Admin

Several dead in Oregon college shootings

Sunday, October 4, 2015

Nine people were killed on Thursday by 26-year-old Chris Harper Mercer on the campus of Umpqua Community College in Roseburg, Oregon. By various reports seven or nine people were also injured. Officials said Mercer killed himself during the subsequent shootout with police.

Mercer began the killing spree in a class where he was a student by shooting the class teacher, and killed eight students in that and at least one other classroom. In the next classroom, a student nurse unsuccessfully tried to save the life of her friend who was wounded by the gunman. Another student, ex-soldier Chris Mintz, was shot seven times after coming to help.

The reasons for the attack are not known but CNN reports he singled out people who identified themselves as Christian. The BBC noted Mercer may have revealed his plans via social media and possibly left a written statement. He briefly served in the US Army in 2008.

An ATF (Bureau of Alcohol, Tobacco, Firearms and Explosives) agent said authorities found six weapons at the college and a further seven weapons from the gunman’s home, including a shotgun, all of which appear to have been obtained lawfully by Mercer and members of his family. State laws permit people to carry concealed weapons in higher education institutions and at least one other person at the college was armed. Oregon recently passed a new gun law in response to a shooting incident in 2012, in which a man used a stolen rifle to murder two other people in a Portland shopping center.

Somehow this has become routine. The reporting is routine. My response here at this podium ends up being routine, the conversation in the aftermath of it

Later on Thursday, President Barack Obama spoke for twelve minutes about the incident and called for stricter gun controls in line with other countries like Australia and the United Kingdom. Referring to earlier similar shootings, he said “Somehow this has become routine. The reporting is routine. My response here at this podium ends up being routine, the conversation in the aftermath of it. We have become numb to this”. This is reportedly the fifteenth occasion Obama has spoken out after such a killing spree. He expressed his belief that there would soon be a “press release” from the pro-gun lobby, who would call for a reduction of gun controls. He also predicted there would be criticism levelled at him about his politicization of the matter, but he said “this is something we should politicize.” Although no new initiative was outlined, Obama highlighted Congressional opposition which had stopped “the collection of data on shooting incidents” and stated “this is not something I can do myself.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Several_dead_in_Oregon_college_shootings&oldid=3896141”
Posted by Admin

Ethics debate surrounds surgery to stunt disabled girl’s growth

Friday, January 5, 2007

An ethical controversy has surged in the United States and elsewhere around nine-year-old Ashley X (her family name has not been released). The disabled girl was operated upon at the request of her parents, to prevent her from growing, menstruating and developing breasts. The parents, who wish to remain anonymous, explain their situation on a blog entitled The “Ashley Treatment”. There have been over 1000 reactions on the blog so far.

Ashley suffers a condition termed static encephalopathy with marked global developmental deficits of unknown etiology, which means brain damage of unknown cause leading to a kind of static condition. She can make sounds, move her arms and kick her legs, but she cannot change her position, eat, walk, talk etc. Many of these children are in poor health and die young, but Ashley is in good health. For all of these functions she depends on her caregivers. Most of the day she passes watching her surrounding, lying on a pillow. Her parents call her their “Pillow Angel”, “since she is so sweet and stays right where we place her—usually on a pillow.”

Quote

Ashley can continue to delight in being held in our arms and will be moved and taken on trips more frequently and will have more exposure to activities and social gatherings.

-Ashley’s Mom and Dad

Ashley’s parents want to keep her at home and care for her themselves, and they want to guarantee their daughter’s quality of life. To this end, they say, Ashley underwent several surgical procedures and medical treatments during a period of three years. To attenuate her growth, Ashley was given high doses of the hormone estrogen. Ashley now measures 4ft 5 (1m 35cm) and weighs around 75 lbs (34 kg), which is below her expected length and weight. Her low body weight and size would improve her comfort, and at the same time facilitate the work of her caregivers.

