Cisco Network Security Configuration Commands
Basic Passwords
Line con 0
password <password>
login
Config mode password: enable password <password>
OSPF MD5 Authentication
router ospf 1
area 0 authentication message-digest
MD5 Key Configuration
int <Serial Ports>
ip ospf message-digest key 1 md5 <Password>
show ip ospf
NTP Configuration
Configure NTP Settings in server under NTP Tab
ntp server <Server Address>
ntp update-calendar
NTP Authentication on Router
ntp authenticate
ntp trusted-key 1
ntp authentication-key 1 md5
SAP Certified Technology Associate – System Administration (Oracle DB) with SAP NetWeaver 7.0
SAP Certified Technology Associate – System Administration (Oracle DB) with SAP NetWeaver 7.0 (C_TADM51_70)
Version: 5.0
Question 1
Oracle database offers different types of indexes. Which are valid index types? (Choose two.)
- A. Bitmap index
- B. Unique master index
- C. Dictionary index
- D. Balanced tree (B*tree) index
Answer: A, D
Question 2
Regarding the object, TemSe, of the SAP spool system, which of the following statements are correct? (Choose two.)
- A. TemSe stores, for example, spool data.
- B. TemSe always
C Code for a Calculator Using Pipes and ‘bc’
This code implements a calculator that reads arithmetic operations from an input file, uses the ‘bc’ command-line utility to perform the calculations, and writes the results to an output file. It demonstrates the use of pipes for inter-process communication in a Linux environment.
Code Description
The program takes two command-line arguments:
- Input file: Contains arithmetic operations.
- Output file: Stores the results of the calculations.
The leer_op
function reads the input file, identifies arithmetic
VLANs, VTP, and STP Configuration in Network Switches
See the image. What forms the router handles traffic when a VLAN is received on the trunk link? (Choose two.)
- The router cannot route between VLANs because the interface Fa0/0 IP address is required.
- The packets that are received from the network 192.168.20.0/24 are handled by the Fa0/0.20 subinterface.
See the image. A network administrator divided the network into two VLANs. Hosts connected can only access the resources of their own VLAN. What is the most scalable and economic solution to enable
Read MoreMySQL User Permissions and Database Queries
Specific Queries and User Management
A specific query that shows global users who have permission to grant on all tables of the ‘jmmusuarios’ database:
CREATE USER 'globalnoconcede'@'localhost' IDENTIFIED BY 'soyglobal';
GRANT ALL PRIVILEGES ON JMMUSUARIOS.* TO 'globalnoconcede'@'localhost';
SELECT DB.User, DB.Db, DB.Grant_priv
FROM MYSQL.DB
WHERE DB.Db LIKE 'jmmusuarios'
AND DB.Grant_Priv LIKE 'Y';
Query that shows the functions and procedures in the system:
DESCRIBE MYSQL.PROC;
SELECT PROC.name, PROC.
SQL Queries and PL/SQL Functions Examples
SQL Queries
Find series name by episode:
SELECT s.nombre "NOMBRE SERIE"
FROM SERIE s
WHERE s.ID_CODSERIE = (
SELECT e.SERIE_ID_CODSERIE
FROM EPISODIO e
WHERE e.NOMBRE = 'la manzana madura'
);
Find actor name by character:
SELECT a.nombre "NOMBRE ACTOR"
FROM actor a
WHERE a.ID_ACTOR = (
SELECT p.ACTOR_ID_ACTOR
FROM personaje p
WHERE p.NOMBRE = 'Sheldon'
);
Find actors who won a Grammy:
SELECT a.NOMBRE "NOMBRE ACTOR", a.F_NAC "FECHA DE NACIMIENTO"
FROM ACTOR a
INNER JOIN GANA g ON a.ID_ACTOR