Wednesday, September 30, 2015

How to highlight the most recent date in Excel?


If you have much date that you difficult to find it that is the recent date or the last date.So this way we need to high light the date that make you can find it very fast as soon as possible and easy for processing the work .
Here is how to do that:
1. Go to Condition Formatting and Choose New rule
2. Then Click Format only cells that contain
3. Format only Cells with (cell Value+ equal to+ (=Max(cell))
Picture below for detail.



Sample Example Download Here

What is Vlookup in Excel?

VLOOKUP: This function returns a value from the intersection between the found lookup value in the leftmost column and a column index number in the Table Array.
To use the Vlookup function, we need common value in both the data and the table, if we do not have a common value in another data from which we want to pick the data, then formula will give the #N/A error.
vlookup with ISNA

Here is the Simple Example ..Please Download Here

How to fix Auto configuration IPV4 in window PC?


Sometime you setup windows server 2008 to vmware using LAN or wifi, you chose Bridge mode to share internet connections between host and virtual machine may be cause of issues with internet connection at virtual machine. They can not connect to the internet or appear a message likes "conflict IP address"

Here is how to fix this issue:
1.Run Cmd
2.Type netsh interface ipv4 show inter
It will show like Picture below
3.Type this command netsh interface ipv4 set interface 77 dadtransmits=0 store=persistent
4.Restart PC it will OK (note if it still not OK please diasble DHCP client service).

EXCEL 2010 Bible


Excel 2010 Bible for student and Staff use to learning thank to Jhon Walkenbach than create this book for us to study.

I would like to share it  to my friend every body to learn this.
Here is the link to Download 
Thank.

How to do a page break in Excel ?

You can control the line breaks for multiple-line headings or labels in your Microsoft Excel worksheet, just like you do in Microsoft Word. Here's how to do it.
Click the cell where you want the label or heading to appear.
Type the first line of information.
Press ALT+ENTER.
Type the second line. Then repeat step 3 if you have additional lines to enter.
Press ENTER when you've finished typing.

good luck.

How to use Telnet on PC?

Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely.
Please following the access.
1.Start -->run -> appwiz.cpl and then press Enter
2.And Then it will pop up  Program and Feature --> click on Turn Window Feature On and OF.
3.Find Telnet and click Tick and then Click OK.
4.It will be OK.
5.Restart the PC if it still not work.


How To unhide File or Folder in USB ?

I would like to tell every one how to fix this issue with some file in you Hard disk or UBD drive.
This  Sometime cause from USB have virus attache with ..That Virus hide all your file and folder and Create link instead that look like your folder.After you click those virus  will  spread all to PC.
So if you see this don't click any more.Please take your USB to scan with Antivirus  before OPen it.
Here is how to fix:
1.Go to CMD
2.Go to that Drive like E: and press Enter
3.type Attib -s -h /s /d and Press Enter
4.It will be OK.

How to removed unallocated space in USB?

Some USB drive will see small amount of space that is unallocated..
So i would like to tell you how to fix this  as below with command  wind window PC.

First we start CMD and try Diskpart  you will see like picture below and Please try following Command to fix this issue.


Microsoft DiskPart version 6.2.9200

Copyright (C) 1999-2012 Microsoft Corporation.
On computer: COMPUTER

DISKPART> list disk

  Disk ###  Status         Size     Free     Dyn  Gpt
  --------  -------------  -------  -------  ---  ---
  Disk 0    Online          298 GB      0 B
  Disk 1    Online         7509 MB  6619 MB

DISKPART> select disk 1

Disk 1 is now the selected disk.

DISKPART> clean

DiskPart succeeded in cleaning the disk.

DISKPART> create partition primary

DiskPart succeeded in creating the specified partition.

DISKPART> exit

After you can reinsert your USB again and Try to Format that USB.

good luck.

Tuesday, September 29, 2015

How to fix Recycle bin empty?

Damaged Recycled Folder

The Recycled folder itself can become damaged. Files are moved to the folder and the Recycle Bin on the desktop appears full, but you cannot view the contents and the Empty
The Recycle Bin command is unavailable. Deleting this folder and restarting Windows will re-create this folder and restore functionality:

How to do with Command that run as Administrator.:

Type attrib -s -h recycled.
Type del recycled.
Restart the computers.