Surgery to remove her uterus (a procedure called a hysterectomy) and breast buds were performed, so Ashley does not menstruate and will not develop breasts, both of which parents think only would cause her discomfort. Since high estrogen levels can cause menstrual bleeding and breast development, the surgery was also meant to limit these effects. She also underwent surgery to remove her appendix, because it would be difficult to diagnose appendicitis given Ashley’s low communication possibilities.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ethics_debate_surrounds_surgery_to_stunt_disabled_girl%27s_growth&oldid=4579132”
Posted by Admin

What All Men Need To Know About Pearly Penile Papules

What all Men Need to Know about Pearly Penile Papules

by

John Dugan

Given the emphasis that our society places on appearance, not to mention virility, it is not surprising that many men are self-conscious about the way their penis looks and feels. This is especially true when things don t appear totally normal or when unusual spots, bumps or rashes appear. Fortunately, most men can rest easy knowing that minor blemishes and redness are common and can be easily resolved. On the other hand, for men who have papules or lesions that do not go away, concerns about warts, social diseases and even cancer can cause plenty of anxiety, and it is not always easy to talk to a doctor about problems of this type. By understanding what to look for and knowing the most effective ways to keep the penis healthy can help put some of these concerns to rest. In this article, a common and benign condition that causes bumps on penis skin is described in detail.

What are pearly penile papules?

As the name suggests, pearly penile papules are small, bead-like bumps that occur in the area of the head of the penis. They may appear singly or in small clusters, but they most commonly form a row around the rim, almost like a necklace. They are generally flesh-colored or a little lighter. Because they can resemble other types of penile growths such as warts, pimples or infected sebaceous glands, it is a good idea to have them checked by a doctor, both for peace of mind and for treatment if necessary.

What causes them?

[youtube]http://www.youtube.com/watch?v=UGNVMX07oVY[/youtube]

Although it is understandable to be concerned about social diseases, pearly penile papules are not caused by sexual contact. Medical professionals are not really sure what causes these benign growths, although they are more common in men who are not circumcised. Often, men will find that these tiny cyst-like bumps will come and go periodically over the course of a lifetime without any obvious trigger.

Are they contagious?

Pearly penile papules are not contagious and cannot be transmitted to a partner. They should not even cause any other symptoms, although they may get sore if they are subjected to vigorous rubbing.

Can they be treated?

Although these papules are completely harmless, they can be socially embarrassing and worrisome, and many men prefer to have them removed for cosmetic reasons, as well as greater comfort during sex and masturbation. Pearly penile papules can be removed on an outpatient basis through a simple procedure. The area is usually numbed with lidocaine, and the doctor applies a CO2 laser to disintegrate the papules. Although some scabbing and soreness may result from the procedure, this should not cause a problem, and they should heal within a couple of weeks.

Attempting to remove the bumps at home, either by cutting, ligation or popping, is highly discouraged, as this will not solve the problem and is mainly likely to result in injury, pain and infection.

Keeping the penis healthy

It is important to stress that men who develop new growths or sores on their penis or who experience pain, bleeding, or oozing should seek medical attention from a qualified professional. But for overall penis health, treating the skin with nutrients such as vitamin A (for smooth, supple skin); vitamin C (for immune function and healthy circulatory tissue); vitamin D (for overall skin health); alpha lipoic acid (for stimulating blood flow); and natural moisturizers such as shea butter can help to prevent minor injuries and infection and sooth penis pain and irritation. Supporting healthy function of the skin and nerve cells through the use of a specialized penis health formula (health professionals recommend Man 1 Man Oil) which contains a combination of these all-natural ingredients is suggested for men who want smooth, supple and responsive penis skin.

For additional information on most common

penis health issues

, tips on improving penis sensitivity, and what to do to maintain a healthy penis, visit:

penishealth101.com

. John Dugan is a professional writer who specializes in men’s health issues and is an ongoing contributing writer to numerous online web sites.

Article Source:

What all Men Need to Know about Pearly Penile Papules

Posted by Admin in Cosmetic And Reconstructive Surgery

Surgeons reattach boy’s three severed limbs

Tuesday, March 29, 2005A team of Australian surgeons yesterday reattached both hands and one foot to 10-year-old Perth boy, Terry Vo, after a brick wall which collapsed during a game of basketball fell on him, severing the limbs. The wall gave way while Terry performed a slam-dunk, during a game at a friend’s birthday party.

