Jumat, 15 Agustus 2014

Install Windows 8

Halo Sobat Blogger :)
kali ini saya akan nge post tentang Install Windows 8 :)

Jika sobat ingin beralih dari windows 7 ke windows 8 tutorial ini sangat lah tepat untuk sobat yang ingin mencobanya dan menginstall windows 8 nya. Perlu sobat ketahui Windows 8 mempunyai minimal spesifikasinya, berikut ini detailnya :

Cara menjadi penulis novel

Hallo sobat Blogger :)
apakah Anda ingin tahu tentang Bagaimana Cara Menjadi Penulis Novel?


>DsmbISP< Kunci Jawaban Cisco CCNA Discovery 2 Final Exam

1. A company is developing an Internet store for its website. Which protocol should be used to transfer credit card information from customers to the company web server?
FTPS
HTTP
HTTPS
WEP2
TFTP

Kunci Jawaban Cisco CCNA Discovery 2 Final Exam

1. Which statement is true about FTP implementations?
The protocol interpreter (PI) function engages once the data transfer process (DTP) function is complete.
The DTP function is responsible for the login sequence.
FTP requires two connections, one for control and one for data.
Both the PI and the DTP close automatically when the transfer is complete.

>DsmbISP< Kunci jawaban Cisco CCNA Discovery 2 Chapter 9

1. How many usable host addresses does the 192.168.1.0/25 subnet provide?
254
128
127
126
64
62

Kunci Jawaban Cisco CCNA Discovery 2 Chapter 9

1. A user can access any web page on the Internet but cannot access e-mail. What troubleshooting method would be most efficient for troubleshooting this issue?
top-down
bottom-up
divide-and-conquer
impossible to determine from this information

>DsmbISP< Kunci Jawaban Cisco CCCNA Discovery 2 Chapter 8

1. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network?
Which AAA service provides detailed reporting and monitoring of network user behavior, and also keeps a record of every access connection and device configuration change across the network?

authentication
accreditation
accounting
authorization


Kunci Jawaban Cisco CCNA Discovery 2 Chapter 8

1. A company wants to configure a firewall to monitor all channels of communication and allow only traffic that is part of a known connection. Which firewall configuration should be deployed?
packet filtering
proxy
stateful packet inspection
stateless packet inspection

>DsmbISP< Kunci Jawaban Cisco CCNA Discovery 2 Chapter 7



1. Which two statements are true about the OSI and TCP/IP models? (Choose two.)
The two bottom layers of the TCP/IP model make up the bottom layer of the OSI model.
The TCP/IP model is a theoretical model and the OSI model is based on actual protocols.
The OSI network layer is comparable to the Internet layer of the TCP/IP model.
The TCP/IP model specifies protocols for the physical network interconnection.
The TCP/IP model is based on four layers and the OSI model is based on seven layers.


Kunci Jawaban Cisco CCNA Discovery 2 Chapter 7

1. Which DNS zone resolves an IP address to a qualified domain name?
dynamic lookup
forward lookup
resolution lookup
reverse lookup

>DsmbISP< Kunci Jawaban CCNA Discovery 2 Chapter 6

1. Which command is used to view the RIP routing protocol settings and configuration?
show version
show ip route
show interface
show ip protocols


Kunci Jawaban Cisco CCNA Discovery 2 Chapter 6

1. Which protocol is an exterior routing protocol?
BGP
EIGRP
OSPF
RIP

>DsmbISP< Kunci Jawaban Cisco CCNA Discovery 2 Chapter 5

1. In what two ways does SDM differ from the IOS CLI? (Choose two.)
SDM is used for in-band management only. The IOS CLI can be used for in-band and out-of-band management.
SDM is accessed through a Telnet application. The IOS CLI is accessed through a web browser.
SDM is available for all router platforms. The IOS CLI is available for a limited number of Cisco devices.
SDM utilizes GUI buttons and text boxes. The IOS CLI requires the use of text-based commands.
SDM is used for advanced configuration tasks. The IOS CLI is preferred for initial basic device configuration.


