Cisco.640-461.2011-04-11.by.Elba.65q

http://www.examcoop.com/640-461.html

Exam A
QUESTION 1
Which two options are features in Cisco Unified Presence? (Choose two.)
A. IP Phone Messenger
B. Native Presence
C. BLF speed-dial
D. Enterprise Instant Messaging
E. BLF speed-dial pickup

Correct Answer: AB
QUESTION 2
An end user reports that they are unable to control their Cisco IP phone using Cisco Unified Personal Communicator and cannot make any calls. Which situation can cause this issue?
A. The Cisco Unified Personal Communicator is not registered in the Cisco Unified Presence server.
B. The LDAP integration is incorrect.
C. The Cisco Unified Personal Communicator is configured in desk-phone mode.
D. The Allow Control of Device from CTI checkbox in the device configuration on Cisco Unified Communications Manager is disabled.
E. The Allow Control of Device from CTI checkbox in the device configuration on the Cisco Unified Presence is disabled.

Correct Answer: D
QUESTION 3
Which description describes the low latency queuing algorithm?
A. Empty queue 1. If queue 1 is empty, empty queue 2, then empty queue 3, unless a packet for a higher queue arrives.
B. An administrator defines the traffic classes based on match criteria, including protocols, access control lists, and input interfaces.
C. A flow-based algorithm that simultaneously schedules interactive traffic to the front of a queue to reduce response time and fairly shares the remaining bandwidth among high-bandwidth flows.
D. This feature brings strict priority queuing to CBWFQ.
E. Packets are placed into a single queue and serviced in the order they were received.
Correct Answer: D
QUESTION 4 Select and Place:

Correct Answer:
QUESTION 5
An administrator wants to locate and remove all unassigned directory numbers on the Cisco Unified Communications Manager system. Which method is the best method to accomplish this task?
A. Choose Device > Phone. Search all phones and remove the undesired directory numbers.
B. Use the Dial Plan Installer to remove the directory numbers.
C. Use the Disaster Recovery System to restore only valid directory numbers.
D. Choose Call Routing > Route Plan Report, choose the Unassigned DN drop-down menu, and then remove all orphaned directory numbers.
E. Choose Device > Device Settings > Device Defaults and use the wizard to locate and remove the orphaned directory numbers.

Correct Answer: D
QUESTION 6
When troubleshooting a phone that is unable to get an IP address from a DHCP server, what is the first thing to check for on the phone?
A. Make sure that DHCP Enabled is disabled on the phone.
B. Make sure that the phone is getting the proper VLAN information
C. Make sure that the TFTP server address is correct on the phone.
D. Make sure that the DHCP scope has enough addresses left in the range.
E. Make sure the phone has the correct phone load ID.

Correct Answer: B
QUESTION 7
Which issue does CAS signaling on a T1 circuit create?
A. Signaling bits are subtracted from each frame, which causes a significant loss of voice quality.
B. An extra signaling bit is added to the sixth frame to carry signaling information.
C. A signaling bit is subtracted from every sixth frame to carry signaling information.
D. Signaling bits are added to the signaling stream to create extended super frames.

Correct Answer: C
QUESTION 8
How does the Cisco Unified Communications Manager Express match an outbound VoIP dial peer?
A. Outbound dial-peer matching uses the entire string of digits en bloc to match the dial peer with the longest match.
B. Outbound dial-peer matching is completed on a digit-by-digit basis.
C. It matches outbound dial peers by placing all the dial peers into a hunt group and then uses the entire dialed number en bloc to match the first dial peer.
D. Cisco Unified Communications Manager Express creates a hunt group that contains all the configured dial peers and then applies the dial digits in a digit-by-digit manner to match a dial peer.

Correct Answer: A
QUESTION 9
In which situation are user PINs maintained by the local Cisco Unified Communications servers?
A. Only when the system is using LDAP synchronization.
B. Only when the system is using LDAP authentication.
C. Only when the system is using Global Directory.
D. PINs are always maintained by the local Cisco Unified Communications Manager servers
E. PINs are never maintained by the local Cisco Unified Communications Manager servers.

Correct Answer: D
QUESTION 10
An IP phone has a line calling search space and a device calling search space. If a call is made from the IP phone, which calling search space is used?
A. Neither calling search space is used.
B. The line calling search space takes precedence and is used.
C. The device calling search space takes precedence and is used.
D. The line and device calling search spaces are combined and the line calling search space has precedence.

Correct Answer: D
QUESTION 11
Which command is used to determine if an MGCP gateway is registered with a Cisco Unified Communications Manager server?
A. show gateway status
B. show isdn q931
C. show ccm-manager
D. show isdn status
E. show isdn q921

http://www.examcoop.com/640-461.html

Read More

Cisco.642-813.2013-10-08.by.Wendy.104q

http://www.examcoop.com/642-813.html

MCQ1

QUESTION 1
Which statement is true about RSTP topology changes?
A. Any change in the state of the port generates a TC BPDU.
B. Only nonedge ports moving to the forwarding state generate a TC BPDU.
C. If either an edge port or a nonedge port moves to a block state, then a TC BPDU is generated.
D. Only edge ports moving to the blocking state generate a TC BPDU.
E. Any loss of connectivity generates a TC BPDU.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:
The IEEE 802.1D Spanning Tree Protocol was designed to keep a switched or bridged network loop free,
with adjustments made to the network topology dynamically. A topology change typically takes 30
seconds, where a port moves from the Blocking state to the Forwarding state after two intervals of the
Forward Delay timer. As technology has improved, 30 seconds has become an unbearable length of time
to wait for a production network to failover or “heal” itself during a problem.