The boy was today awake and smiling, still in some pain but in good spirits and expected to make a full recovery, according to plastic surgeon, Mr Robert Love.

“What we have is parts that are very much alive so the reattached limbs are certainly pink, well perfused and are indeed moving,” Mr Love told reporters today.

“The fact that he is moving his fingers, and of course when he wakes up he will move both fingers and toes, is not a surprise,” Mr Love had said yesterday.

“The question is more the sensory return that he will get in the hand itself and the fine movements he will have in the fingers and the toes, and that will come with time, hopefully. We will assess that over the next 18 months to two years.

“I’m sure that he’ll enjoy a game of basketball in the future.”

The weight and force of the collapse, and the sharp brick edges, resulted in the three limbs being cut through about 7cm above the wrists and ankle.

Terry’s father Tan said of his only child, the injuries were terrible, “I was scared to look at him, a horrible thing.”

The hands and foot were placed in an ice-filled Esky and rushed to hospital with the boy, where three teams of medical experts were assembled, and he was given a blood transfusion after experiencing massive blood loss. Eight hours of complex micro-surgery on Saturday night were followed by a further two hours of skin grafts yesterday.

“What he will lose because it was such a large zone of traumatised skin and muscle and so on, he will lose some of the skin so he’ll certainly require lots of further surgery regardless of whether the skin survives,” said Mr Love said today.

The boy was kept unconscious under anaesthetic between the two procedures. In an interview yesterday, Mr Love explained why:

“He could have actually been woken up the next day. Because we were intending to take him back to theatre for a second look, to look at the traumatised skin flaps, to close more of his wounds and to do split skin grafting, it was felt the best thing to do would be to keep him stable and to keep him anaesthetised.”

Professor Wayne Morrison, director of the respected Bernard O’Brien Institute of Microsurgery and head of plastic and hand surgery at Melbourne’s St Vincent’s Hospital, said he believed the operation to be a world first.

Retrieved from “https://en.wikinews.org/w/index.php?title=Surgeons_reattach_boy%27s_three_severed_limbs&oldid=440114”
Posted by Admin

Canada’s Etobicoke Centre (Ward 3) city council candidates speak

This exclusive interview features first-hand journalism by a Wikinews reporter. See the collaboration page for more details.

Monday, October 30, 2006

On November 13, Torontoians will be heading to the polls to vote for their ward’s councillor and for mayor. Among Toronto’s ridings is Etobicoke Centre (Ward 3). One candidate responded to Wikinews’ requests for an interview. This ward’s candidates include Doug Holyday (incumbent), Peter Kudryk, Lillian Lança, and Ross Vaughan.

For more information on the election, read Toronto municipal election, 2006.

Retrieved from “https://en.wikinews.org/w/index.php?title=Canada%27s_Etobicoke_Centre_(Ward_3)_city_council_candidates_speak&oldid=2584581”
Posted by Admin

Sculpting Your Nose With Rhinoplasty}

Submitted by: David Chandler

Rhinoplasty is surgery on the nose. The procedure can be done for medical reasons, breathing problems, birth defects, or injury, or it may simply be done for aesthetic cosmetic purposes.

Rhinoplasty Procedures

There are two types of rhinoplasty procedures. The first type is known as an open procedure. With an open procedure, a minor incision is made between the nostrils, enabling them to lift that portion of nasal skin off the nose for better visibility of the cartilage and bone. This procedure gives the surgeon more control over the patient’s nose because they are able to see the bone and cartilage. An open rhniplasty will leave a scar; however, for a skilled surgeon the scar will not be visible from a standard viewing distance.

The other type is closed rhinoplasty, where incisions are made on the inside of the nose, thus concealing any evidence of surgery. However, in some cases your surgeon may not be able to get to the target areas in order to perform the surgery sufficiently.

There are advantages and disadvantages of either type of rhinoplasty surgery. Therefore, it is necessary to consult with your surgeon to determine which type would be best suited for your situation.

