Thursday, September 4, 2014

PES 2013 Update Transfer 3 September 2014

Pro Evolution Soccer 2014 atau yang biasa disebut PES 2014 sudah lama dirilis, akan tetapi peminat PES 2013 masih sangat banyak. Kok bisa begitu ya? Nah, karena peminat PES 2013 yang masih sangat banyak, kali ini saya akan membagikan Update Transfer Pemain Terbaru PES 2013. Namun, sebelum menggunakan update transfer pemain ini, saya sarankan untuk menginstall  PESEdit 2013 Patch 6.0 terlebih dahulu, supaya lebih greget hehe.

Screenshot



Download :

Cara Install :
  1. Download Update Transfer Pemain Terbaru PES 2013 melalui link di atas
  2. Ekstrak file yang sudah kamu download tadi dengan WinRAR
  3. Jika dimintai password, masukkan dnshare
  4. Ikuti langkah - langkahnya
  5. Selesai

Wednesday, August 27, 2014

PES 2013 Update 2014/2015 - League Structure

Pro Evolution Soccer 2014 atau yang biasa disebut PES 2014 sudah lama dirilis, akan tetapi peminat PES 2013 masih sangat banyak. Kok bisa begitu ya? Nah, karena peminat PES 2013 yang masih sangat banyak, kali ini saya akan membagikan Update Transfer Pemain Terbaru PES 2013. Namun, sebelum menggunakan update transfer pemain ini, saya sarankan untuk menginstall  PESEdit 2013 Patch 6.0 terlebih dahulu, supaya lebih greget hehe.

Screenshot





Download :

Cara Install :
  1. Download Update Transfer Pemain Terbaru PES 2013 melalui link di atas
  2. Ekstrak file yang sudah kamu download tadi dengan WinRAR
  3. Jika dimintai password, masukkan dnshare
  4. READ ME!!
  5. Selesai

Saturday, April 21, 2012

ERouting Chapter 1


Take Assessment - ERouting Chapter 1 - CCNA Exploration: Routing Protocols and Concepts (Version 4.0)

1
If a router cannot find a valid configuration file during the startup sequence, what will occur?

The startup sequence will reset.
The router will prompt the user for a response to enter setup mode.
The startup sequence will halt until a valid configuration file is acquired.
The router will generate a default configuration file based on the last valid configuration.
The router will monitor local traffic to determine routing protocol configuration requirements.

2

Refer to the exhibit. Host A pings host B. When R4 accepts the ping into the Ethernet interface, what two pieces of header information are included? (Choose two.)

source IP address: 192.168.10.129
source IP address: BBBB.3333.5677
source MAC address: 5555.AAAA.6666
destination IP address: 192.168.10.33
destination IP address: 192.168.10.134
destination MAC address: 9999.DADC.1234



3
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface
console interface
Ethernet interface
secret EXEC mode
privileged EXEC mode
router configuration mode



4
What is the outcome of entering these commands?
R1(config)# line vty 0 4
R1(config-line)# password check123
R1(config-line)# login

ensures that a password is entered before entering user EXEC mode
sets the password to be used for connecting to this router via Telnet
requires check123 to be entered before the configuration can be saved
creates a local user account for logging in to a router or switch



5
Which two statements correctly describe the components of a router? (Choose two.)

RAM permanently stores the configuration file used during the boot sequence.
ROM contains diagnostics executed on hardware modules.
NVRAM stores a backup copy of the IOS used during the boot sequence.
Flash memory does not lose its contents during a reboot.
ROM contains the most current and most complete version of the IOS.
Flash contains boot system commands to identify the location of the IOS.



6
A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?

Router1# copy running-config flash
Router1(config)# copy running-config flash
Router1# copy running-config startup-config
Router1(config)# copy running-config startup-config
Router1# copy startup-config running-config
Router1(config)# copy startup-config running-config



7

The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)

Sydney(config-if)# ip address 201.100.53.2 255.255.255.0
Sydney(config-if)# no shutdown
Sydney(config-if)# ip address 201.100.53.1 255.255.255.224
Sydney(config-if)# clock rate 56000
Sydney(config-if)# ip host Melbourne 201.100.53.2



8
Which two statements describe characteristics of load balancing? (Choose two.)

Load balancing occurs when a router sends the same packet to different destination networks.
Load balancing occurs when the same number of packets are sent over static and dynamic routes.
Load balancing allows a router to forward packets over multiple paths to the same destination network.
Unequal cost load balancing is supported by EIGRP.
If multiple paths with different metrics to a destinations exist, the router cannot support load balancing.



9
What three processes does a router execute when it receives a packet from one network that is destined for another network? (Choose three.)

decapsulates the Layer 3 packet by stripping off the Layer 2 frame header
uses the destination MAC Address in the IP Header to look up the next-hop address in the routing table
leaves the Layer 2 frame header intact when decapsulating the Layer 3 packet
uses the destination IP Address in the IP header to look up the next-hop address in the routing table
encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface
encapsulates the Layer 3 packet into a special Layer 1 frame and forwards it to the exit interface



10

Which interfaces in the exhibit could be used for a leased line WAN connection? (Choose two.)