Kunci Jawaban Cisco CCNA Discovery 2 Chapter 5

. Which tasks can be accomplished by using the command history feature? (Choose two.)
View a list of commands entered in a previous session.
Recall up to 15 command lines by default.
Set the command history buffer size.
Recall previously entered commands.
Save command lines in a log file for future reference.

>DsmbISP< Kunci Jawaban Cisco CCNA Discovery 2 Chapter 4

1. In an 8 bit binary number, what is the total number of combinations of the eight bits?
128
254
255
256
512
1024


Kunci Jawaban Cisco CCNA Discovery 2 Chapter 4

1. Which two statements describe classful IP addresses? (Choose two.)
It is possible to determine which class an address belongs to by reading the first bit.
The number of bits used to identify the hosts is fixed by the class of the network.
Only Class A addresses can be represented by high-order bits 100.
Up to 24 bits can make up the host portion of a Class C address.
Up to 24 bits can be used to identify unique networks.
Three of the five classes of addresses are reserved for multicasts and experimental use.

>DsmbISP< Kunci Jawaban Cisco CCNA Discover 2 Chapter 3

1. Which two benefits can be gained by locating network equipment in a telecommunications closet, rather than in a user area? (Choose two.)
faster communication speeds
improved physical security
more resistant to hacker attempts
centralized cable management
less electrical usage


Kunci Jawaban Cisco CCNA Discovery 2 Chapter 3

1. Which type of cable has a solid copper core with several protective layers including PVC, braided wire shielding, and a plastic covering?
STP
UTP
coaxial
fiber optic

>DsmbISP< Kunci Jawaban Cisco CCNA Discovery 2 Chapter 2

1. Which two functions are provided by the upper layers of the OSI model? (Choose two.)
placing electrical signals on the medium for transmission
initiating the network communication process
encrypting and compressing data for transmission
segmenting and identifying data for reassembly at the destination
choosing the appropriate path for the data to take through the network


Kunci Jawaban Cisco CCNA Discovery 2 Chapter 2

1. Which device is responsible for moving packets between multiple network segments?
switch
CSU/DSU
IDS device

>DsmbISP< Kunci Jawaban Cisco CCNA Discovery 2 Chapter 1

1. Which two things can be determined by using the ping command? (Choose two.)
the number of routers between the source and destination device
the IP address of the router nearest the destination device
the average time it takes a packet to reach the destination and for the response to return to the source
whether or not the destination device is reachable through the network
the average time it takes each router in the path between source and destination to respond


Kunci Jawaban Cisco CCNA Discovery 2 Chapter 1

1. Which network support services team identifies whether the client site has existing network hardware and circuits installed?
customer service
help desk
network operations
planning and provisioning

Kunci Jawaban Cisco IT ESENTIAL Final Exam

1
Which power criterion will affect the number of internal drives that are installed in a computer?
+5VDC output
+20VDC output
AC input
DC output
power supply voltage
power supply wattage


Kunci Jawaban Cisco CCNA Discovery 1 Final EXAM

1. A host sent a message that all other hosts on the switched local network received and processed. What type of domain are all these hosts a part of?
 local domain
 multicast domain
 collision domain
 broadcast domain

2. Which two statements are true about local applications? (Choose two.)
 They run on the network.
 An example of a local application is e-mail.
 They are accessed from a remote computer.
 They are stored on the local hard disk.
 They run on the computer where they are installed.


3.
Refer to the exhibit. What cabling fault does the exhibit represent?
 open
 reversed pair
 short
 split pair

4. A learner wants to interact with the operating system of a computer. Which two methods can be used for this? (Choose two.)
 CLI
 GUI

 kernel
 third party software
 shell

5. What is an advantage of selecting an operating system that has a commercial license over one with a GPL license?
 The commercial license-based operating system ensures full access to the source code for everyone.
 The commercial license-based operating system ensures that everyone can participate in the enhancement of the product.
 The commercial license-based operating system provides structured support.
 The commercial license-based operating system is released free of charge.