Finding the Right Surgeon

[youtube]http://www.youtube.com/watch?v=EW3Z6aMvDT4[/youtube]

Although nose shaping has been around for many decades, it does require incredible ability by the surgeon. Your doctor should have the proper certification and experience necessary to perform the given procedure.

Interview at least two or three plastic surgeons, he, or she should be board certified, and have a minimum of 5 years experience. During the consultation, ask how many rhinoplasties they have done in the last year, consider how well the doctor listen to your ideas, ask to see examples of their work and what can they do for you.

Likewise, if you are going to have general anesthesia, be sure the American Board of Anesthesiology has certified your anesthesiologist. In addition, make sure that you can be rapidly admitted to a nearby quality hospital in the event of unforeseen complications.

Rhinoplasty Fees

Surgeons fee: $3,500

Anesthesiologist: $700

Facility fee: $800

Average Total Cost: $5,000

Rhinoplasty is usually not covered by insurance unless the procedure is performed for medical reasons, e.g. birth defect, or accident. Therefore, you should consult the surgeon’s office about payment plans or seek out a finance company that specializes in medical loans. If your insurer says that it is covered, be sure to get pre-authorization from them before the operation.

Complications

If you are careful and selective about whom you choose for your surgeon, anesthesiologist, and of course operating facility, there is only a less than 5% chance of any complications.

However, a possible risk you will need to consider and accept before having cosmetic nose surgery is revision rhinoplasty. First, because nose surgery is a difficult procedure and secondly, following the surgery your nose can change in ways which cannot be predicted beforehand. It is recommended to wait at least one year if a revision rhinoplasty is needed.

Recovery

A splint is applied to the top of the nose to keep it in place while healing and gauze packing is inserted for a couple of days to protect the septum from moving and minimizing bleeding. The splint is usually removed within a week.

Anti-inflammatory medication and a painkiller are prescribed for swelling and discomfort, as well as an antibiotic to prevent infection. You should also apply ice, elevate the head, and avoid blowing your nose and wearing eyeglasses.

Finally, few people ever regret getting a nose job. It has the potential to create a new appearance and lend new confidence. Just be careful

About the Author: For more information about rhinoplasty, visit

rhinoplastyinfoguide.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=39308&ca=Medicines+and+Remedies}

Posted by Admin in Medicine

Texas college student found dead on campus

Wednesday, April 18, 2012

Authorities have confirmed that a student at Texas State Technical College-Marshall was found dead in his on-campus room around 9am CDT yesterday.

Emergency personnel were notified and CPR was performed on the student, without success. Authorities state that foul play is not suspected. Campus police and local law enforcement are conducting a full investigation. A campus representative told media sources that the cause of death has not yet been determined.

Just last year, a student at the college died from gunshot wounds he’d sustained while attending an event at a community center located on the outskirts of the city. Shortly following that incident, the school initiated a short-term controlled access plan, restricting much of the traffic into and out of the campus.

The school is one of several campuses in the TSTC system. According to a press release on the campus’s web site, the student’s name had not been yet released. The school is reportedly offering counseling sessions to all students throughout the week. A phone call to a campus representative made shortly before 4:00pm CDT was not immediately returned.

Retrieved from “https://en.wikinews.org/w/index.php?title=Texas_college_student_found_dead_on_campus&oldid=2714868”
Posted by Admin

First face transplant performed on French woman

Thursday, December 1, 2005

Surgeons in France have performed a face transplant operation on a French woman who had lost her nose, lips and chin after being savaged by a dog. According to Iain Hutchison, an oral-facial surgeon at Barts and the London Hospital, the transplant is the first one to use skin from another person.

Doctors say the woman’s new face will be a “hybrid” between her donor’s face and her own face before the attack. In the five hour long operation, the donor’s tissues, muscles, arteries and veins were attached to the patient’s lower face. It is more favourable to use skin from another person’s face instead of skin from another part of the patient’s body, as the texture and colour of the skin are more likely to match.

A statement released by the hospital in Amiens said that the 38-year-old patient, who wishes to remain anonymous, has not been able to eat or speak properly since the attack in May this year. The woman was reportedly in “excellent general health” and her graft looked normal.

