exam ICND2 200-105
DevNet Associate (Version 1.0) – DevNet Associate Module 6 Exam 1. Which technique is used to help mitigate SQL injection attacks? using the same owner or admin account in the web applications to connect to the database limiting the read access to specific fields of a table or …
Monitoring the status of a device is really helpful, especially in troubleshooting issues. Almost all devices have their own method to provide log information about the usage of devices. Administrators use these logs to find the solutions to troubleshoot the issues caused by devices. However, collecting and monitoring …
In nowadays, high availability and redundancy is one of the most important factor to enhance the productivity and reputation of an organization. The redundancy can be applied at the various levels such as Server level, Disk-level, and even the network device-level. In this exercise, we will explain the …
There are many ways to interconnect routers. One of the most popular and traditional way to interconnect routers on a WAN network is using the Serial interfaces. A serial cable has two ends: Data Communication Equipment (DCE) and Data Terminal Equipment (DTE). The DCE end is typically located …
Frame-relay is a WAN technology that supports up to 44.3 Mbps of speed. Nowadays it is not so much popular and heavily replaced by the latest technologies such as ATM. We assume that you know the basics of Frame-relay technology and are familiar with the basic components such …
Network Address Translation (NAT) technique translates private IP addresses into public IP addresses. NAT enhances the security of the network by hiding the actual IP information from the external users. The external users see the translated IP addresses rather than actual IP addresses. This is also called masking. …
Access Control List (ACL) is a security feature that allows you to filter the network traffic based on configured statements. An ACL can be used to filter either inbound or outbound traffic on an interface. Once you applied an access list on a router, the router examine every …
We know that Spanning-Tree Protocol (STP) help us to prevent to occur switching loop. However, spanning-tree sometime can also create a problem for your network. For example, suppose you have a server that is connected into your switch. You are sure that there are no chances to occur …