Showing posts with label Cisco Exam Dumps. Show all posts
Showing posts with label Cisco Exam Dumps. Show all posts

Sunday, January 13, 2019

Collaboration Technology: Making it Count in 2019 - Cisco Certifications


All product developers and engineers want to develop products that impact and change the world on a large scale.  Whether it’s changing the way we live, the way we interact, do business or build connections, we want our work to count!

In the Collaboration team at Cisco, we’re doing what we love to do! We’re shaping and delivering technology that connects more than 300 million people around the world.

And we’re just getting started.

Because here’s the thing: for collaboration technology to matter, it has to be in FRONT of the curve.  It has to be the conduit by which companies and people harness the pace and scale of change. People deserve to work SMARTER, not harder. They deserve more, and we’re bringing it to them!

Creating the Ultimate Experience


What’s our mission in 2019?  We’re going to win their hearts and minds. We’re going to focus on winning hearts and minds with experiences that make you feel like you’re in the same room with someone even when they’re thousands of miles away.  We’ll do it with intelligence and context wrapped in. And we’ll do it across our calling, video, meetings and contact center solutions.  Across the whole portfolio.

Picture joining a meeting – whether with someone around the world or across the street – and feel like you are RIGHT THERE, catching every nuance, every gesture, every moment of body language.

If you call a contact center, you don’t waste time explaining issues because the agent ALREADY HAS THE BACKGROUND. They know your history and anticipate your needs. Issues are quickly resolved and hey, maybe you buy a little something extra while you’re there. Just saying…

You have the choice to reach people on THEIR preferred device without having to sacrifice YOUR preferred device. You can count on, without exception, the ability to call anyone you need to, at any time without worrying about the quality of the sound. If you need to huddle folks together the moment inspiration strikes, you can do that from anywhere and from any device.

 Some might think this collaboration ‘wish-list’ is a little far-fetched, but at Cisco, we’ve been working to make it a reality through our meetings, messaging, devices, calling and contact center solutions.

And I repeat, we’re just getting started.

Our collaboration future is intelligent. We’re threading intelligence and machine learning throughout our award-winning platforms.  Get ready for us to show you what we’ve got this far!!!

Making Your New Year’s Resolutions


Truly immersive work experiences…the ones you walk away from completely energized? We make these a reality for our customers.  EVERY. SINGLE. DAY.

Not sure where to begin? Here are four absolute “must haves” for your 2019 collaboration technology ‘wish list” to make this happen:

  • Simple – Complexity is an absolute creativity and collaboration killer so your options need to be easy to use and easy to buy. Period.
  • Friendly – Technology exists in an ecosystem and collaboration technology is no different. Your choices shouldn’t isolate you from other options or opportunities.
  • Flexible – Simply put, work should be as mobile as we are. Technology that’s easy to access lets you be productive and impactful whenever and wherever needed.
  • Intelligent – Next gen technology needs to adapt and anticipate so you can improve and provide the best customer and employee experience. The ability to recommend, personalize and predict are the next table stakes for this industry.


Building Our Future


The way we work is changing at lightning speed. And our Cisco team is WILDLY excited because we know the work we’re doing is making it count!  We’re defining the future landscape. It’s where you have this amazing, intuitive, intelligent technology our customers love to use – technology that enables them to be their best, most creative, most innovative selves and helps them make the impossible, possible.

Do you see the same when you look ahead? I really hope so because you deserve it. If that’s not your reality yet, all I want to say is, get in touch and let’s build it together!!

Our experts say about Cisco Certification Exams



Monday, December 31, 2018

Transforming Enterprise Applications with 25G Ethernet SMF - Cisco Certifications


Bandwidth Drivers for 25G


Bandwidth requirements in today’s Enterprise networks are now being driven by dramatic increases in video conferencing by such systems as Cisco’s Telepresence and other real-time applications such as Augmented Reality, Mixed Reality and Virtual Reality. These are taxing the limits of traditional 10G infrastructure.  Whether it’s IEEE802.1ax WiFi Access Points or direct wired equipment with copper/fiber ports that require 1G/2.5G/5G/10G backhaul interfaces, new enterprisenetworks are being built with high speed equipment that now requires 25G ethernet interfaces.

What is “LR”?


For SFP (Small form Factor Pluggable) transceiver technology “LR” stands for Long Reach that traditionally refers to a reach of 10km.  The 25G SFP form factor, called SFP28 (28 Gb/s to account for encoding overhead) has been standardized and the LR specifications are available in IEEE P802.3cc™ – 2017 Amendment 11: Physical Layer and Management Parameters for Serial 25 Gb/s Ethernet Operation Over Single-Mode Fiber.