Ethical concerns, psychological impact, concerns relating to immunosuppression and consequences of technical failure have prevented teams from performing face transplant operations in the past, even though it has been technically possible to carry out such procedures for years.

Mr Hutchison warned of several problems with face transplants, such as blood vessels in the donated tissue clotting and immunosuppressants failing or increasing the patient’s risk of cancer. He also pointed out ethical issues with the fact that the procedure requires a “beating heart donor”. The transplant is carried out while the donor is brain dead, but still alive by use of a ventilator.

According to Stephen Wigmore, chair of British Transplantation Society’s ethics committee, it is unknown to what extent facial expressions will function in the long term. He said that it is not certain whether a patient could be left worse off in the case of a face transplant failing.

Mr Michael Earley, a member of the Royal College of Surgeon’s facial transplantation working party, commented that if successful, the transplant would be “a major breakthrough in facial reconstruction” and “a major step forward for the facially disfigured.”

Retrieved from “https://en.wikinews.org/w/index.php?title=First_face_transplant_performed_on_French_woman&oldid=717676”
Posted by Admin

U.S. Senate passes landmark health care reform bill

Thursday, December 24, 2009

The United States Senate has approved a hard-fought measure to overhaul the health care system. The vote will be followed by the difficult process of reconciling the Senate-passed bill with one approved by the House of Representatives, in order to get a final measure to President Barack Obama.

HAVE YOUR SAY
How do you feel about the bill’s passage? Do you think it will be effective or fail?
Add or view comments

“The yeas are 60, the nays are 39. H.R. 3590 as amended, the Patient Protection and Affordable Care Act is passed,” Vice President Joe Biden announced. Senator Jim Bunning of Kentucky did not show up for the vote leading to the 39 nays. Mike Reynard, a spokesman for Bunning, said in an e-mail that “The senator had family commitments.”

The vice president presided over the Senate at the time of the vote in his role as President of the United States Senate.

As expected, Republicans voted against the bill while all Democrats and two Independents, Joe Lieberman of Connecticut and Bernie Sanders of Vermont, voted for it.

At an estimated $87 billion, the measure would expand health insurance coverage to about 30 million more Americans currently without it, and create new private insurance marketplaces, or exchanges, to expand choice.

And, like the slightly more expensive measure passed by the House of Representatives, the Affordable Health Care for America Act, it would end a practice by private insurance companies of denying coverage to individuals with existing health problems.

Both the Senate and House measures would require nearly all Americans to purchase some form of insurance, while lower-income Americans would receive help from federal government subsidies.

This is a victory because we have affirmed that the ability to live a healthy life in our great country is a right and not merely a privilege for the select few.

In remarks before the vote, Senate Majority Leader Harry Reid, Democrat from Nevada, said opponents had done everything they could to prevent the vote from taking place.

Speaking to reporters, Reid and others hailed the vote as a victory and a major step toward providing millions more Americans with access to health care. “This is a victory because we have affirmed that the ability to live a healthy life in our great country is a right and not merely a privilege for the select few,” Reid said.

Reid and others including Robert Byrd, the 92-year-old Democrat from West Virginia, paid tribute to Senator Edward Kennedy, who died this past August after spending decades of his career in the Senate pursuing health care reform.

When casting his vote Byrd said, “Mr. President, this is for my friend Ted Kennedy. Aye.”

Victoria Reggie Kennedy, the widow of Senator Kennedy, watched the proceedings from the Senate visitor’s gallery, as did Representative John Dingell, Democrat from Michigan, who has been a long time advocate of health care reform and who sponsored and introduced the House version of the health care reform bill.

In the final hours of debate on the Senate bill, Republicans asserted it would be ineffective and add sharply to the U.S. budget deficit.

Mr. President, this is for my friend Ted Kennedy. Aye.

Senator Jeff Sessions, Republican from Alabama said of the bill, “This legislation may have a great vision, it may have a great idea about trying to make the system work better. But it does not. These are huge costs [and] it’s not financially sound.”