Good Luck.

How to configure POP3 in Gmail?

Having problems getting Gmail to work with pop3? Try these settings.

GMail as a pop3.

- Email sending

To send emails using Gmail server enter these details:

SMTP Host: smtp.gmail.com
SMTP Port: 587
SSL Protocol: OFF
TLS Protocol: ON
SMTP Username: (your Gmail username)
SMTP Password: (your Gmail password)

Also make sure your "From email address" in HESK settings is set to your Gmail email address!
Still no luck? Check with your host if they have port 587 blocked in firewall.

? POP3 fetching

To fetch mail from Gmail server enter these details:

POP3 Host: pop.gmail.com
POP3 Port: 995
TLS Protocol: ON
POP3 Username: (your Gmail username)
POP3 Password: (your Gmail password)

Important: make 100% sure that "POP3 download" in your Gmail settings is set to "Enable POP for mail that arrives from now on". If not, Gmail will send all existing (even read) messages to HESK when it first connects.

? Error messages

Permission denied or Connection timed out

Try loggin with your google account here to unlock it for application access.

Click the "Continue" button to Allow access to your Google account.

Password error: [AUTH] Web login required

How to solved Internet connected but browser not working ?

I had meet this issue when i work as IT technical .It so use full for you and Other.
It work for me.I hop it will work for you.
Please do following the instruction below:

1) Click on Start --> In search box, type cmd --> Then "CMD" will be displayed in

the search --> Now right-click on "CMD" ---> Select "Run as administrator".

2) Now enter this command

netsh int ip reset resetlog.txt 
OR this command
netsh winsock reset

Press "Enter".

3) Reboot your computer

Good Luck.

How to fix Icon the same in Desktop(link error)?

We Will walk you through the steps to fix a file association error in windows 7/Vista (Desktop icons all look the same and only opened with one program; also known as the .lnk error). No downloads are required in order to fix this error. Please be sure to leave a comment if this has helped you or if you have any further questions regarding this or related errors. Yes by 'suffix' I meant 'file extension'. The steps are listed below:
1. Open start menu (click button on far side of task bar)
2. Type into the search bar: regedit
3. Press yes when prompted
4. Double click each of the folders specified:
HKEY_CURRENT_USER
Software
Microsoft
Windows
Current Version
Explorer
FileExts
.lnk (or .rar/other extensions in differing cases)
5. Right Click User Choice and select delete
6. Restart Computer

I hope this article will help you.

Blue Screen when you install Window xp ,Window 7

If you are trying to install the Windows XP from scratch on the laptop, please BE SURE that you put the Hard Drive on "Compatibility" mode in BIOS, which was defaulted to "AHCI" (Compatibility is also known as IDE).

Otherwise, you will experience the "blue screen" issue. To change that setting, you need to do the following:
1. Press F2 when booting up the computer
2. Select 'Config', then 'Serial ATA (SATA)'
3. Change controller option to 'Compatibility' / 'IDE'
4.I hope it will solved and can install window PC

Accessing the host CD-ROM when the host in Linux

Noted

•/dev/hdc is a device located on the IDE controller.
•/dev/sr0 is a device located on the SCSI controller
•/dev/cdrom is a symlink to either /dev/hdc or /dev/sr0. ESX hosts run a script that automatically sets up /dev/cdrom to be the correct device, thus using /dev/cdrom is appropriate.


To access the local host CD-ROM device when the host is in troubleshooting mode (also known as single user mode or runlevel 1):

1.Ensure that a CD-ROM has been inserted in the CD-ROM drive.
2.Run these commands to create the block device entry for the CDROM in /dev before attempting to mount the CD-ROM:

# cd /dev
# mknod -m660 sr0 b 11 0


3.Run these commands to create a temporary mount point for the CD-ROM and mount the CD-ROM on the host:

# mkdir /mnt/cd
# mount /dev/sr0 /mnt/cd
# cd /mnt/cd

You should now be in the CD-ROM directory and should be able to access the media in it.