6.
Refer to the exhibit. If H4 sends a message to H1 and the destination MAC address is in the MAC table for both Switch1 and Switch2, which host devices will receive the message?
 only H1
 hosts H1 and H4
 all hosts that are connected to Switch1
 all hosts that are connected to Switch1 and Switch2

7. For an IP address, what component decides the number of bits that is used to represent the host ID?
 default-gateway
 host number
 network number
 subnet mask

8. The help desk at a large packaging company receives a call from a user who is concerned about lost data files on the local PC. The help desk technician learns that the user clicked on an icon that appeared to be a program update, but no updates were scheduled for that program. What type of attack has likely occurred?
 worm
 DDoS
 brute force
 Trojan horse

9. What is the purpose of the ipconfig /release command?
 It forces a client to give up its current IP address.
 It forces a client to give up its current MAC address.
 It forces the client to clear all the MAC address to IP address associations it has learned.
 It shows the current IP configuration on the client.

10. Which protocol in its default configuration downloads e-mail messages to the client computer and deletes them from the server?
 FTP
 POP3
 SMTP
 IMAP4


11. What are two examples of storage peripheral devices? (Choose two.)
 printer
 flash drive
 headphones
 external DVD
 barcode reader

12. What is the function of the DNS server?
 It maps the IP address to the MAC address.
 It translates a computer or domain name to the associated IP address.
 It manages the domain that clients are assigned to.
 It accepts HTTP requests from clients.

13. What is the default subnet mask for an IP address of 64.100.19.14?
 255.0.0.0
 255.255.0.0
 255.255.255.0
 255.255.255.255

14. What are two best practices that are used when configuring a small home WLAN? (Choose two.)
 the use of EAP
 the encryption of the SSID
 the use of pre-shared keys
 the use of open authentication
 the disabling of SSID broadcasting

15. A network engineer wants to represent confidential data in binary format. What are the two possible values that the engineer can use? (Choose two.)
 0
 1

 2
 A
 F

16.
Refer to the exhibit. What is the purpose of assigning a network name of College?
 It enables access to the AP configuration GUI by name rather than by address.
 It encrypts data between the wireless client and the AP.
 It identifies the wireless LAN.
 It translates an internal address or group of addresses to a public address.
 It translates IP addresses into easy-to-remember domain names.

17. A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
 ping
 tracert
 netstat
 ipconfig
 nslookup

18. Which two causes of networking problems are related to the physical layer? (Choose two.)
 disconnected cables
 improper operation of cooling fans

 incorrect MAC address
 incorrect default gateway
 incorrect subnet mask

19. A network technician is required to provide access to the Internet for a large company. What is needed to accomplish this task?
 ISP
 private IP addresses for each host
 static IP addresses for each host
 DHCP server

20. Your school network blocks all websites related to online gaming. What type of security policy is being applied?
 identification and authentication
 remote access
 acceptable use
 incident handling

21.
Refer to the exhibit. What is the effect of setting the security mode to WEP on the Linksys integrated router?
 The WEP security mode enables the AP to inform clients of its presence.
 The WEP security mode encrypts network traffic during transmission between the AP and the wireless client.
 The WEP security mode generates a dynamic key each time a client establishes a connection with the AP.
 The WEP security mode identifies the WLAN.

22. When terminating UTP cabling, why is it important to untwist only a small amount of each wire pair?
 minimizes crosstalk
 makes installation faster
 ensures wires are in correct order
 makes it easier to fit wires into connector

23. Which part of the electromagnetic spectrum is commonly used to exchange data between a PDA and a computer?
 FM
 radar
 infrared
 ultraviolet

24. A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
 ping
 netstat
 tracert
 ipconfig
 nslookup

25. 
Refer to the exhibit. A user on host A sends an e-mail to the user on host B. Which type of message does host A send?
 broadcast
 multicast
 simulcast
 unicast

26. Which two transport layer protocols enable hosts to communicate and transfer data? (Choose two.)
 DHCP
 ICMP
 IP
 TCP
 UDP


27. The area covered by a single AP is known as what?
 ad-hoc network
 basic service set
 independent basic service set
 extended service set
 distribution system

28. What is the purpose of spam filter software?
 It detects and removes spyware.
 It detects and removes viruses.
 It prevents the display of advertisement windows.
 It examines incoming e-mail messages to identify the unsolicited ones.