Senate Minority Leader Mitch McConnell vowed to defeat the bill when the Senate reconvenes in January saying, “This fight is not over. This fight is long from over. My colleagues and I will work to stop this bill from becoming law.”

Senator Olympia Snowe, a moderate Republican from Maine who helped approved the Senate Finance Committee’s version of health care reform, the America’s Healthy Future Act, earlier in the year and who remarked she may not vote on the final bill, said, “I was extremely disappointed,” noting that when the Democrats reached their needed 60 votes to overcome a filibuster, “there was zero opportunity to amend the bill or modify it, and Democrats had no incentive to reach across the aisle.”

Ahead are difficult negotiations with the House of Representatives to craft a final bill President Obama would sign into law. These talks, which will formally get under way early in the new year, will take place amid anger among many liberal House Democrats the Senate bill failed to contain a government-run public health insurance option.

This fight is not over. This fight is long from over. My colleagues and I will work to stop this bill from becoming law.

Members of the House Progressive Caucus have vowed to fight to keep this public option in any final legislation that emerges, along with other provisions they say are needed to protect lower and middle-income Americans and hold insurance companies accountable.

In a statement, the Democratic chairmen of three key House committees said while there are clear differences between House and Senate bills, both will bring fundamental health care coverage to millions who are currently uninsured.

Obama administration officials have been quoted as saying they anticipate negotiations on a final bill would not be complete until after the President’s State of the Union Address in January, and could slip even later into the new year.

If passed, this will be the most important piece of social policy since the Social Security Act in the 1930s, and the most important reform of our health care system since Medicare passed in the 1960s.

President Obama issued a statement to the press in the State Dining Room in the White House saying that the vote is “legislation that brings us toward the end of a nearly century-long struggle to reform America’s health care system.”

He also pointed out the bill’s strengths, noting, “The reform bill that passed the Senate this morning, like the House bill, includes the toughest measures ever taken to hold the insurance industry accountable. Insurance companies will no longer be able to deny you coverage on the basis of a preexisting condition. They will no longer be able to drop your coverage when you get sick. No longer will you have to pay unlimited amounts out of your own pocket for the treatments you need. And you’ll be able to appeal unfair decisions by insurance companies to an independent party.”

He also noted how historic the bill is, saying, “If passed, this will be the most important piece of social policy since the Social Security Act in the 1930s, and the most important reform of our health care system since Medicare passed in the 1960s.”

Obama noted the potential social impact, saying, “It’s the impact reform will have on Americans who no longer have to go without a checkup or prescriptions that they need because they can’t afford them; on families who no longer have to worry that a single illness will send them into financial ruin; and on businesses that will no longer face exorbitant insurance rates that hamper their competitiveness.”

Obama afterwards made phone calls to various Senators and other people, including Victoria Kennedy and David Turner of Little Rock, Arkansas. Mr. Turner had his health insurance rescinded in January of last year, after his insurance company went back into his record and alleged that he failed to disclose his full medical record at the time he applied for coverage. Turner was First Lady Michelle Obama’s guest during her husband’s speech to a joint session of Congress on health care reform back in September.

Retrieved from “https://en.wikinews.org/w/index.php?title=U.S._Senate_passes_landmark_health_care_reform_bill&oldid=4384266”
Posted by Admin

N10 006 Real Exam}

N10-006 Real Exam

by

Adila Masih

Question: 1

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?

A. Add a router and enable OSPF.

B. Add a layer 3 switch and create a VLAN.

C. Add a bridge between two switches.

D. Add a firewall and implement proper ACL.

Answer: B

Explanation:

We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs. A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even ifthey are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.

To allow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a Layer 3 switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header inthe packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 2

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?

A. Layer 3 switch

B. Proxy server

C. Layer 2 switch

D. Smart hub

Answer: A

Explanation:

The question states that the traffic being transported is a mixture of multicast and unicast signals. There are three basic types of network transmissions: broadcasts, which are packets transmitted to every node on the network; unicasts, which are packets transmitted to just one node; and multicasts, which are packetstransmitted to a group of nodes. Multicast is a layer 3 feature of IPv4 & IPv6. Therefore, we would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 3

Which of the following network devices use ACLs to prevent unauthorized access into company systems?