Topology Changes and RSTP
Recall that when an 802.1D switch detects a port state change (either up or down), it signals the Root
Bridge by sending topology change notification (TCN) BPDUs. The Root Bridge must then signal a
topology change by sending out a TCN message that is relayed to all switches in the STP domain. RSTP
detects a topology change only when a nonedge port transitions to the Forwarding state. This might seem
odd because a link failure is not used as a trigger. RSTP uses all of its rapid convergence mechanisms to
prevent bridging loops from forming.

Therefore, topology changes are detected only so that bridging tables can be updated and corrected as
hosts appear first on a failed port and then on a different functioning port. When a topology change is
detected, a switch must propagate news of the change to other switches in the network so they can correct
their bridging tables, too. This process is similar to the convergence and synchronization mechanism-
topology change (TC) messages propagate through the network in an everexpanding wave.

QUESTION 2
Which description correctly describes a MAC address flooding attack?
A. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
B. The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
C. The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
D. The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
E. Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
F.     Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
Correct Answer: F Section: (none) Explanation
Explanation/Reference:
Explanation:

QUESTION 3
What does the command “udld reset” accomplish?
A. allows a UDLD port to automatically reset when it has been shut down
B. resets all UDLD enabled ports that have been shut down
C. removes all UDLD configurations from interfaces that were globally enabled
D. removes all UDLD configurations from interfaces that were enabled per-port
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
Explanation:

QUESTION 4
Which statement is true about Layer 2 security threats?
A. MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use Dynamic ARP Inspection to determine vulnerable attack points.
B. DHCP snooping sends unauthorized replies to DHCP queries.
C. ARP spoofing can be used to redirect traffic to counter Dynamic ARP Inspection.
D. Dynamic ARP Inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.
E. MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
F. Port scanners are the most effective defense against Dynamic ARP Inspection.
Correct Answer: E Section: (none) Explanation
Explanation/Reference:
Explanation:
First of all, MAC spoofing is not an effective counter-measure against any reconnaissance attack; it IS an
attack! Furthermore, reconnaissance attacks don’t use dynamic ARP inspection (DAI); DAI is a switch
feature used to prevent attacks.

QUESTION 5
What does the global configuration command “ip arp inspection vlan 10-12,15” accomplish?
A. validates outgoing ARP requests for interfaces configured on VLAN 10, 11, 12, or 15
B. intercepts all ARP requests and responses on trusted ports
C. intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings
D. discards ARP packets with invalid IP-to-MAC address bindings on trusted ports
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
Explanation: The “ip arp inspection” command enables Dynamic ARP Inspection (DAI) for the specified VLANs. DAI is a security feature that validates Address Resolution Protocol (ARP) packets in a network. DAI allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings. This capability protects the network from certain “man-in-the- middle” attacks.
Reference: http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.1/20ew/configuration/guide/dynarp .html

QUESTION 6
What are two methods of mitigating MAC address flooding attacks? (Choose two.)
A. Place unused ports in a common VLAN.
B. Implement private VLANs.
C. Implement DHCP snooping.
D. Implement port security.
E. Implement VLAN access maps
Correct Answer: DE Section: (none) Explanation
Explanation/Reference:
Explanation:

QUESTION 7
What is one method that can be used to prevent VLAN hopping?
A. Configure ACLs.
B. Enforce username and password combinations.
C. Configure all frames with two 802.1Q headers.
D. Explicitly turn off DTP on all unused ports.
E. Configure VACLs.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
Explanation:
When securing VLAN trunks, also consider the potential for an exploit called VLAN hopping. Here, an
attacker positioned on one access VLAN can craft and send frames with spoofed 802.1Q tags so that the
packet payloads ultimately appear on a totally different VLAN, all without the use of a router.

For this exploit to work, the following conditions must exist in the network configuration:
The attacker is connected to an access switch port.
The same switch must have an 802.1Q trunk.
The trunk must have the attacker’s access VLAN as its native VLAN. To prevent from VLAN hopping turn
off Dynamic Trunking Protocol on all unused ports.

http://www.examcoop.com/642-813.html

Read More

Real HP HP0-091 Exam Questions

Part III: Ubuntu for System Administrators
Chapter 19: Understanding the hp0-091 hp0-091 exam questions Ubuntu Startup and Shutdown Processes . 551
Overview of the Ubuntu Linux Startup Process ………………………………………………………………551 The Boot Monitor or BIOS ………………………………………………………………………………….552 The Boot Loader ………………………………………………………………………………………………552 Loading the Kernel…………………………………………………………………………………………….554 Loading and Using an Initial RAM Disk or RAM Filesystem ……………………………………..555 The Init Process ………………………………………………………………………………………………..557 Examining the Boot Process with Boot Chart ………………………………………………………………….558 Optimizing the Ubuntu Boot Process …………………………………………………………………………..560 The Ubuntu Linux Shutdown Process …………………………………………………………………………..564 Summary ………………………………………………………………………………………………………………….566 hp0-091 exam