29. What type of message is sent to a specific group of hosts?
 static
 unicast
 dynamic
 multicast
 broadcast

30. What layer is the first point of entry for a host into the network?
 core layer
 access layer
 network layer
 distribution layer

31. What type of cable would be required to connect a Linksys router to a wired PC?
 crossover cable
 rollover cable
 serial cable
 straight-through cable

32. 
Refer to the exhibit. Why would a network administrator use the network mode that is shown?
 to support hosts on different IP networks
 to support hosts that use different 802.11 standards
 to support both wireless and wired Ethernet hosts
 to support hosts with different operating systems
 to support hosts with network cards from different manufacturers

33. In an attempt to verify connectivity, a user issues the ping command to a device that is not on the local network. The ping is unsuccessful. What can be determined from this result?
 The default gateway is misconfigured.
 The patch cable on the host station is faulty.
 The router between the host and destination is faulty.
 Further troubleshooting will be required to reach a definite conclusion.

34. What is the function of CSMA/CA on a wireless Ethernet network?
 to prevent collisions
 to broadcast messages
 to select the least congested channel
 to establish an ACK between devices

35. Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
 Increase the AP radio signal strength.
 Place the AP in a more central location.
 Deploy an external omni-directional antenna.
 Reduce the number of devices using each channel.

36. Which installation option enables a single physical resource to function simultaneously as multiple logical resources?
 clean install
 multi-boot
 upgrade
 virtualization

37. What is the purpose of creating a DMZ during network firewall implementation?
 to create a server security zone accessible only to internal clients
 to create a dirty zone that allows all inbound and outbound traffic
 to allow for a publicly accessible zone without compromising the internal network
 to specify a higher security level than normally required for the internal production network

38. What is specified by the host bits in an IP address?
 broadcast identity of the network
 identity of the computer on the network
 network that is being addressed
 network to which the host belongs

39. Which of the following are the address ranges of the private IP addresses? (Choose three.)
 10.0.0.0 to 10.255.255.255
 200.100.50.0 to 200.100.25.255
 150.150.0.0 to 150.150.255.255
 172.16.0.0 to 172.31.255.255
 192.168.0.0 to 192.168.255.255

 127.16.0.0 to 127.31.255.255

40. Which type of computer uses an integrated monitor and keyboard?
 pocket PC
 laptop
 mainframe
 server
 workstation


41. A company has a web server that must be accessible to both external and internal clients. Which security policy best practice should be followed to maximize security of the server?
 Place the web server in a DMZ.
 Keep the web server on the external network.
 Configure a firewall device to serve as the web server.
 Locate the web server in the server farm of the internal network.

42. What advantage does a peer-to-peer network have over a client-server network?
 It increases security.
 It increases scalability.
 It produces a higher performance for hosts.
 It eliminates the need for centralized administration.

43. Where do ISPs get the public addresses that they assign to end users?
 ISPs create the addresses themselves.
 ISPs are assigned addresses through the RFC.
 ISPs obtain their addresses automatically.
 ISPs obtain address blocks from registry organizations.

44. Which part of a data packet is used by a router to determine the destination network?
 source IP address
 user data
 destination IP address
 control information
 destination MAC address

45. 
Refer to the exhibit. Assume that the command output is from a wireless DHCP client that is connected to a Linksys integrated router. What can be deduced from the output?
 The DHCP configuration on the router needs to be verified.
 The WEP key or SSID needs to be verified.
 The wireless connection is operational.
 The wireless NIC driver or the NIC itself needs to be reinstalled.