USER Profile Fail To Log on Solved

How to solve it:
1.run->regedit->HKEY_LOCAL_MACHINE->SOFTWARE->MICROSOFT->WINDOW NT ->CurrentVERSION->PROFILELIST after edit as below value on account that have problem:
            .RefCount
àmodify to value 0.
            .Stat    àmodify to value 0.
After restart pc and log on again.
----------------------------------------------------------------------------------------------------------------
Appears while attempting to logon in Windows Vista, 2008, 2008 R2 and 7.
Exact cause is unknown, but this issue may occur if the user profile was manually deleted by using the command prompt or Windows Explorer by a user or by some program. A profile that is manually deleted does not remove the security identifier (SID) from the user profile list in the registry. Since the SID is still present, Windows will still try to load the profile by using the ProfileImagePath that points to a nonexistent path. Therefore, the profile cannot be loaded.
This can also be a issue with the user profile entering into a backup state, or if the C:\Users\(User Name) user profile folder is manually renamed.

1.
Log on to the Computer
Log on to the computer using the Administrator (or an Administrator-level) account.
If the computer is not joined to a domain, reboot it and start your computer in safe mode, then log on using the Administrator (or an Administrator-level) account.
2.
Trawl through the Registry
Open the Start menu. In the Start Search area, type regedit and press Enter (if prompted by UAC, click Continue/Yes). In regedit, go to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
Expand the ProfileList key and look for the SID key (named "S-1-5"...) with a long number that ends in ".bak". Click it, and look at the ProfileImagePath value in the right pane to verify that this is the user account profile that has the error.
a) If you have two SID keys with the same number (with one ending in ".bak" and one showing the affected user account in the ProfileImagePath value), continue to Step 3;
b) If you have just one SID key with the ProfileImagePath value showing the affected user account, proceed to Step 4.
3.
Two SID keys with the same number
a) Of the two SID keys that corresponds to the affected user account, right-click the SID key that does NOT end in ".bak" and click Rename.
b) Add .bk to the end of the numbers and press Enter.
c) Right-click the other SID key that DOES end in ".bak" and click Rename.
d) Remove only .bak from the end of the numbers (so that it has the same name as the other SID key did before you renamed it) and press Enter.
e) Now go back and Rename the first one with .bk to .bak now at the end of the numbers and press Enter.
Proceed to Step 5...
4.
Only one SID key ending in ".bak"
a) Right-click the SID key that corresponds to the affected user account and click Rename.
b) Remove only .bak from the end of the numbers, and press Enter.
c) In the right pane, right-click the RefCount value (if none exists, right-click the right pane and click New and DWORD (32 bit) Value, then type RefCount and press Enter), and click Modify.
d) Type 0 into the Value Data textbox and click OK.
e) In the right pane, right-click the State value and click Modify.
f) Type 0 into the Value Data textbox and click OK.
5.
Try logging on again!
Close regedit and restart the computer. You should be able to logon now...

Unable to set DEFAULT PRINTER in window that alert error 0x00000709?


This error is related to the old printer you have set as default before. Printers name that was recorded in your registry are priority on the system which you cannot modify if you're trying to set a new default printer. So you have to manually modify the registry. Note that the registry section is very sensitive,  serious  problems might occur if you modify the registry incorrectly.  Therefore, make sure that you follow these steps carefully.  For insurance included, move down the registry before you alter it. And that point, you can restore the registry if an issue happens. For Additional data about how to go down and restore the registry, click the accompanying article number to view the article in the Microsoft Knowledge Base:
How to back up and restore the registry in Windows: (http://support.microsoft.com/kb/322756/)

Now, here's how to troubleshoot:

1. Click the Start button and type "regedit", then right click and "run as administrator"
2. Now go to this location:

HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Window

3. Located in the right column, you can change the device key value data to your printer name.Right click on the Device key then modify the data value (e.g. "HP Laserjet P1006,winspool,Ne03:")
Note: You MIGHT encounter this "Error Editing Value" which you are unable to modify the data,
All you have to do is to set "permissions" to the key, and this is how its done:

Right Click on the "Windows" key and choose "Permissions", check "Allow" -> Apply, then OK.

How To turn on the Read all standard mail in plain text in Outlook ?

To turn on the Read all standard mail in plain text option in Outlook 2003, follow these steps:
  1. Start Outlook 2003.
  2. On the Tools menu, click Options.
  3. On the Preferences tab, in the E-mail area, click E-mail Options.
  4. In the Message handling area, click to select the Read all standard mail in plain text check box.

