Cisco Network Security Configuration Commands

Basic Passwords

Line con 0
password <password>
login

Config mode password: enable password <password>

OSPF MD5 Authentication

router ospf 1
area 0 authentication message-digest

MD5 Key Configuration

int <Serial Ports>
ip ospf message-digest key 1 md5 <Password>
show ip ospf

NTP Configuration

Configure NTP Settings in server under NTP Tab
ntp server <Server Address>
ntp update-calendar

NTP Authentication on Router

ntp authenticate
ntp trusted-key 1
ntp authentication-key 1 md5

Read More

SAP Certified Technology Associate – System Administration (Oracle DB) with SAP NetWeaver 7.0

SAP Certified Technology Associate – System Administration (Oracle DB) with SAP NetWeaver 7.0 (C_TADM51_70)

Version: 5.0

Question 1

Oracle database offers different types of indexes. Which are valid index types? (Choose two.)

  • A. Bitmap index
  • B. Unique master index
  • C. Dictionary index
  • D. Balanced tree (B*tree) index

Answer: A, D

Question 2

Regarding the object, TemSe, of the SAP spool system, which of the following statements are correct? (Choose two.)

  • A. TemSe stores, for example, spool data.
  • B. TemSe always
Read More

C Code for a Calculator Using Pipes and ‘bc’

This code implements a calculator that reads arithmetic operations from an input file, uses the ‘bc’ command-line utility to perform the calculations, and writes the results to an output file. It demonstrates the use of pipes for inter-process communication in a Linux environment.

Code Description

The program takes two command-line arguments:

  • Input file: Contains arithmetic operations.
  • Output file: Stores the results of the calculations.

The leer_op function reads the input file, identifies arithmetic

Read More

VLANs, VTP, and STP Configuration in Network Switches

Image

See the image. What forms the router handles traffic when a VLAN is received on the trunk link? (Choose two.)

  • The router cannot route between VLANs because the interface Fa0/0 IP address is required.
  • The packets that are received from the network 192.168.20.0/24 are handled by the Fa0/0.20 subinterface.

Image

See the image. A network administrator divided the network into two VLANs. Hosts connected can only access the resources of their own VLAN. What is the most scalable and economic solution to enable

Read More

MySQL User Permissions and Database Queries

Specific Queries and User Management

A specific query that shows global users who have permission to grant on all tables of the ‘jmmusuarios’ database:

CREATE USER 'globalnoconcede'@'localhost' IDENTIFIED BY 'soyglobal';
GRANT ALL PRIVILEGES ON JMMUSUARIOS.* TO 'globalnoconcede'@'localhost';

SELECT DB.User, DB.Db, DB.Grant_priv
FROM MYSQL.DB
WHERE DB.Db LIKE 'jmmusuarios'
AND DB.Grant_Priv LIKE 'Y';

Query that shows the functions and procedures in the system:

DESCRIBE MYSQL.PROC;

SELECT PROC.name, PROC.

Read More

SQL Queries and PL/SQL Functions Examples

SQL Queries

Find series name by episode:

SELECT s.nombre "NOMBRE SERIE"
FROM SERIE s
WHERE s.ID_CODSERIE = (
  SELECT e.SERIE_ID_CODSERIE
  FROM EPISODIO e
  WHERE e.NOMBRE = 'la manzana madura'
);

Find actor name by character:

SELECT a.nombre "NOMBRE ACTOR"
FROM actor a
WHERE a.ID_ACTOR = (
  SELECT p.ACTOR_ID_ACTOR
  FROM personaje p
  WHERE p.NOMBRE = 'Sheldon'
);

Find actors who won a Grammy:

SELECT a.NOMBRE "NOMBRE ACTOR", a.F_NAC "FECHA DE NACIMIENTO"
FROM ACTOR a
INNER JOIN GANA g ON a.ID_ACTOR 
Read More