Cisco Answers Please help meeeeeeeeeeeeeeeeeeeeeee?

Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?

Which two characteristics describe a worm? (Choose two.)
Executes when software is run on a computer.
Is self-replicating.
Hides in a dormant state until needed by an attacker.
Infects computers by attaching to software code.
Travels to new computers without any intervention or knowledge of the user.

Which two statements are true about username and password standards? (Choose two.)
The username naming convention should be kept simple.
Usernames should expire periodically.
The passwords should be kept simple and easy to remember.
Rules about password expiration and lockout should be defined.
BIOS passwords should be given to users to enable them to configure their computer.

Which two items can be downloaded from the Microsoft website to help protect Windows XP? (Choose two.)
ROM upgrades
service packs
security patches
BIOS upgrades
DirectX updates

A fingerprint reader is an example of which security technology?

Which best practice should be included in a password protection policy?
Encourage users to document passwords in a personal file.
Enforce password protection at the BIOS level.
Implement lockout rules upon consecutive unsuccessful attempts at accessing the system.
Restrict passwords to text-based strings.

What must be done to ensure that the anti-virus software on a computer is able to detect and eradicate the most recent viruses?
Download the latest signature files on a regular basis.
Schedule a scan once a week.
Schedule anti-virus updates using Windows Task Manager.
Follow the firewall configuration guidelines on the anti-virus manufacturer website.

Where is the safest place to store backups?
portable lock box
locked telecommunications room
locked server room
offsite secure facility

Which type of program causes banners and ads to appear on the desktop without any user intervention?
stealth virus
trojan horse

An employee for a small company inadvertently allows a visitor to see their username and password. At home, the visitor then uses this information to gain access to the company network. This is an example of what type of threat?
social engineering

A technician has downloaded the latest Windows XP updates from the Microsoft website. What should the technician do before installing the updates?
Create a restore point.
Manually update the Last Known Good Configuration.
Reinstall the anti-virus software.
Change the firewall rules to enable the installer to access port 8900 of the Microsoft server.

The only Cisco related question i can see would possibly be:

Which wireless security technology is a good choice when using Cisco equipment in conjunction with operating systems such as Windows and Linux?

And with that question i would answer WPA

Posted in Backup Best Practices | 1 Comment

gparted destroying my backup drive?

I’m ultimately about to ask about partition recovery but please read on for the specifics!

Well today has been a techno disaster

Windows went down so booted to an old 6.06 lts ubuntu live cd to fix the mess.

Decided to do a backup of my important files first so connected my 1TB drive with lots of important files…..but of course ubuntu couldn’t write to ntfs properly back then so hit a problem.

To solve it I fired up parted switched to my backup drive. Which had all the options grayed out as it was mounted.

No matter. Terminal > sudo umount /dev/sdb

….not found.

After a seconds thought I right clicked the desktop icon for the drive and chose eject. Then refreshed parted. Options ungrayed result.

Entered two changes: resize the original ntfs backup partition with all of my files on it to leave 7odd th at the end. And reformat that empty space with extra3.

Selected option to write changes to disk.

Task one started then suddenly ubuntu remounted the drive of its own accord before the first task had completed. I can only assume it has some misguided urge to mount external disks.

An error screen also popped up which I closed too quickly without reading it as I wrongly concluded it was the second new partition which had also been mounted.

Now gparted shows the disk as divided into two with both marked as of unknown filesystem. The second takes up no actual space but appears on the list. The first has maintained its boot flag.

Help how do I recover my backup partition??
Sorry for typos Android phone prediction run amoc

Parted = gparted

Th =gb
Sorry for typos Android phone prediction run amoc

Parted = gparted

Th =gb
Sorry for typos Android phone prediction run amoc

Parted = gparted

Th =gb

I once had a similar problem and TestDisk was able to recover the partition

Posted in Windows Disaster Recovery | 1 Comment

Can you answer true or false to these computer questions?

1) A floppy disc is actually a piece of Mylar similar that is used for overhead transparencies
2) A 3 1/2 inch high density floppy disc has 224 entries in the root directory
3) Subdirectories can have as many entries as disk space allows
4) You may share IRQs with ISA devices on the ISA bus
5) THe number of memory addresses is partly limited
6) Hard copy is a term associated with a printer
7) Newer motherboards typically do not provide a connection for a floppy drive
8) Most SRAM now inside the processor housing
9) WHen examining memory measured in nanoseconds, the larger the number, the faster the memory
10) CISC CPUs are typically faster than RISC CPUs
11) One port fails on a non critial machine. You shold replace the motherboard
12) In windows 9x, a compressed drive is not a drive at all, its a file
13) Hardware disk cache is faster thank a software cache
14) You should verify that your recovery plans works by practicing it before disaster occurs

Thanks for your time

How will you learn if I tell you the answers? But here they are:

1. False – it’s a magnetic surface
2. True – yes, 224 root directories possible
3. False – Windows has a limit on directories and subdirectories- 255 deep maximum.
4. False – ISA are memory address specific-no sharing.
5. True – only sixteen IRQ but with port steering and USB managing them, it can appear to be more than sixteen.
6. True – hard copy/paper copy
7. False – Yes they do in case you want to use them.
8. False – SRAM is on cards, HD and hardware -too slow for processor.
9. False – smaller is always faster
10. False – less instructions to prevent slow down of processing time.
11. False – Just use another port if available
12. True – A compressed drive would not function-only a big file.
13. True – way faster!
14. True – of course!

Let me know how I did on your homework. :-)

Posted in Windows Disaster Recovery | 3 Comments