A. IDS

B. Firewall

C. Content filter

D. Load balancer

Answer: B

Explanation:

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists) to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall, which examines each message and blocks or allows the message depending on rules specified in the ACL. The rules in the ACL specify which combinations of source IP address, destination address in IP port numbers are allowed.

Question: 4

Which of the following is used to define how much bandwidth can be used by various protocols on the network?

A. Traffic shaping

B. High availability

C. Load balancing

D. Fault tolerance

Answer: A

Explanation:

If a network connection becomes saturated to the point where there is a significant level of contention, network latency can rise substantially. Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment, business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic has been sent.

Question: 5

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).

A. OSPF

B. VTP trunking

C. Virtual PBX

D. RADIUS

E. 802.1x

Answer: DE

Explanation: D: A RADIUS (Remote Authentication Dial-in User Service) server is a server with a database of user accountsand passwords used as a central authentication database for users requiring network access. RADIUS servers are commonly used by ISPs to authenticate their customers Internet connections. Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server.

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network. 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device, such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server isthe RADIUS server.

Question: 6

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

A. Multifactor authentication

B. ISAKMP

C. TACACS+

D. Network access control

Answer: C

Explanation:

TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a centralized authentication solution used to provide access to network resources. TACACS+ separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required.

Question: 7

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases

B. Helper addresses

C. Scopes

D. Reservations

Answer: D

Explanation:

A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address of the network interface card that should receive the IP address.For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get

192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.

Question: 8

Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IPaddresses, to be able to access the Internet and internal company servers? (Select THREE).

A. Default gateway

B. Subnet mask

C. Reservations

D. TFTP server

E. Lease expiration time of 1 day

F. DNS servers

G. Bootp

Answer: ABF

Explanation:

The question states that the client computers need to access the Internet as well as internal company servers. To access the Internet, the client computers need to be configured with an IP address with a subnet mask (answer B) and the address of the router that connects the company network to the Internet. This is known as the default gateway (answer A).To be able to resolve web page URLs to web server IP addresses, the client computers need to be configured with the address of a DNS server (answer F).

Question: 9

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?

A. Configure NAT on the firewall

B. Implement a split horizon DNS

C. Place the server in the DMZ

D. Adjust the proper internal ACL

Answer: B

Explanation:

Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply different DNS query results depending on the source of the request. This can be done by hardware-based separation but is most commonly done in software. In this question, we want external users to be able to access the website by using a public IP address. To do this, we would have an external facing DNS server hosting a DNS zone for the website domain. For the internal users, we would have an internal facing DNS server hosting a DNS zone for the website domain. The externalDNS zone will resolve the website URL to an external public IP address. The internal DNS server will resolve the website URL to an internal private IP address.

Question: 10

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly?

A. Load balancer

B. FTP server

C. Firewall DMZ

D. Mail server

Answer: D

Explanation:

A mail exchanger record (MX record) is a DNS record used by email servers to determine the name of the email server responsible for accepting email for the recipients domain. For example a user sends an email to recipient@somedomain.com. The sending users email server will query the somedomain.com DNS zone for an MX record for the domain. The MX record will specify the hostname ofthe email server responsible for accepting email for the somedomain.com domain, for example, mailserver.somedomain.com. The sending email server will then perform a second DNS query to resolve mailserver.somedomain.com to an IP address. The sending mail server will then forward the email to the destination mail server.

Question: 11

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

A. BGP

B. OSPF

C. IS-IS

D. MPLS

Answer: D

Explanation:

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself.MPLS works by prefixing packets with an MPLS header, containing one or more labels. An MPLS router that performs routing based only on the label is called a label switch router (LSR) or transit router. This is a type of router located in the middle of a MPLS network. It is responsible for switching the labelsused to route packets. When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table. The old label is then removed from the header and replaced with the new label before the packet is routed forward. A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and remove it offthe outgoing packet.When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding rules.