hp0-091

hp0-091 Chapter 20: Adding, Removing, and Updating Software. . . . . . . . . . . 567
Overview of Ubuntu Package Management Software ……………………………………………………….568 Ubuntu Repositories and Components …………………………………………………………………………..570 Enabling Additional Repository Components…………………………………………………………571 Enabling Additional Repository Sources Using a Text Editor ……………………………………572 Enabling Additional Repository Sources Using the Software Properties Tool ………………573 Problems Adding or Accessing Nonstandard Repositories ……………………………………….577 Mixing Ubuntu and Debian Repositories ………………………………………………………………578 Exploring Your System Using dpkg and Friends………………………………………………………………580 Listing the Packages that are Installed on Your System …………………………………………….581 Listing the Packages that are Available for Your System …………………………………………..582 Listing Information About a Package ……………………………………………………………………585 Listing the Contents of a Package …………………………………………………………………………586 Determining What Package Provides an Existing File………………………………………………587 Determining What Package Provides a Missing File ………………………………………………..588 Using apt-get to Add and Remove Software ……………………………………………………………………588 Upgrading Your System Using apt-get ………………………………………………………………….590 Smart System Upgrades Using apt-get ………………………………………………………………….590 Retrieving Package Source Code Using apt-get……………………………………………………….590 Satisfying Build Dependencies Using apt-get …………………………………………………………592 Using aptitude to Add and Remove Software ………………………………………………………………….592 Tips and Tricks for Using the aptitude User Interface ………………………………………………593 Using aptitude to Install Recommended Software ………………………………………………….595 Advantages of Using aptitude to Install and Remove Software ………………………………….596 Using Synaptic to Add and Remove Software ………………………………………………………………….597 Configuring Synaptic Preferences…………………………………………………………………………599 Searching for Software in Synaptic ……………………………………………………………………….601 Installing Packages in Synaptic…………………………………………………………………………….603 Removing Packages in Synaptic …………………………………………………………………………..607

xvi

Contents

Using the Ubuntu Update Manager ………………………………………………………………………………609 Converting Packages from Other Package Formats…………………………………………………………..610 Keeping your System Lean, Mean, and Pristine ………………………………………………………………613 Summary ………………………………………………………………………………………………………………….614

Chapter 21: Managing Users, Groups, Authentication, and Advanced Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Creating and Managing Users and Groups ……………………………………………………………………..616 Creating New Users …………………………………………………………………………………………..617 Managing Existing Users ……………………………………………………………………………………622 Creating New Groups ……………………………………………………………………………………….624 Managing Existing Groups ………………………………………………………………………………….625 PAMs and the Linux Authentication Process……………………………………………………………………626 PAM Configuration Files for Applications and Services …………………………………………..628 Example: PAMs Used by the Login Process …………………………………………………………..629 Configuration Files for Various PAMs ……………………………………………………………………632 What If PAM Configuration Files Are Missing?……………………………………………………….632 Customizing the sudo Command on Ubuntu Systems ……………………………………………………..633 Using ACLs for Sophisticated File Sharing ……………………………………………………………………..636 Overview of Linux ACLs ……………………………………………………………………………………637 Installing ACL Commands on Ubuntu ………………………………………………………………….637 Activating Filesystem Support for ACLs ………………………………………………………………..638 Working with ACLs from the Command Line ……………………………………………………….639 hp0-091 exam hp0-091 exam dumps Working with ACLs Using Graphical Tools …………………………………………………………..641 Summary ………………………………………………………………………………………………………………….645

Read More

1Y0-350 Citrix Real Exam Questions,Latest 1Y0-350 Questions

1y0-350

Hour 16. Working with Dat Getting the Date with ti

Converting a Timestamp
Converting a Timestamp Creating Timestamps wit
An Example A Date Pull-down Library Summary
Q&A
Workshop
Exercise
Hour 17. Advanced Objects Objects and 1y0-350 Constants Static Properties
Static Methods Intercepting Calls to Obj Final Methods
Cleaning Up Using Destru

Managing Error Condition

Tools for Building Object Passing and Assigning Ob
Summary
Q&A

Workshop

Exercises

Hour 18. Working with Reg
Perl Compatible Regular
Summary

Q&A

Workshop

Exercise Hour 19. Saving State with
Cookies Setting a Cookie with PH
Working with the Query S Creating a Query String Summary Q&A Workshop
Exercises
Hour 20. Saving State with

What Are Session Functio
Starting a Session with s

Working with Session Var
Destroying Sessions and Passing Session IDs in th Encoding and Decoding S Summary
Q&A
Workshop
Exercises
Hour 21. Working with the Opening Pipes to and fro
proc_open()
Running Commands with
Running External Comma Operator
Plugging Security Holes w Running External Applica Calling an External CGI S
Summary
Q&A
Workshop
Exercises Hour 22. XML
What Is XML?

XML Parser Functions An Introduction to the DO
XSL: A Brief Discussion Introducing SimpleXML
Summary
Q&A

Workshop

Exercises

Part IV: Extending PHP Hour 23. PEAR: Reusable C PHP
What Is PEAR? Some PEAR Packages in A PEAR and Your Own Code Summary Q&A
Workshop Exercises Hour 24. Toward a Framew Principles and Problems
The Controller
Object The RequestHelper
and The CommandFactory
Cla
The Command
Class
The Dispatcher
Class Working with the Framew
Where Now, and Was It W Summary 1y0-350 vce Q&A
Workshop
Exercises Glossary Index

Copyright

Copyright . 2004 by Sams Publishing
All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein.
Library of Congress Catalog Card Number: 2003109402
Printed in the United States of America
First Printing: December 2003
06 05 04 03 4 3 2 1
Trademarks
All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Sams Publishing cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The 1y0-350 questions information provided is on an ¡°as is¡± basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the programs accompanying it.