The 25G transceiver is similar to the 10G transceiver in that it uses a simple NRZ (Non-Return-to-Zero) modulation but it has higher bandwidth transmitter and receiver for 25G communication. It also includes a CDR (Clock Data Recovery) circuit to clean up the signals.  The 25G transceiver also requires that the host ports support RS-FEC (Reed Solomon – Forward Error Correction), which is not required for 10G.

Cisco’s newest 25G products, including the Catalyst Enterprise switches 9500/9400/9300/9200’s, have advanced ASICs that implement RS-FEC for 25G communication so that transmission error rate can be improved from a BER (Bit Error Rate) of 5×10-5 to 1×10-12. A BER of 1×10-12 is traditionally considered to be “error free” and is associated with other ethernet rates where upper layer protocols can deal with infrequent transmission errors.

Inter-building and Intra-building applications for SFP-10/25G-LR


25G-LR SMF transceivers are now being used for both inter-building and intra-building campus applications to provide high speed connectivity.

Inter-building applications: In large campus environments 25G is used to connect from the building’s distribution switches to a core switch(es) in another campus building. Because of the 25G-LR’s reach of 10km (~6.2 miles) the transceiver provides an excellent low-cost solution for relatively large campus environments such as hospitals, medical offices, college campuses, and business parks. The core switch typically connects to the service provider’s metro/core network with 40/100G links, but those links may also use 25G LR technology.

Intra-building applications: In many situations SMF is used (or has been used) to connect wiring closet switches for distribution.  In these applications, network builders and architects go beyond the limits of the traditional 300m over OM3 (or 400m over OM4) MMF (Multi Mode Fiber) by using SMF for large spans found in mega shopping malls, huge airports, and large manufacturing buildings. Now with Cisco’s SFP-10/25G-LR, networks can communicate at 25G without changing the SMF fiber infrastructure.

Migration from 10G to 25G


The new SFP-10/25G-LR transceiver has dual-rate capability that enables interoperability with 10G-LR SMF transceivers. This allows the network to be incrementally upgraded at either the end of the fiber. For example, Figure 4 shows how a Catalyst distribution switch is replaced with a new switch equipped with a SFP-10/25G-LR, but still communicates with the legacy 10G Catalyst wiring closet switch using 10G.  Then when the wiring closet switch is replaced with a new 25G Catalyst switch, it communicates with the distribution switch at 25G without changing the transceiver at the latter end.

Success Secrets: How you can Pass Cisco Certification Exam in first attempt 



Thursday, December 13, 2018

What is Cryptomining How to Get It on A Device - Cisco Certifications


What is cryptocurrency?


At the lowest of levels, cryptocurrencies are digital currencies that are unassociated with centralized banking systems, such as those run by various countries or economic zones around the world. Cryptocurrencies first rose to prominence close to ten years ago with the advent of Bitcoin, though the cryptocurrency market now boasts thousands of different digital currencies.

One feature that has made cryptocurrencies so popular is the blockchain: the public, digital ledger used to validate the coins and transactions. A major draw of blockchain technology is that it is difficult to modify or tamper with, thanks to cryptography and its distributed nature, which help secure transactions using cryptocurrencies.

What is cryptomining?


Whether it’s referred to as coin mining, cryptocurrency mining, or cryptomining for short, this is the process by which new coins are created or earned. While there are slight variations between coins, mining is largely the process of validating transactions on the blockchain, whereby those carrying out the processing are paid a fee for their efforts. In effect, you can earn coins by helping to validate the blockchain and the transaction ledger contained within.

In some cryptocurrencies, such as Bitcoin, new coins can also be generated when a new block of transactions is added to the blockchain. This is in essence an example of how new coins are “mined” while validating transactions on the blockchain.

What’s so bad about that?


In all actuality, nothing. Neither cryptocurrencies nor cryptomining are inherently malicious. There are plenty of well-intentioned people out there today using cryptocurrencies and participating in cryptomining activities. The one key aspect that separates your regular, everyday cryptomining from what we consider malicious cryptomining: Consent.

There is often little difference between cryptomining software that a user installs on their own and cryptomining software installed by a malicious actor. In fact, in many cases they’re exactly the same. The difference is that the malicious cryptomining software is running without the owner’s knowledge. And any software that runs on a device without the owner’s knowledge is cause for concern.

How did malicious cryptomining rise to prominence?


Prior to malicious cryptomining, ransomware had become the darling of malicious money-making enterprises. But as users became wise to the techniques used by computer-locking malware, and enterprises became better at preventing the disaster that ransomware threatened, malicious actors began to look elsewhere.

Malicious cryptomining also had some distinct advantages over previous money-making schemes. With ransomware, there never was a guarantee that the user of the device would pay out. They could have regular backups at the ready or they just didn’t care about what resided on the compromised device. In either case, reimaging the device solves the problem.