Question: 12

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch

B. Access point

C. Analog modem

D. DOCSIS modem

Answer: C

Explanation:

Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By todays standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps. An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computer to an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer. An analog modem uses an RJ-11 connector to connect to a phone line (POTS) in the same way a phone does.

Question: 13

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which ofthe following protocols was MOST likely used on this cable?

A. RS-232

B. 802.3

C. ATM

D. Token ring

Answer: A

Explanation:

A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines the functions ofthe 9 pins in a DB-9 connector. The RS-232 standard was around long before computers. Its rare to see a new computer nowadays with a serial port but they were commonly used for connecting external analog modems, keyboards and mice to computers.

Question: 14

Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?

A. 66 block

B. BNC

C. F-connector

D. RJ-11

Answer: B

Explanation: A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses 75 ohm coaxial cable and BNC connectors.

Question: 15

An F-connector is used on which of the following types of cabling?

A. CAT3

B. Single mode fiber

C. CAT5

D. RG6

Answer: D

Explanation:

An F connector is a coaxial RF connector commonly used for terrestrial television, cable television and universally for satellite television and cable modems, usually with RG-6/U cable or, in older installations, withRG-59/U cable.

Question: 16

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).

A. 1000Base-LR

B. 1000Base-SR

C. 1000Base-T

D. 10GBase-LR

E. 10GBase-SR

F. 10GBase-T

Answer: BE

Explanation:

1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiber with a distance capability between 220 meters and 550 meters. 10Gbase-SR is a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short wavelength signaling.

Question: 17

CORRECT TEXTSIMULATIONYou have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. Step 1: Select the tool that was used to create the cable test results. Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the ‘Submit Cable Test Analysis’ button.

Answer: Here is the solution below

Explanation: A Cable Certifier provides Pass or Fail information in accordance with industry standards but can also show detailed information when a Fail occurs. This includes shorts, the wire pairs involved and the distance to the short. When a short is identified, at the full length of the cable it means the cable has not been crimped correctly.

Question: 18

A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

A. Star

B. Bus

C. Ring

D. Mesh

Answer: C

Explanation:

Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a star topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before ittransmits to the next node. Therefore, although the cables are physically connected in a star, the data pathtakes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a token. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data before releasing the token. Only a computer in possession of the token can transmit data onto the network.

Question: 19

A network topology that utilizes a central device with point-to-point connections to all other devices is which ofthe following?

A. Star

B. Ring

C. Mesh

D. Bus

Answer: A

Explanation:

A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network. The switch forms the central component of the star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table todiscover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to.

Question: 20

Which of the following network topologies has a central, single point of failure?

A. Ring

B. Star

C. Hybrid

D. Mesh

Answer: B

Explanation: A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network. The switch forms the central component of the star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table todiscover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to. The switch that forms the central component of a star network is a single point of failure. If the switch fails, no computers will be able to communicate with each other.

Question: 21

Which of the following refers to a network that spans several buildings that are within walking distance of each other?

A. CAN

B. WAN

C. PAN

D. MAN

Answer: A

Explanation:

CAN stands for Campus Area Network or Corporate Area Network. Universities or colleges often implementCANs to link the buildings in a network. The range of CAN is 1KM to 5KM. If multiple buildings have the same domain and they are connected with a network, then it will be considered as a CAN.

Question: 22

Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?

A. PAN

B. LAN

C. WLAN

D. MAN

Answer: A

Explanation:

PAN stands for Personal Area Network. It is a network of devices in the area of a person typically within a range of 10 meters and commonly using a wireless technology such as Bluetooth or IR (Infra-Red).

Question: 23

Which of the following describes an

Test Information:Total Questions: 323Test Number: N10-006Vendor Name: COMPTIACert Name: COMPTIA NETWORK+Test Name: Http://www.certifyschool.com/product/n10-006/Official Site: http://www.examkill.co.ukFor More Details http://www.examkill.co.uk/N10-006.htmlGet20% Immediate Discount on Full Training MaterialDiscount Coupon Code: 3219R86596

Article Source:

eArticlesOnline.com}

Posted by Admin in Nutrition