Read More

1Y0-400 Citrix Real Exam Questions,Free VCE Exams For All

 

1Y0-400

DIE ZEITSCHRIFT FÜR LINUX-PROFESSIONALS

Alternative VPNs mit Groupware Peer-to-Peer-Chic
Tinc, Freelan, Ipop und Zero Tier bauen 1Y0-400 Overlay-Verbindungen und Tunnel auf S. 44

Mozilla Rust 1.0

Mit Elan und Venture Capital: Statisch getypte Sprache, Freie Davids kämpfen gegen die Wert auf Schnelligkeit Exchange und Notes S. 58 und Sicherheit legt S. 84

Apache-Land
Eine fesselnde Exkursion ins ausgedehnte Reich der Apache Software Foundation
rfolg ohne Büros: Das Geheimnis der Apachen S. 18 E   adoop 2 und Apache Spark S. 22 H  Apache Aurora steuert Infrastrukturdienste S. 26   Jmeter: Konkurrenzarmer Spezialist für Lasttests S. 30   Tuning-Guide für den Apache Webserver S. 36

in der Wüste: Open-StackProjekt schickt ,,Sahara” vor S. 66   entral konfigurieren: Z Was Etcd, Consul und Zookeeper taugen S. 72

louds C

Perl-Autor Mike Schilli verheddert sich fast in einer vermeintlich trivialen Mathe-Aufgabe S. 92
www.linux-magazin.de
Deutschland Österreich

46,40

47,05

sfr12,80

Schweiz

Benelux

Spanien

Italien

47,50

48,30

48,30

4 192587 306401

08

08/2015

Voll vernetzt
Internet der Dinge, IoT, ist der Megatrend: Toaster mit IPv6-Adresse, oder die Lichtfarbe zu Hause in Buxtehude justieren, während man selbst in Usbekistan an der Bar eines Mittelklasse-Hotels hockt ­ der Stromversorger erfährt natürlich auch davon. Alles Nonsens für Technikfreaks? Von wegen: Auf einer Privatjacht im schönen Monte Carlo am Vorabend des Großen Preises von Monaco hatte gerade die erste vernetzte Champagnerflasche ihren ersten Auftritt. Hersteller des Behältnisses ist Maison Mumm. Die Pressemitteilung verspricht: ,,Die vernetzte Magnum ist eine Innovation für noch mehr Feierspaß.” Kein Wunder, denn in dem Moment, indem der Korken von der vernetzten Flasche springt, ,,stellt ein Sensor eine Verbindung zu einem Empfänger im Audio- und Videosystem des Austragsungsortes her und lässt ein interaktives Ton- und Bilderlebnis aus, das von jedem Luxus-Nachtclub, der dieses Angebot nutzt, persönlich Jan Kleinert, Chefredakteur angepasst werden kann.” Solch gediegene Transparenz der oberen Zehntausend wünscht sich der schnöde Biertrinker schon lange. Da aber die Innovationen der Formel 1 ein paar Jahre später auch die Kompaktklasse erreichen, sind für normalverdienende Smart-Homiker Hopfen und Malz nicht verloren. Den neuesten Transparenztrend stößt, ja: richtig gelesen, der Bauernverband von Mecklenburg-Vorpommern an. In Sachen Urbanität etwas peripher positioniert, betritt er mit Gummistiefeln mediales Neuland, indem er aus einem Saustall Livebilder via Satellit ins Internet überträgt. ,,Schweine-TV” heißt das Format ungewollt vieldeutig. Welche fette Sau am Ende die Big Brother Show gewinnt, kann niemand wissen. Der bauernschlaue Verband aber darf sich als Erfinder eines hippen Drei-Buchstaben-Trends fühlen: IoA, Internet of Animals. Technisch und rechtlich ungleich schwerer tut sich der Trend Internet of People (IoP), auch bekannt als anlasslose Vorratsdatenspeicherung. Vor Jahren vor zwei obersten Gerichten krachend gescheitert, unternimmt die deutsche Große Koalition einen neuen Versuch, sie gegen den Widerstand von Bürgerrechtlern, Datenschützern und der Internetwirtschaft wieder in Kraft zu setzen (siehe Artikel ab Seite 78). IoP loggt die Aktivitäten aller Bürger der Informationsgesellschaft 24×7. Das hilft zwar nachweislich nicht gegen Terroristen, die anfallenden Daten lassen sich aber sicher nutzbringend auf andere Weise verwerten. IoT, IoA, IoP: Ob es urologisch oder gesellschaftlich vorteilhaft ist, wenn beim Öffnen einer jeden Bierflasche deren Kronkorken einen Raspberry Pi dazu veranlasst, die zum Gerstensaft passende Pinkellichtfarbe im Klo anzumischen, muss sich genauso erst erweisen, wie für ein Bauern-TV-überwachtes Ferkel, das statt einer Fernsehkarriere lieber draußen die Sau rauslassen würde. Und ob der voll vorratsdatengespeicherte Bürger die versprochene Freiheit vor Verbrechern als so genussvoll erleben wird? Ob überwachten Toaster, ob TV-Schwein wider Willen oder ob der rund um die Uhr abgenuckelte Bürger: Strukturell interessanter als die Überwachten in der schönen IoX-Welt sind die Überwacher: Eventsüchtige Alkoholkonsumenten, Männer, die auf Schweine starren, und Polizisten, die in Suchmasken bevorzugt »alle« eintippen. Bleibt am Ende die Frage, ob sich das Stalking stoppen lässt. Schwierig, denn: Mumm muss man haben. Schwein muss man haben. Internet und Telefon muss man haben. Biertrinker könnten ihrem Hobby in einem faradayschen Käfig frönen, der Korkensensoren ihren Plopp-Botschafter-Status entzieht. Die recht intelligenten Schweine werden wohl die Stall-Webcam durch geschickt geworfene Exkremente blind machen. Dem dauerverpetzten IoP-Bürger bleibt allein die Flucht in die Wahlkabine ­ solange die keiner zum Internet of Vote (IoV) umrüstet.