    Note By default, the Read all standard mail in plain text option is turned off.

To turn on the Read all standard mail in plain text option in Outlook 2007, follow these steps:
  1. Start Outlook 2007.
  2. On the Tools menu, click Trust Center, and then click E-mail Security.
  3. Under Read as Plain Text, click to select the Read all standard mail in plain text check box.
  4. To include messages that are signed with a digital signature, click to select the Read all digitally signed mail in plain text check box.
When the Read all standard mail in plain text option is turned on, you receive the following notification on the InfoBar at the top of the e-mail message:
This message was converted to plain text.
Note If you decide to view the plain text message in its original format, click the InfoBar, and then select Display as HTML or Display as Rich Text.


To turn on the Read all standard mail in plain text option in Outlook 2010, follow these steps:
  1. Start Outlook 2010.
  2. Click the File tab in the Ribbon, and then click Options on the menu.
  3. Click Trust Center on the Options menu.
  4. Click the Trust Center Settings tab.
  5. Click E-mail Security.
  6. Under Read as Plain Text, click to select the Read all standard mail in plain text check box.
  7. To include messages that are signed with a digital signature, click to select the Read all digitally signed mail in plain text check box.
When the Read all standard mail in plain text option is turned on, you receive the following notification on the InfoBar at the top of the e-mail message:
This message was converted to plain text.
Note If you decide to view the plain text message in its original format, click the InfoBar, and then select Display as HTML or Display as Rich Text.
How Outlook Prints, Replies to and Forwards E-Mail Messages When You Use the Read All Standard Mail in Plain Text Option
If the Read all standard mail in plain text option is turned on, Outlook uses the display format that you are currently using to initiate any print, reply to or forward functions for the e-mail message.
How to Use the Read All Standard Mail in Plain Text Option for Digitally Signed Mail
Depending on your configuration, Outlook may not be able to view all e-mail messages in plain text format. If you receive an e-mail message and all the following conditions are true
  • You have the Read all standard mail in plain text option turned on.
  • The e-mail message is not in plain text format.
  • The e-mail message was digitally signed with a Secure/Multipurpose Internet Mail Extension (S/MIME) signature.
you may receive the following message when you try to view the e-mail message:
This signed message was not sent in plain text. Outlook is configured to only view messages in plain text, but cannot do that without breaking the signature. If you would like to view this message in its original format, click here.

In the case where digital signatures are used, Outlook must display the e-mail message in the original format that is specified by the sender, or you must turn on the Read all digitally signed mail in plain text option. To turn on the Read all digitally signed mail in plain text option, click to select the Read all digitally signed mail in plain text check box under the Read all standard mail in plain text option.

How you can solved with Proxy LAN setting in the networking pc?

I had meet proxy LAN with my PC that make my internet not working any more.
Because Proxy LAN in my PC has tick automatically .
We need to Uncheck or Untick  the proxy to solved this.
Here is the guide:
Go to ->control panel  ->internet-à internet option  and then choose  connection tab. After  click  LAN Setting and then uncheck the Proxy
More info please see on picture below:



How to unprotected Sheet from Excel without Password?


THis document will tel you how to unprotect an excel spread sheet without having the password


In case of a password protect worksheet you are unable to Edit the data on the Excel Sheet. If you do not Remember the Password or do not know the password to unprotect the sheet just follow the below simple steps.

1.Press ALT +  F11 or click on View Code in Developers Tabs

In the Above White Space Enter the below Code. Do not change the code just copy paste:

Sub PasswordBreaker()
    'Breaks worksheet password protection.
    Dim i As Integer, j As Integer, k As Integer
    Dim l As Integer, m As Integer, n As Integer
    Dim i1 As Integer, i2 As Integer, i3 As Integer
    Dim i4 As Integer, i5 As Integer, i6 As Integer
    On Error Resume Next
    For i = 65 To 66: For j = 65 To 66: For k = 65 To 66
    For l = 65 To 66: For m = 65 To 66: For i1 = 65 To 66
    For i2 = 65 To 66: For i3 = 65 To 66: For i4 = 65 To 66
    For i5 = 65 To 66: For i6 = 65 To 66: For n = 32 To 126
    ActiveSheet.Unprotect Chr(i) & Chr(j) & Chr(k) & _
        Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _
        Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
    If ActiveSheet.ProtectContents = False Then
        MsgBox "One usable password is " & Chr(i) & Chr(j) & _
            Chr(k) & Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & _
            Chr(i3) & Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
         Exit Sub
    End If
    Next: Next: Next: Next: Next: Next
    Next: Next: Next: Next: Next: Next
End Sub
Now Click on the Run Button or press F5:

And there you go the sheet is unprotected for you now. Also you would be getting a message in the pop up window.
This Message is contains the password which can be used to unprotect the other sheets in the same workbook.

Thank you  

How to deploy printer by Group Policy window server 2012?

Printer is the part of  every office need to use.If printer has problem IT will got complain to much.As my experience about printer too.We have many way to connect with printer but today i would like to show every one how to configure printer by window server 2012 with Group Policy :

1. Add role for server Printer Manager in Server
2. Add Printer to Share in Server (install Driver for printer)
3. After Create GPO for that printer as below:
ü  Find Group Policy ObjectàRight click and then click New .It will pop up new window of Policy Type the name and click OK.
ü  After we get one GPO (ex: printer) àRight Click that GPO and Click Edit.
ü  You will see new window .Please find àComputer ConfigurationàPoliciesàAdministrator TemplateàPrinteràPoint and Print Restriction  after Edit to enable
ü  Clear two text Box(not tick)
    ü  When install Driver for a new connection choose (do not show warning or evaluation prompt.
     ü  When update Driver from existing Connection (show warning only)
ü  After click apply and ok.
4. Go to print Management àRight click Printer you want to deploy GPO àDeploy with Group PolicyàBrowse GPO that we have set above (printer).Tick Deploy per user and Tick Deploy per Machine àClick ADD àClick OK.
5. Apply GPO by User Or OU(organization Unit)

6.Right click on printer ->properties ->security for everyone can accessàand share that printer.

How to upgrade to windows 10 from windows 7?

I would like to guide every body how to upgrade from window 7 to window 10 by Media create Tool that provide from Microsoft.
Microsoft has provide 2 tool that for upgrade to window 10 .One is for window 10 x32 bit and Other one is for Window 10 x64 bit.
Here is the two tool link to download Below:
Media Create Tool for window 10 X32 bit :Download 
Media Create Tool for window 10 X36 bit : Download

How to upgrade from window 7 to window 10 by Media create Tool
1.Double Click Media Create Tool that you had download already
2.Do Following instructor  that you would like to upgrade or download ISO to burn in Flash or DVD to clean install.

Thank you for watching.

What New in Excel 2010?

What’s New in Excel 2010?

  •  64-bit version: If your hardware (and Windows version) supports it, you can install the 64-bit version, which lets you create larger workbooks. Most people do not require the 64-bit version, and using it might cause some add-ins to not function.
  • Sparkline charts: Create small in-cell charts to summarize a range of data graphically. 
  • Slicers: A new way to filter and display data in pivot tables, by clicking buttons. 
  •  New pivot table formatting options: You have more control over the appearance of pivot table reports.
  • Office button changes: The big round Office button in Excel 2007 has been replaced by  a File button/tab, displayed to the left of the tabs. Clicking it displays a screen that lets you perform various operations on your workbook. This view essentially replaces the traditional File and Print menus — plus quite a bit more.
  • Conditional formatting enhancements: Data bar conditional formatting can display in a solid color, and the bars provide a more accurate display. 
  • Function enhancements: Some Excel worksheet financial and statistical functions have been improved in terms of numerical accuracy.
  • Image editing enhancements: You have much more control over graphic images inserted into a workbook, including the ability to remove nonessential parts from the background of an image.
  • Screen capture tool: You can easily capture a window from a different program and then insert the image on a worksheet.
  • Paste preview: When you copy a range, the Paste command displays various options with a live preview so you can see how the paste operation will look.
  • Ribbon customization: You can customize the Ribbon by adding new tabs and groups
  • Equation editor: Create and display (noncalculating) mathematical equations and embed them on a worksheet. 
  • Faster: Microsoft made some improvements to the calculation engine, and files load a bit faster.
  • New security features: Workbooks downloaded from the Internet or from e-mail attachments are opened in Protected View mode. Workbooks can be designated as “trusted,” and don’t need to reside in special trusted folders.
  • Solver: Excel 2010 includes a new version of the Solver add-in, which is useful for solving some complex problems.
  • Enhancements to VBA: Operations that used to require old XLM macros can now be performed directly using VBA macro commands. In addition, macro recording now works for operations such as chart shape formatting

What is Excel Good For?