Even more risky, law enforcement agencies throughout the world began to crack down on ransomware attackers. As arrests tied to ransomware went up, more and more adversaries were drawn to the less risky prospect of peddling malicious cryptomining software.

Over the past couple years and into the first half of 2018, the value of cryptocurrency skyrocketed. As with anything software-related and valuable, malicious actors take notice, especially as it coincided with a decline in effectiveness of ransomware.

There were other distinct advantages that helped malicious cryptomining grow. One of the most appealing factors is how cryptomining falls into a grey area in terms of threats. Given how little difference there is between legitimate cryptomining and malicious cryptomining, many users that fall prey to the latter aren’t as concerned as they would be if they found another threat on their systems. If it’s simply mining coins in the background, and isn’t doing anything inherently malicious, why worry? There is an obvious appeal to attackers in this case, where they can reap the benefits without disturbing those they are taking advantage of.

A wolf in sheep’s clothing is still a wolf


Upon deeper reflection there are plenty of reasons to be concerned about malicious cryptomining.

As with any piece of software on a computer, cryptomining requires resources. And a piece of software that takes too many resources can have a negative impact on overall system performance. Not only that, but the use of extra resources requires extra power to facilitate it. It may not add up to much on one system, but multiply the cost over the number of endpoints in an organization, and you could see a noticeable rise in power costs.

Furthermore, there may be regulatory compliance implications when cryptominers are earning revenue on corporate networks. This holds especially true for those in the financial sector, where strict rules could apply to revenue generated using corporate resources, whether or not those in charge are aware of the practice.

But perhaps most worrying is that the presence of a malicious cryptomining infection, unbeknownst to those running a network, could point to security holes in the network configuration or overall security policies. Such holes could just as easily be exploited by attackers for other means. In essence, if a cryptomining infection is found on a network, what’s to stop other malicious threats from exploiting those same holes to carry out further malicious activity?

How does malicious cryptomining get on a device?


There are a number of ways, though rarely are these delivery methods novel. The methods used to deliver malicious cryptomining software are the same methods used to deliver other malicious threats:


  • Exploiting vulnerabilities in both endpoint and server-based applications
  • Employing botnets to spread cryptomining software to new and previously compromised devices
  • Sending emails that include malicious attachments
  • Leveraging JavaScript that allows for cryptomining in the web browser
  • Utilizing adware threats that install browser plugins that can be used to perform cryptomining



These are just a few of the more common ways malicious cryptomining arrives on a device. Naturally, as with any threat, if there’s a way to compromise a system, attackers will try it.

How do I prevent malicious cryptomining?


As with anything threat-related, a good security posture will go a long way from keeping malicious cryptomining at bay.


  • To detect and block malicious cryptomining, advanced endpoint protection is needed and should be part of a broader defense strategy.
  • You can utilize network security analytics to uncover where cryptomining activity may be occurring in your organization.
  • To prevent cryptomining applications from being installed in the first place, block network connections to web sites known to participate in mining cryptocurrencies.
  • DNS layer security can also be extremely effective in stopping cryptomining, preventing mining transactions from being sent back to the malicious actors.

Overall, if you practice a layered approach to security, with an effective line of defense that includes next-generation firewall, endpoint, security analytics, and DNS layers, you stand a better chance of detecting and preventing cryptomining infections on your network.

What is the current and longer-term outlook?


Over its history, cryptocurrency markets have demonstrated some fairly significant volatility. The sharp rises and sudden falls in cryptocurrency value is paralleled in the malicious cryptomining activity that we have witnessed. For instance, take a look at the overall volume of cryptomining-related traffic that Cisco has witnessed on the DNS layer. While there have been sharp peaks and valleys, the overall takeaway is that cryptomining is trending up as time goes on.

What is interesting is that the values of many popular cryptocurrencies has declined during the same time frame, trending downwards overall. Take Monero for instance, a popular coin used in malicious cryptomining.

There are a few possible reasons that these trends are at odds. It could simply be that malicious actors are continuing to push malicious cryptomining out because of the ease of deployment, the reduced risk if caught, and if users remain unaware or don’t care if it’s on their device, the longer time span cryptomining software will likely reside on a device, earning them more money.

Alternatively, it’s possible we’re seeing an overall increase in cryptomining activity specifically because the values of cryptocurrencies are declining. In order for a malicious actor to maintain revenue streams as the value of cryptocurrencies decline and their “return on infection” drops, more malicious cryptomining infections are required.

Conclusion


Money is and likely always will be one of the chief motivators for malicious actors in the threat landscape. In many ways malicious cryptomining can be looked at as a way for attackers to make a fast buck with little overhead, while the targets are less worried about the implications the threat on their devices when compared to others. Still, the indirect costs are nothing to ignore, and should be addressed regardless.