Login www.linux-magazin.de

Editorial 3

Inhalt
www.linux-magazin.de

4

08/2015

08/2015

Die Apache Software Foundation liegt nicht faul auf der gegerbten Tierhaut, sondern fördert nach Kräften eine florierende Community aus großen und kleinen Projekten. Der Schwerpunkt unternimmt eine organisierte Reise in das großflächige Apache-Reservat, gibt einen stammesgeschichtlichen Überblick und porträtiert besonders interessante Softwarefamilien.

Aktuell  6 News  n Kernel4.1mitLangzeit-Support n ApplegibtSwiftfrei n Tine2.0Groupware n Enterprise-Harddiskmit10TByte n VideokonferenzenperFirefox n TheMachinevonHPmitLinux n DaszweiteUbuntuPhone n WaylandundWeston1.8 n Kubuntu-Chefbeurlaubt

Titelthema:Apache-Land A  18  pacheSoftwareFoundation Titel HundertevonProjektenstecken unterdemDachderApacheSoftware Foundation.TrotzdembrichtkeinChaos aus.Wiemachendiedas? 26  pacheAurora A ImRechenzentrumverteiltAuroradie wichtigstenDienste.Gelernthatdas Mesos-FrameworkbeiTwitter.

Die Apache Software Foundation brütet pro Monat rund zwei neue Projekte aus.

Wie Mesos ist auch Aurora ein Projekt unter dem Dach der Apache Software Foundation.

Die von HP als revolutionär vorgestellte Hardware The Machine läuft auf Linux.

22  adoop2undApacheSpark H WerimDatenmeerfischengeht,sollte bessereinenordentlichenTrawlerim Schlepptauhaben.Hadoop2undApache SparkscheinenfürdenJobgeeignet.

30  meter J Vorbelastet:DasfreieJmeteristeinfast konkurrenzlosesToolfürLasttests. 34 Apache-Serveroptimieren AusdembewährtenApache-Webserver lässtsichmehrPerformancerausholen.

12  ahlen&Trends Z n VisionenfürOpenStack n UnsichereSmartHomes n 20JahreJava n DropboxmitSicherheitszertifikat n GimpstreitetmitSourceforge n UbuconsuchtVorträge n MozillaerhöhtKopfgeldfürBugs n TrendsinRechenzentren

Zwei Apache-Projekte liefern die Ausrüstung für die Big-Data-Flotte.

Intelligent eingesetzte Direktiven machen den HTTP-Server von Apache pfeilschnell.

DELUG-DVD
Fedora22
DasOriginal:OffizielleISO-Files derWorkstation-unddieAtomicHost-Versionfür64-Bit-Rechner
TOOL

Details zu DVDTOOL Inhalten auf S. 41

Remnux6.0
Ubuntu-14.04-basiertevirtuelle Security-Appliance,diebeispielsweisehilft,Malwarezuanalysieren
TOOL

TOOL

Raspi-Buch
VollständigesFranzis-E-Book: ,,LinuxmitRaspberryPi” (über300SeitenausderPraxis)

TOOL

GrazerLinuxtage
DieDVD-SeiteAistrandvollmit Vortragsvideoszuangesagten Admin-undProgrammierthemen

Mark Collier, COO der Open Stack Foundation, erläuterte seine Vision für Open Stack.

08/2015

Software E  41  inführung DELUG-DVD:IP-Fire,Fedora,Raspi-E-Book 42  P-Fire I DieaktuelleVariantevonIP-Firesteuert derAdminperWeboberflächeundfiltert TrafficaufBasisvonGeodaten. 44  itparade B Titel DiebeliebtenVPN-Tunnellassensich auchimPeer-to-Peer-Verfahrengraben. VierP2P-VPN-LösungenimVergleich.

Sysadmin 57  inführung E 1y0-400 vce MitdemTLSInterposerhältCharlydie Open-SSL-BibliothekenimSchach. 58  reieGroupware F Titel DiebisherigenEntwicklungenaufdem FeldderGroupwarefürLinuxbeleuchtet dieserArtikelkritisch. 66  penStackSahara O Titel DieKomponentewill,dasssichOpen StackundHadoopbesserverstehen.

Read More

1Y0-250 Configuring Networks NetScreen & SSG Firewalls

Configuring

Juniper Networks
®

NetScreen & SSG Firewalls
® Rob Cameron Technical Editor Brad Woodberg Mohan 1Y0-250 Krishnamurthy Madwachar Mike Swarm Neil R. Wyler Matthew Albers Ralph Bonnell

FOREWORD BY SCOTT KRIENS
CEO, JUNIPER NETWORKS

Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc. “Syngress:The Definition of a Serious Security Library”TM, “Mission CriticalTM,” and “The Only Way to Stop a Hacker is to Think Like OneTM” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY 001 002 003 004 005 006 007 008 009 010 SERIAL NUMBER HJIRTCV764 PO9873D5FG 829KM8NJH2 5489IJJLPP CVPLQ6WQ23 VBP965T5T5 HJJJ863WD3E 2987GVTWMK 629MP5SDJT IMWQ295T6T

PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370
Configuring Networks NetScreen & SSG Firewalls

Copyright © 2007 by Syngress Publishing, Inc. All rights reserved. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. 1 2 3 4 5 6 7 8 9 0 ISBN-10: 1-59749-118-7 ISBN-13: 978-1-59749-118-1 Publisher: Andrew Williams Acquisitions Editor: Gary Byrne Technical Editor: Rob Cameron Cover Designer: Michael Kavish Page Layout and Art: Patricia Lupien Copy Editors: Mike McGee, Sandy Jolley Indexer: Nara Wood

Distributed by O’Reilly Media, Inc. in the United States and Canada. For information on rights, translations, and bulk sales, contact Matt Pedersen, Director of Sales and Rights, at Syngress Publishing; email [email protected] or fax to 781-681-3585.