46. When acting as a DHCP server, an integrated router can provide what three types of information to a client? (Choose three.)
 physical address
 MAC address
 default gateway
 static IP address
 dynamic IP address
 DNS server address


47. Which transport layer protocol is used when an application requires acknowledgment that data has been delivered?
 FTP
 TCP
 UDP
 RTP
 SMTP

48. What does the term "attenuation" mean in data communication?
 loss of signal strength as distance increases
 time for a signal to reach its destination
 leakage of signals from one cable pair to another
 strengthening of a signal by a networking device

49. A user is unable to send e-mail. While troubleshooting this problem, the network technician first verifies the physical connectivity of cables. Which troubleshooting approach is being followed?
 bottom-up
 divide-and-conquer
 top-down
 trial and error

50. 
Refer to the graphic. Assume that the exhibited output is from a host that is connected to a Linksys integrated router. What is one of the first things you should check?
 IP address on the host
 IP address on the router
 subnet mask on the host
 default gateway on the host
 link status LED on the front of the router

kunci Jawaban Cisco CCNA Discovery 1 Chapter 9

1. How does remote-access software help in the troubleshooting process?

Diagnostics can be run without a technician being present at the site.

Kunci Jawaban Cisco CCNA Discovery 1 Chapter 8

1. A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?

SYN flooding

Kunci Jawaban Cisco CCNA Discovery 1 Chapter 7

1. What are two authentication methods that an access point could use? (Choose two.)

EAP
pre-shared keys

Kunci Jawaban Cisco CCNA Discovery 1 Chapter 6

1. Which port number is used by SMTP?
25

Kunci Jawaban Cisco CCNA Discovery 1 Chapter 5

1. How large are IPv4 addresses?
32 bits

Kunci Jawaban Cisco CCNA Discovery 1 Chapter 3

1. Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all other hosts disregard the request. What protocol was used in this scenario?
ARP

Kunci Jawban Cisco CCNA Discovery 1 Chapter 4

1. What are three commonly followed standards for constructing and installing cabling? (Choose three.)
pinouts
cable lengths
connector color
connector types
cost per meter (foot)
tensile strength of plastic insulator

Kunci Jawaban Cisco CCNA Discovery 1 Chapter 2

1. A computer in the Advanced Technology Center computer room on the second floor, room number 217, has the computer name ATC_217_7. What fact is true about the computer name?
The name is dynamically assigned by the DNS server.
The name is required to allow connectivity to the DHCP server.
The name must include the floor number to support the SLA agreement.
The names of all devices in a workgroup must be the same to allow LAN connectivity.
The name makes it easier for users to reference the device when connecting to it to share resources.

Kunci Jawban Cisco CCNA Discovery 1 chapter 1

Applications can be grouped into general use software or industry specific software. What are two examples of industry specific software? (Choose two.)
  • an educational tool
  • presentation
  • spreadsheet
  • word processing
  • medical practice management software
  • database management

Aktivator Windows 8

Halo Sobat Blogger :D

Kali ini saya akan nge post tentang Aktivator Windows 8

#Aktivator ini saya ambil dari blog lain

Saya hanya membantu saja agar lebih mudah pencarian tentang aktivator Windows 8

Cara Aktivasinya

Aktivator Windows XP, Windows 7

Halo Sobat Blogger :D

Kali ini saya akan nge post tentang bagaimana cara aktivasi Windoes kita yang masih Trial :D

Cara Menggunakannya ==

Install Windows 7

Halo sobat Blogger :D
Kali ini saya akan Ngepost tentang cara "INSTALASI WINDOWS 7"

Download CCcleaner

Halo sobat Blogger :)

Kali ini saya akan nge posting tentang "CC Cleaner " 

Download KMP Player

Hallo sobat Blogger :)

Kali ini sya akan posting sebuah program aplikasi yaitu "KMP Player"

Sedikit tentang KMP Player bagi yg belum tau :D


The Alien Rainbow Pinwheel - Link Select