Excel, as you probably know, is the world’s most widely used spreadsheet
program, and is part of the Microsoft Office suite. Other spreadsheet programs
are available, but Excel is by far the most popular and has become the
world standard.
Much of the appeal of Excel is due to the fact that it’s so versatile. Excel’s
forte, of course, is performing numerical calculations, but Excel is also very
useful for non-numeric applications. Here are just a few of the uses for Excel:
1.Number crunching: Create budgets, analyze survey results, and
                                    perform just about any type of financial analysis you can think of.
2.Creating charts: Create a wide variety of highly customizable charts.
3.Organizing lists: Use the row-and-column layout to store lists
                              efficiently.
 4.Accessing other data: Import data from a wide variety of sources.
 5.Creating graphical dashboards: Summarize a large amount of
                                                       business information in a concise format
6.Creating graphics and diagrams: Use Shapes and the new SmartArt to create
                                                        professional-looking diagrams.
7.Automating complex tasks: Perform a tedious task with a single mouse click with
                                                 Excel’s macro capabilities.

Download Limon Khmer Font

This is the limon keyboard khmer .It seem old version but it still use today.
Because some document still need Limon Font to read.

So i would like to make a download link for Limon Font Download Limon Font

After download Font Please extract the Zip file and Copy and Past To Drive C:\Windows\Fonts
It will Ok for your Document that need Limon Font.
Thank

Download Font Unicode Khmer 2.0 and 5.0

This the Khmer Unicode Font that every body need for PC window .
How to install just download zip file and extract  and than Copy to
C:\Window\Font  of your PC .It will be OK.

Here is the link Download

If you would like for install font  execute file (exe) that just only download and extract file and then Double click to install Unicode.exe file it will be OK.

Here is the link for Execute file Download

Khmer Keyboard

Khmer Unicode keyboard
This is the Khmer Unicode Keyboard that help every one to learn and typing Khmer Unicode fast .
Now Khmer Unicode is official you by the law.So We Cambodian should be learn and study this keyboard .

Monday, September 28, 2015

Use full element in Excel 2010

This the use full element that every body need to use very day of excel.

How to disable redirect of google custom search ?

When you search google sometime it redirect to google custom search engine(cse).Some people don't like it because it not provide full functional of search experience .
Here it is how to disable it .

  • go to Control penel 
  • find Internet Option
  • Find Connection Tab
  • Click on LAN Setting
  • Untick Proxy .
  • More info please check in Picture above.
  • Noted : You should be an administrator of PC.
  • Thank you.

Saturday, September 26, 2015

IP Routing (CCNA)

1.


Which of the following statements are true regarding the command ip route 172.16.4.0 255.255.255.0 192.168.4.2?
  1. The command is used to establish a static route.
  2. The default administrative distance is used.
  3. The command is used to configure the default route.
  4. The subnet mask for the source address is 255.255.255.0.
A.1 and 2
B.2 and 4
C.3 and 4
D.All of the above
Answer & Explanation
Answer: Option A
Explanation:
Although answer D almost seems right, it is not; the mask is the mask used on the remote network, not the source network. Since there is no number at the end of the static route, it is using the default administrative distance of 1.


2. 
Which command displays RIP routing updates?
A.show ip route
B.debug ip rip
C.show protocols
D.debug ip route
Answer & Explanation
Answer: Option B
Explanation:
The debug ip rip command is used to show the Internet Protocol (IP) Routing Information Protocol (RIP) updates being sent and received on the router.