Lead Author and Technical Editor
Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His background includes five years of security consulting for more than 300 customers.This is Rob’s second book; the previous one being Configuring NetScreen Firewalls (ISBN: 1-93226639-9) published by Syngress Publishing in 2004.

Contributing Authors
Matthew Albers (CCNP, CCDA, JNCIA-M, JNCIS-FWV, JNCIA-IDP) is a senior systems engineer for Juniper Networks. He currently serves his enterprise customers in the Northern Ohio marketplace. His specialties include routing platforms, WAN acceleration, firewall/VPNs, intrusion prevention, strategic network planning, network architecture and design, and network troubleshooting and optimization. Matthew’s background includes positions as a senior engineer at First Virtual Communications, Lucent Technologies, and Bay Networks. Matthew wrote Chapter 1 and cowrote Chapter 11.

iii

Ralph Bonnell (CISSP, LPIC-2, CCSI, CCNA, MCSE: Security) is a senior information security consultant at Accuvant in Denver, CO. His primary responsibilities include the deployment of various network security products and product training. His specialties include NetScreen deployments, Linux client and server deployments, Check Point training, firewall clustering, and PHP Web programming. Ralph also runs a Linux consulting firm called Linux Friendly. Before moving to Colorado, Ralph was a senior security engineer and instructor at Mission Critical Systems, a Gold Check Point partner and training center in South Florida. Ralph cowrote Chapter 11. Mohan Krishnamurthy Madwachar (JNCIA-FWV, CWNA, and CCSA) is AVP-Infrastructure Services for ADG Infotek, Inc., Almoayed Group, Bahrain. Almoayed Group is a leading systems integration group that has branches in seven countries and executes projects in nearly 15 countries. Mohan is a key contributor to the company’s infrastructure services division and plays a key role in the organization’s network security and training initiatives. Mohan has a strong networking, security, and training background. His tenure with companies such as Schlumberger Omnes and Secure Network Solutions India adds to his experience and expertise in implementing large and complex network and security projects. Mohan holds leading IT industry certifications and is a member of the IEEE and PMI. Mohan would like to dedicate his contributions to this book to his sister, Geetha Prakash, and her husband, C.V. Prakash, and their son, Pragith Prakash. Mohan has coauthored the book Designing and Building Enterprise DMZs (ISBN: 1-597491004), published by Syngress Publishing. He also writes in newspaper columns on various subjects and has contributed to leading content companies as a technical writer and a subject matter expert. Mohan wrote Chapter 12.

iv

Mike Swarm is a Security Solutions Engineer at Juniper Networks. Mike consults with Juniper’s technical field and customer communities worldwide on security design practices. Mike has over a decade of experience focused on network security. Prior to Juniper Networks and its NetScreen Technologies acquisition, Mike has been a Systems Engineer at FTP Software and Firefox Communications. Mike wrote Chapter 10. Brad Woodberg (JNCIS-FWV, JNCIS-M, JNCIA-IDP, JNCIASSL, CCNP) is a Security Consultant at Networks Group Inc. in Brighton, MI. At Networks Group his primary focus is designing and implementing security solutions for clients ranging from small business to Fortune 500 companies. His main areas of expertise include network perimeter security, intrusion prevention, security analysis, and network infrastructure. Outside of work he has a great interest in proof-of-concept vulnerability analysis, open source integration/development, and computer architecture. Brad currently holds a bachelor’s degree in Computer Engineering from Michigan State University, and he participates with local security organizations. He also mentors and gives lectures to students interested in the computer network field. Brad wrote Chapters 5­8 and contributed to Chapter 13. He also assisted in the technical editing of several chapters. Neil R. Wyler (JNCIS-FWV, JNCIA-SSL) is an Information Security Engineer and Researcher located on the Wasatch Front in Utah. He is the co-owner of two Utah-based businesses, which include a consulting firm with clients worldwide and a small software start-up. He is currently doing contract work for Juniper Networks, working with the company’s Security Products Group. Neil is a staff member of the Black Hat Security Briefings and Def Con hacker conference. He has spoken at numerous security conferences and been the subject of various online, print, film, and tele-

v

vision interviews regarding different areas of information security. He was the Lead Author and Technical Editor of Aggressive Network Self-Defense (Syngress, 1-931836-20-5) and serves on the advisory board for a local technical college. Neil cowrote Chapter 13.

vi

Contents
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Chapter 1 Networking, Security, and the Firewall . . . . . . . . . . . . . . . . . . . . . 1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Understanding Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 The OSI Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Moving Data 1y0-250 dumps along with TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Understanding Security Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Understanding Firewall Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 Types of Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26 Firewall Ideologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31 DMZ Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31 Traffic Flow Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Networks with and without DMZs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38 DMZ Design Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41 Designing End-to-End Security for Data Transmission between Hosts on the Network . . . . . . . . . . . . . . . . . . . . . . . . . . .42 Traffic Flow and Protocol Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44 Solutions Fast Track . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46

Read More

THIS BROCHURE IS ISSUED 000-340 FOR INFORMATIONAL PURPOSES ONLY. ITS CONTENTS WILL NOT BE UPDATED. IT MUST NOT BE USED AS AN OFFICIAL REFERENCE.

AIRBUS

A340
Flight Deck and Systems
Briefing for Pilots

FOR TECHNICAL DATA  000-340 OR OPERATIONAL PROCEDURES,
PLEASE REFER TO THE
RELEVANT AIRBUS DOCUMENTATION.