1
2
3
4
5
6



11

Refer to the exhibit. What can be concluded from the output of the running-configuration of a router?

The passwords are encrypted.
The current configuration was saved to NVRAM.
The configuration that is shown will be the one used on the next reboot.
The commands that are displayed determine the current operation of the router.



12
Which are functions of a router? (Choose three.)

packet switching
extension of network segments
segmentation of broadcast domains
selection of best path based on logical addressing
selection of best path based on physical addressing



13
The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?

straight-through
rollover
cross-over
serial



14

Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?

The subnet mask of host 2 is incorrect.
Host 1 and host 2 are on different networks.
The switch needs an IP address that is not configured.
The router LAN interface and host 1 are on different networks.
The IP address of host 1 is on a different network than is the LAN interface of the router.



15

Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem?

The destination networks do not exist.
The IP addresses on the router interfaces must be configured as network addresses and not host addresses.
The interfaces must be enabled with the no shutdown command.
Each interface must be configured with the clock rate command.


16

Refer to the exhibit. What can be concluded from the routing table output in the exhibit? (Choose two.)

This router only has two interfaces.
The router interfaces are not operational yet.
This router is configured to forward packets to remote networks.
The FastEthernet0/0 and Serial0/0/0 interfaces of this router were configured with an IP address and the no shutdown command.
An IP packet received by this router with a destination address of 198.18.8.2 will be forwarded out of the Serial0/0/0 interface.



17
Which of the following is the correct flow of routines for a router startup?

load bootstrap, load IOS, apply configuration
load bootstrap, apply configuration, load IOS
load IOS, load bootstrap, apply configuration, check hardware
check hardware, apply configuration, load bootstrap, load IOS



18
From what location can a router load the Cisco IOS during the boot process? (Choose two.)

RAM
TFTP server
NVRAM
setup routine
Flash memory
terminal



19
What is the default sequence for loading the configuration file?

NVRAM, FLASH, ROM
FLASH, TFTP,CONSOLE
NVRAM, TFTP, CONSOLE
FLASH, TFTP, ROM



20
What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?

only the Layer 2 source address
only the Layer 2 destination address
only the Layer 3 source address
only the Layer 3 destination address
the Layer 2 source and destination address 
the Layer 3 source and destination address



21

Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? (Choose two.)

If RouterC receives a packet that is destined for 10.5.1.1, it will be forwarded out interface Fa0/0.
If RouterA receives a packet that is destined for 192.168.3.146, it will be forwarded out interface S0/0/1.
If RouterB receives a packet that is destined for 10.5.27.15, it will be forwarded out interface S0/0/1.
If RouterB receives a packet that is destined for 172.20.255.1, it will be forwarded out interface S0/0/0.
If RouterC receives a packet that is destined for 192.16.5.101, it will be forwarded out interface S0/0/1.




Saturday, February 11, 2012

ENetwork Final Exam

1

Refer to the exhibit. Communication for hosts X and Y is restricted to the local network. What is the reason for this?

The gateway addresses are broadcast addresses.







2
What is the effect of the command copy running-config tftp?

copies the configuration currently in RAM to a remote machine

3

Refer to the exhibit. What function does router RT_A need to provide to allow Internet access for hosts in this network?

address translation



4

Refer to the exhibit. Host A is able to access resources on the local LAN but is unable to access any resources on the Internet. What is the likely cause of this problem?

The default gateway is on a different subnet from the host.









5
A small design company connects to the Internet through a DSL connection. The telephone company suggests assigning 192.168.1.0/24 to the internal network. What additional feature must be available to give the workstations on the internal network access to the Internet?

The company needs an internal DHCP server.

6
Which range of port numbers are reserved for services that are commonly used by applications that run on servers?

0 to 1023

7
When must a router serial interface be configured with the clock rate command?

when the interface is functioning as a DCE device

8
To enhance security in a network, the network administrator uses these commands:

Router(config)# line console 0
Router(config-line)# password j1mdi2
Router(config-line)# login

What two conclusions are evident from these commands? (Choose two.)

Users who attempt to connect to the console port of the router must enter a password.
The entries permit access through the console by the use of j1mdi2 as the password.

9
Which prompt is associated with the privileged exec mode?

R1#

10
What is described by the network access layer of the TCP/IP model?

rules for the handoff from the internet layer to the network access protocols

11

Refer to the exhibit. The ping 127.0.0.1 command is issued on the local host. What do the ping results indicate?

The TCP/IP stack on the local host operates properly.

12
A technician is setting up a workgroup for six users and wants to allow users to share files without setting up a server. Which application layer protocol will provide for peer-to-peer file sharing in a workgroup?