3. 
Which statement is true regarding classless routing protocols?
  1. The use of discontiguous networks is not allowed.
  2. The use of variable length subnet masks is permitted.
  3. RIPv1 is a classless routing protocol.
  4. IGRP supports classless routing within the same autonomous system.
  5. RIPv2 supports classless routing.
A.1, 3 and 5
B.3 and 4
C.2 and 5
D.None of the above
Answer & Explanation
Answer: Option C
Explanation:
Classful routing means that all hosts in the internetwork use the same mask. Classless routing means that you can use Variable Length Subnet Masks (VLSMs) and can also support discontiguous networking.


4. 
You have the following routing table. Which of the following networks will not be placed in the neighbor routing table?
R    192.168.30.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0
C 192.168.40.0/24 is directly connected, Serial0
172.16.0.0/24 is subnetted, 1 subnets
C 172.16.30.0 is directly connected, Loopback0
R 192.168.20.0/24 [120/1] via 192.168.40.1, 00:00:12, Serial0
R 10.0.0.0/8 [120/15] via 192.168.40.1, 00:00:07, Serial0
C 192.168.50.0/24 is directly connected, Ethernet0
A.172.16.30.0
B.192.168.30.0
C.10.0.0.0
D.All of them will be placed in the neighbor routing table.
Answer & Explanation
Answer: Option C
Explanation:
The network 10.0.0.0 cannot be placed in the next router's routing table because it already is at 15 hops. One more hop would make the route 16 hops, and that is not valid in RIP networking.


5. 
What is split horizon?
A.Information about a route should not be sent back in the direction from which the original update came.
B.It splits the traffic when you have a large bus (horizon) physical network.
C.It holds the regular updates from broadcasting to a downed link.
D.It prevents regular update messages from reinstating a route that has gone down.
Answer & Explanation
Answer: Option A
Explanation:
A split horizon will not advertise a route back to the same router it learned the route from.
6. 
What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?
A.Router(config-if)# no routing
B.Router(config-if)# passive-interface
C.Router(config-router)# passive-interface s0
D.Router(config-router)# no routing updates
Answer & Explanation
Answer: Option C
Explanation:
The (config-router)#passive-interface command stops updates from being sent out an interface, but route updates are still received.


7. 
Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?
A.The updated information will be added to the existing routing table.
B.The update will be ignored and no further action will occur.
C.The updated information will replace the existing routing table entry.
D.The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence.
Answer & Explanation
Answer: Option B
Explanation:
When a routing update is received by a router, the router first checks the administrative distance (AD) and always chooses the route with the lowest AD. However, if two routes are received and they both have the same AD, then the router will choose the one route with the lowest metrics, or in RIP's case, hop count.


8. 
You type debug ip rip on your router console and see that 172.16.10.0 is being advertised to you with a metric of 16. What does this mean?
A.The route is 16 hops away.
B.The route has a delay of 16 microseconds.
C.The route is inaccessible.
D.The route is queued at 16 messages a second.
Answer & Explanation
Answer: Option C
Explanation:
You cannot have 16 hops on a RIP network by default. If you receive a route advertised with a metric of 16, this means it is inaccessible.


9. 
The Corporate router receives an IP packet with a source IP address of 192.168.214.20 and a destination address of 192.168.22.3. Looking at the output from the Corporate router, what will the router do with this packet?
Corp#sh ip route
[output cut]
R 192.168.215.0 [120/2] via 192.168.20.2, 00:00:23, Serial0/0
R 192.168.115.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
R 192.168.30.0 [120/1] via 192.168.20.2, 00:00:23, Serial0/0
C 192.168.20.0 is directly connected, Serial0/0
C 192.168.214.0 is directly connected, FastEthernet0/0
A.The packet will be discarded.
B.The packet will be routed out the S0/0 interface.
C.The router will broadcast looking for the destination.
D.The packet will be routed out the Fa0/0 interface.
Answer & Explanation
Answer: Option A
Explanation:
Since the routing table shows no route to the 192.168.22.0 network, the router will discard the packet and send an ICMP destination unreachable message out interface FastEthernet 0/0, which is the source LAN where the packet originated from.