STL 472.502/90 Issue 6 January 2000
Contents

1.
General
2.
Flight Deck Layout

3.
Electrical System

4.
Hydraulic System

5.
Flight Controls

6.
Landing Gear

7.
Fuel System
8.
Engine Controls

9.
Auxiliary Power Unit (APU)

10.
Automatic Flight System

11.
Environmental Control System

12.
Electronic Instrument System (EIS)

13.
Radio Management and Communication

14.
Central Maintenance System (CMS)

1. General

A340 General

General arrangement
A340-300 illustrated below
Typical cabin layout
A340-200 239 seats
16 sleeperette 42 Business class (62 in pitch) (40 in pitch)
A340-300 295 seats
18 sleeperette 49 Business class (62 in pitch) (40 in pitch)
Fuselage cross-section
STL 472.502/90 Issue 6
181 Economy (32 in pitch)
228 Economy (32 in pitch)
Passenger cabin
zTrue wide-body spaciousness and adaptability

Lower cargo holds
. Large, efficient, fully compatible with existing worldwide air cargo system.

A340 General

Introduction
.
The ultra-long-range A340 is an all-new, wide-body, four-engine, twin-aisle aircraft. It is offered in two models, the -200 and -300 whose length is increased by two four-frame fuselage plugs.

.
The design combines the high technology, developed for the A320, with the vast experience gained from the A300 and A310 aircraft currently in worldwide service.

As with the A320, A321 and A330, it incorporates all
of the following features :
-Two-man crew operation with CRT displays;
-Electrically signalled flight controls;
-Sidestick controllers;
-Full Authority Digital Engine Control (FADEC);
-Centralized Maintenance System (CMS).
.
Since its introduction in early 1993, the aircraft has been the most advanced long-range airliner offering a major stride forward in airline profitability.

.
Certification basis includes : -JAR 25 at Change 13, -JAR AWO at Change 1 for CAT II and CAT III
and autoland,
-ICAO Annex 16 (Chapter 3) for noise.

STL 472.502/90 Issue 6
Basic data

A340-300
A340-200
MTOW* MLW MZFW
Max fuel capacity
Max operatingaltitude
Powerplants
Design speeds Vmo/Mmo
Underfloor cargo 275 000 kg 185 000 kg 173 000 kg
155 040 L
41 100 ft
CFM56-5C2 31 200 lb
CFM56-5C3 32 500 lb
CFM56-5C4 34 000 lb
330 kt CAS/0.86
26LD3 +9 pallets
+ bulk 19.7 m3
* Max ramp weight 900 kg higher than MTOW
275 000 kg 190 000 kg 178 000 kg
147 840 L
41 100 ft
CFM56-5C2 31 200 lb
CFM56-5C3 32 500 lb
CFM56-5C4 34 000 lb
330 kt CAS/0.86
32LD3/9 pallets
+ bulk 19.7 m3

A340 General

Aircraft design specifications
1.
Design weights (see page 1.3)

2.
Design speeds
VMO = 330 kt CAS
MMO = 0.86
VD = 365 kt CAS
MD = 0.93
VB = 270 kt CAS
MB = 0.78
VLO,LE = 250 kt CAS

3. Slat and flap design speeds 4. Structural life (design aims)
The objectives for primary structure fatigue life are based on the average block time of 4 hours, as follows : -Design life goal …………………………. 20000 flights -Threshold for initial inspection ………… 8 750 flights
5. Landing gear The design aim is 25000 cycles safe life operation in accordance with FAR and JAR.
6. Cabin pressure
Lever position Function Config. No. Design speed VFE kt (CAS)
0 Climb/cruise/holding 0 –
1 Holding 1 240
1 Takeoff 1 + F 215
2 Takeoff 2 196
3 Takeoff/approach 3 186
Full Landing Full 180

Max nominal operational differential pressure 593 hPa ±7 8.60 psi ± 0.1 psi
Actuating cabin pressure of discharge valve 610 hPa ± 7 8.85 psi ± 0.1 psi
Max relief valve overpressure 638 hPa 9.25 psi
Max negative differential pressure -70 hPa 1.00 psi

A340 General

Aircraft design specifications

7. Fuel capacity
Center tank Inner tank LH Inner tank RH Outer tank LH Outer tank RH Trim tank ACTS
Total
Litres
41 560 42 775 42 775 3 650 3 650 6 230 7 200 x 2
155 040

US gallons
10 979 11 301 11 301 964 964 1 640 1 902 x 2
40 959

8. Pavement strength
Max ramp weight and max aft CG.
A340-200 A340-300 A340 model Cat A 56 57 Cat B 60 61 Cat C 70 71 Flexible pavement Cat D 96 97 Cat A 47 47 ACN Cat B 54 54 Cat C 65 65 Rigid pavement Cat D 76 76

Tire radials -1400 mm x 530 mm x R23
STL 472.502/90 Issue 6

A340 General

Performance -payload range
In typical airline long-range configuration, with typical international reserves and 200 nm alternate, the range is as follows : -A340-200 three-class : 239 passengers + baggage
8 000nm nominal – three-class : 295 passengers + baggage 7 300nm nominal

A340-200 payload/range diagram A340-300 payload/range diagram
Full passenger load (3-class)
Full passenger load (3-class)
Typical international reserves
Typical international reserves
Payload
200nm alternate Payload
200nm alternate

tonnes/1 000lb
tonnes/1 000lb
120
239 passen gers + 21.3t cargo A34 0-200
239 passeng ers 8 000nm 275t
120
40
40
80
80
20
20
40
40
0 0
0
0