SMB

13
Which application layer protocol allows administrators to log into a server from remote locations and control a server as though logged in locally?

Telnet

14
Which router component will have contents erased when the command erase startup-config is issued?

NVRAM

15
What are the three operations that the transport layer uses to ensure reliability? (Choose three.)

tracking transmitted data
providing routable addressing
retransmitting of any unacknowledged data

16
A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

enable secret

17

Refer to the exhibit. Host1 is in the process of setting up a TCP session with Host2. Host1 has sent a SYN message to begin session establishment. What happens next?

Host2 sends a segment with the ACK flag = 1, SYN flag = 1 to Host1.
18

The tracert 10.1.3.2 command was issued on computer A. Computer A can ping other addresses on the local subnet. Computer A sent the first ICMP packet toward computer B with a TTL value of 1. A protocol analyzer that was running on computer B showed that the packet never reached its destination. Why did the packet not reach the destination?

The TTL for the packet was decreased to zero by R1.

19

Refer to the exhibit. Which type of network design is shown?

peer-to-peer



20

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)

transport layer
network layer










21

Refer to the exhibit. When host A sends a frame addressed for host D, which hosts will receive the frame?

only host D









22
Which communication tool allows real-time collaboration?

instant messaging

23
Which OSI layer manages data segments?

transport layer

24
An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization?

10.10.128.0 to 10.10.192.255

25
A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?

router

26
Which three addresses belong to the category of public IP addresses? (Choose three.)

196.1.105.6
132.11.9.99
46.1.1.97

27
A user enters http://www.cisco.com/web1.htm in the address line of a browser. Which statement is true about this transaction?

The "http" portion indicates the protocol that is being used.

28

Refer to the exhibit. A technician is working on a network problem that requires verification of the router LAN interface. What address should be pinged from this host to confirm that the router interface is operational?

192.168.254.1






29
How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?

2046

30

Refer to the exhibit. RouterB is configured properly. The Ethernet interface Fa0/0 of RouterA is configured with the use of the commands that are shown. However, a ping from the Fa0/0 interface of RouterA to the Fa0/0 interface of RouterB is unsuccessful. What action should be taken on RouterA to solve this problem?

Use the no shutdown command on the FastEthernet interface Fa0/0.

31

Refer to the exhibit. Host A is unable to reach host B on the remote network. A technician attempted to ping the local gateway and the ping was successful. To verify the host configuration, the technician issued the ipconfig command. What is the likely cause of the problem?

The default gateway on host A is incorrectly configured.




32
A network administrator is configuring several switches for a network. The switches have similar configurations and only minor differences. The administrator wants to save all commands that are issued on the first switch to a text file for editing. Which transfer option should be selected in HyperTerminal?


33
What can the user do from the command prompt, Router(config-line)# ?

Configure one of the physical or virtual lines.

34
Which topology divides the collision domain and provides full media bandwidth to the hosts in the network?

35
Which two factors contribute to the increased throughput when all nodes of a LAN are connected to a switch instead of a hub? (Choose two.)

full-duplex operation
collision-free environment

36
Which two types of media can provide bandwidth up to 1 Gb/s? (Choose two.)

1000 BASE-TX
1000 BASE-SX

37
Which application belongs to the category of the client/server model?

using Telnet to access a router

38
Which option represents a point-to-point logical topology diagram?






39
Which prompt represents the appropriate mode used for the copy running-config startup-config command ?

Switch-6J#

40

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?

The connection is made through a VTY session on the router.

41
Which option shows the PDU that contains the Layer 3 source and destination addressing for a packet?

42

Refer to the exhibit. Which option correctly identifies the network address, range of host addresses, and the broadcast address for the network that contains host A?



43
Which physical component is used to access and perform the initial configuration on a new unconfigured router?

44
What command can be used to troubleshoot domain name resolution issues?

nslookup

45

Refer to the exhibit. What two facts can be determined from the session information that is displayed? (Choose two.)

The protocol is a connection-oriented protocol.
This exchange is part of the three-way handshake.



46

Refer to the exhibit. A network technician wants to connect host A to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection?

rollover cable

47
A network technician has made a UTP cable that is terminated as T568A on one end and T568B on the opposite end. What type of cable has been constructed?

crossover

48

Refer to the exhibit. An employee wants to access the organization intranet from home. Which intermediary device should be used to connect the organization intranet to the Internet to enable this access?

router



49
A technician makes several changes to the running configuration on a router, but the desired results are not achieved. The technician issues the reload command. What action will be taken by the router?

The user will be prompted to save changes before the router restarts.

50

Refer to the exhibit. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192.168.219.24. At which point in the network was this packet captured?

leaving Dallas
51

Refer to the exhibit. For connecting two routers with an Ethernet crossover cable, which interface should be used?

C




52

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review