10. 
If your routing table has a static, a RIP, and an IGRP route to the same network, which route will be used to route packets by default?
A.Any available route
B.RIP route
C.Static route
D.IGRP route
E.They will all load-balance.
Answer & Explanation
Answer: Option C
Explanation:
Static routes have an administrative distance of 1 by default. Unless you change this, a static route will always be used over any other found route. IGRP has an administrative distance of 100, and RIP has an administrative distance of 120, by default.
11. 
What is route poisoning?
A.It sends back the protocol received from a router as a poison pill, which stops the regular updates.
B.It is information received from a router that can't be sent back to the originating router.
C.It prevents regular update messages from reinstating a route that has just come up.
D.It describes when a router sets the metric for a downed link to infinity.
Answer & Explanation
Answer: Option D
Explanation:
Another way to avoid problems caused by inconsistent updates and to stop network loops is route poisoning. When a network goes down, the distance-vector routing protocol initiates route poisoning by advertising the network with a metric of 16, or unreachable (sometimes referred to as infinite).


12. 
Which of the following is true regarding RIPv2?
A.It has a lower administrative distance than RIPv1.
B.It converges faster than RIPv1.
C.It has the same timers as RIPv1.
D.It is harder to configure than RIPv1.
Answer & Explanation
Answer: Option C
Explanation:
RIPv2 is pretty much just like RIPv1. It has the same administrative distance and timers and is configured just like RIPv1.


13. 
A network administrator views the output from the show ip route command. A network that is advertised by both RIP and IGRP appears in the routing table flagged as an IGRP route. Why is the RIP route to this network not used in the routing table?
A.IGRP has a faster update timer.
B.IGRP has a lower administrative distance.
C.RIP has a higher metric value for that route.
D.The IGRP route has fewer hops.
Answer & Explanation
Answer: Option B
Explanation:
RIP has an administrative distance (AD) of 120, while IGRP has an administrative distance of 100, so the router will discard any route with a higher AD than 100.


14. 
What does RIPv2 use to prevent routing loops?
  1. CIDR
  2. Split horizon
  3. Authentication
  4. Classless masking
  5. Holddown timers
A.1 and 3
B.2, 3 and 5
C.2 and 5
D.3 and 4
Answer & Explanation
Answer: Option C
Explanation:
RIPv2 uses the same timers and loop-avoidance schemes as RIPv1. Split horizon is used to stop an update from being sent out the same interface it was received on. Holddown timers allow time for a network to become stable in the case of a flapping link.


15. 
Which two of the following are true regarding the distance-vector and link-state routing protocols?
  1. Link state sends its complete routing table out all active interfaces on periodic time intervals.
  2. Distance vector sends its complete routing table out all active interfaces on periodic time intervals.
  3. Link state sends updates containing the state of its own links to all routers in the internetwork.
  4. Distance vector sends updates containing the state of its own links to all routers in the internetwork.
A.1 only
B.3 only
C.2 and 3 only
D.None of the above
Answer & Explanation
Answer: Option C
Explanation:
The distance-vector routing protocol sends its complete routing table out all active interfaces at periodic time intervals. Link-state routing protocols send updates containing the state of its own links to all routers in the internetwork
16. 
IGRP uses which of the following as default parameters for finding the best path to a remote network?
  1. Hop count
  2. MTU
  3. Cumulative interface delay
  4. STP
  5. Path bandwidth value
A.1 and 3
B.3 and 5
C.2, 3 and 5
D.All of the above
Answer & Explanation
Answer: Option B
Explanation:
IGRP uses bandwidth and delay of the line, by default, to determine the best path to a remote network. Delay of the line can sometimes be called the cumulative interface delay.


17. 
Network 206.143.5.0 was assigned to the Acme Company to connect to its ISP. The administrator of Acme would like to configure one router with the commands to access the Internet. Which commands could be configured on the Gateway router to allow Internet access to the entire network?
  1. Gateway(config)# ip route 0.0.0.0 0.0.0.0 206.143.5.2
  2. Gateway(config)# router rip
  3. Gateway(config-router)# network 206.143.5.0
  4. Gateway(config-router)# network 206.143.5.0 default
A.1 only
B.3 only
C.1, 2 and 4
D.1 and 4
Answer & Explanation
Answer: Option D
Explanation:
There are actually three different ways to configure the same default route, but only two are shown in the answer. First, you can set a default route with the 0.0.0.0 0.0.0.0mask and then specify the next hop, as in option A. Or you can use 0.0.0.0 0.0.0.0and use the exit interface instead of the next hop. Finally, you can use option D with theip default-network command.