295 passeng ers + 19.3t cargo A340-275t + 1 300 ACT
295 passenge IBM 000-340 Exam rs 7 300nm
0 2 000 4 000 6 000 8 000 10 000
0 2000 4 000 6 000 8 000 10 000
Range (nm)
Range (nm)
A340 General

Read More

200-001 Mid-day Buzzers: Cisco Systems, Inc. (CSCO), Genworth Financial Inc (GNW)

The Company moved 0.66% up right now and is at $26.58. Stock is trading in the real-time trading session with the total volume of 9.31 million shares, as compared to its average volume of 39.43 million shares. The 52-week range of the share price is from $22.46 – $30.31. The beta value for this stock stands at 1.28 points, while its 200-001 earnings per share (EPS) was $2.02. The company has total market capitalization of $132.82 billion and a total of 5.03 billion outstanding shares.

On February 25, 2016, Dimension Data and Cisco Systems, Inc. (CSCO) 050-719 celebrated the 25th anniversary of our strategic business relationship. In 1991, the companies began partnering in South Africa and this has since grown to nearly 150 countries around the world. Long-time and new clients 050-730 have stayed on the cutting edge with Dimension Data’s leadership and rapid pace of launching innovative campaigns in Security, Cloud, Collaboration, Cisco Application Centric Infrastructure (Cisco ACI™) and a burgeoning Digital Practice.

“Partnering with Cisco plays a key role in ensuring that we consistently deliver world-class solutions and services to our clients to accelerate their ambitions. Our market is changing but our partnership is more relevant than ever. Our clients need to capitalize in bold ways on the promise that digitization and big data provide. And, we’re committed to help them do it – together,” said Brett Dawson, Dimension Data’s Group CEO.

In the past 25 years, Dimension Data has also grown and expanded its “as-a-Service” offerings on Cisco infrastructure and the companies have teamed on 070-465 the Internet of Things to deliver solutions for sports and recreation, Connected Healthcare and Connected Cities. In the past two years alone, the companies have introduced groundbreaking initiatives, such as helping the World Wildlife Fund (WWF) create a sustainable workplace of the future called the Living Planet Centre in its London head office.

The Company declined -1.38% and is at $2.15 in the Real-Time trading session. Trading volume recorded for this company is 070-484 about 7.02 million shares as compared to its average volume of 9.52 million shares. The share price plunged almost -22.66% in the last one month. The stock is ranging from $1.98 to $2.24. The company has the total of 498.00 million outstanding shares right now, while its market capitalization is about $1.18 billion.

Genworth Financial Inc (GNW) on Feb. 26, 2016, declared statutory financial and cash flow testing outcome for its life insurance companies for the year finished December 31, 2015. The outcome include:

  • Long term care insurance (LTC) statutory margins were stable 070-515 relative to 2014 in Genworth Life Insurance Company and Brookfield Life and Annuity Insurance Company Limited, with positive aggregate margins of around $2.0 to $2.5 billion after reflecting provisions for adverse deviation (PADs).
  • LTC statutory cash flow testing for Genworth Life Insurance Company of New York (GLICNY) resulted in a negative 070-583 margin of around $355 million, after reflecting PADs, representing an incremental negative margin of around $200 million compared to last year, largely driven by an increase in PADs. The statutory cash flow testing factors used by the New York regulator vary from those used by other regulators, including only allowing approved LTC in force premium rate increases or benefit reductions to be 070-686 utilized in cash flow testing. As a result, statutory LTC reserves were increased by $89 million as of year end 2015, an increase of $50 million from the amount that had been projected to be recognized on a ratable basis based on 2014 results. The remaining $267 million reserve increase is currently expected to be recognized ratably over the 117-202 next three years. As of year end 2015, the risk-based capital (RBC) ratio for GLICNY was 458 percent.

Where The Price Of Cisco Systems, Inc. (NASDAQ:CSCO) Is Heading?

The analysts covering Cisco Systems, Inc. (NASDAQ:CSCO) have a price target of $28.83 on its shares, which exhibits the mean recommendations reached after polling leading market analysts in Thomson Reuters survey. The EPS projections for approaching 1Z0-108 quarter and next fiscal is seen at $0.59 and $2.31, respectively.

Technical Analysis

Cisco Systems, Inc. the last price is trading $1.83 away +7.50% from $24.40, which is the MA of 50-days of the stock. At the same time, the moving average of 200-days is $26.42 and the shares price is hovering $-0.19 or -0.72% distant 1Y0-A26 from this level. The twelve months high of Cisco Systems, Inc. (NASDAQ:CSCO) was $30.31 while $22.46 was the low in same period. It shows that the stock move above $-4.08 will result in a 52-week high. If the stock plunges $+16.79%, it will touch last 52-week low.

MAs also convey vital trading signals on own, or at a time when 1Y0-A16 two averages cross over. As a matter of fact, a rising MA suggests that the stock is in an uptrend, and a declining MA shows it is in a downtrend. Upward momentum is established with a bullish crossover, which is recorded when a short-term moving average moves above a longer-term moving average. Downward momentum is set with a bearish crossover, which 1Y0-300 takes place when a short-term moving average crosses below a longer one.

Stock Valuation

Price-to-Earnings ratio is a repeatedly used test to compute a firm’s valuation. Cisco Systems, Inc. (NASDAQ:CSCO) P/E ratio is set at 12.99 and the PEG ratio stands at 1.39. A great trait of the PEG ratio is that by getting future growth estimates into 200-001 vce the mix, the investors can analyze the relative valuations of numerous industries that may boast different current P/E ratios.

Read More