Photos collated on the 4chan website show numerous images of suspicious individuals wearing large backpacks present at the scene of the Boston Marathon bombings. Three of the men appear to be Arab or Middle Eastern in appearance, whereas another two of the individuals are white. The images show the men looking away from the marathon runners, talking on cellphones and running from the scene immediately after the blast. Remains of one of the backpacks are also photographed yards from where one of the bombs exploded. The FBI states that at least one of the pressure cooker devices used in the bombing was housed in a backpack. Some of these men may have merely been victims, but the image of the two men standing together wearing the same clothes and carrying heavy backpacks and wearing credentials suggests they may have been involved in a drill or in the actual attack.
CNN is now reporting that authorities have identified one of the suspects involved in the attack by means of “video from a department store near the site of the second explosion” and “video from a Boston television station.” The Boston Globe also reports that, “authorities have an image of a suspect carrying and possibly dropping a black bag at the second blast site on Boylston Street.”
President Obama's statement on the Boston marathon explosions – full text
The president spoke from the White House briefing room just after 6pm ET, about three hours after the bombs went off
'On days like this there are no Republicans or Democrats – we are Americans, united in concern for our fellow citizens.' Photograph: Win Mcnamee/Getty Images
Good afternoon, everybody. Earlier today, I was briefed by my homeland security team on the events in Boston. We're continuing to monitor and respond to the situation as it unfolds. And I've directed the full resources of the federal government to help state and local authorities protect our people, increase security around the United States as necessary, and investigate what happened.
The American people will say a prayer for Boston tonight. And Michelle and I send our deepest thoughts and prayers to the families of the victims in the wake of this senseless loss.
We don't yet have all the answers. But we do know that multiple people have been wounded, some gravely, in explosions at the Boston Marathon.
I've spoken to FBI Director Mueller and Secretary of Homeland Security Napolitano, and they're mobilizing the appropriate resources to investigate and to respond.
I've updated leaders of Congress in both parties, and we reaffirmed that on days like this there are no Republicans or Democrats – we are Americans, united in concern for our fellow citizens.
I've also spoken with Governor Patrick and Mayor Menino, and made it clear that they have every single federal resource necessary to care for the victims and counsel the families. And above all, I made clear to them that all Americans stand with the people of Boston.
Boston police, firefighters, and first responders as well as the National Guard responded heroically, and continue to do so as we speak. It's a reminder that so many Americans serve and sacrifice on our behalf every single day, without regard to their own safety, in dangerous and difficult circumstances. And we salute all those who assisted in responding so quickly and professionally to this tragedy. We still do not know who did this or why. And people shouldn't jump to conclusions before we have all the facts. But make no mistake -- we will get to the bottom of this. And we will find out who did this; we'll find out why they did this. Any responsible individuals, any responsible groups will feel the full weight of justice.
Today is a holiday in Massachusetts – Patriots' Day. It's a day that celebrates the free and fiercely independent spirit that this great American city of Boston has reflected from the earliest days of our nation. And it's a day that draws the world to Boston's streets in a spirit of friendly competition. Boston is a tough and resilient town. So are its people. I'm supremely confident that Bostonians will pull together, take care of each other, and move forward as one proud city. And as they do, the American people will be with them every single step of the way.
You should anticipate that as we get more information, our teams will provide you briefings. We're still in the investigation stage at this point. But I just want to reiterate we will find out who did this and we will hold them accountable.
Smiling sun during the passage of a cloud from which the sun appeared as the face of a smiling man as one of the finest images throughout history. She won this Image بجائره Image for 2011
A popular pasta on /x/ about the perils of sleep deprivation.
The Story
Russian researchers in the late 1940s kept five people awake for fifteen days using an experimental gas based stimulant. They were kept in a sealed environment to carefully monitor their oxygen intake so the gas didn't kill them, since it was toxic in high concentrations. This was before closed circuit cameras so they had only microphones and 5 inch thick glass porthole sized windows into the chamber to monitor them. The chamber was stocked with books, cots to sleep on but no bedding, running water and toilet, and enough dried food to last all five for over a month. The test subjects were political prisoners deemed enemies of the state during World War II. Everything was fine for the first five days; the subjects hardly complained having been promised (falsely) that
they would be freed if they submitted to the test and did not sleep for 30 days. Their conversations and activities were monitored and it was noted that they continued to talk about increasingly traumatic incidents in their past, and the general tone of their conversations took on a darker aspect after the 4 day mark. After five days they started to complain about the circumstances and events that lead them to where they were and started to demonstrate severe paranoia. They stopped talking to each other and began alternately whispering to the microphones and one way mirrored portholes. Oddly they all seemed to think they could win the trust of the experimenters by turning over their comrades, the other subjects in captivity with them. At first the researchers suspected this was an effect of the gas itself... After nine days the first of them started screaming. He ran the length of the chamber repeatedly yelling at the top of his lungs for 3 hours straight, he continued attempting to scream but was only able to produce occasional squeaks. The researchers postulated that he had physically torn his vocal cords. The most surprising thing about this behavior is how the other captives reacted to it... or rather didn't react to it. They continued whispering to the microphones until the second of the captives started to scream. The 2 non-screaming captives took the books apart, smeared page after page with their own feces and pasted them calmly over the glass portholes. The screaming promptly stopped. So did the whispering to the microphones. After 3 more days passed. The researchers checked the microphones hourly to make sure they were working, since they thought it impossible that no sound could be coming with 5 people inside. The oxygen consumption in the chamber indicated that all 5 must still be alive. In fact it was the amount of oxygen 5 people would consume at a very heavy level of strenuous exercise. On the morning of the 14th day the researchers did something they said they would not do to get a reaction from the captives, they used the intercom inside the chamber, hoping to provoke any response from the captives they were afraid were either dead or vegetables. They announced: "We are opening the chamber to test the microphones step away from the door and lie flat on the floor or you will be shot. Compliance will earn one of you your immediate freedom." To their surprise they heard a single phrase in a calm voice response: "We no longer want to be freed." Debate broke out among the researchers and the military forces funding the research. Unable to provoke any more response using the intercom it was finally decided to open the chamber at midnight on the fifteenth day. The chamber was flushed of the stimulant gas and filled with fresh air and immediately voices from the microphones began to object. 3 different voices began begging, as if pleading for the life of loved ones to turn the gas back on. The chamber was opened and soldiers sent in to retrieve the test subjects. They began to scream louder than ever, and so did the soldiers when they saw what was inside. Four of the five subjects were still alive, although no one could rightly call the state that any of them in 'life.' The food rations past day 5 had not been so much as touched. There were chunks of meat from the dead test subject's thighs and chest stuffed into the drain in the center of the chamber, blocking the drain and allowing 4 inches of water to accumulate on the floor. Precisely how much of the water on the floor was actually blood was never determined. All four 'surviving' test subjects also had large portions of muscle and skin torn away from their bodies. The destruction of flesh and exposed bone on their finger tips indicated that the wounds were inflicted by hand, not with teeth as the researchers initially thought. Closer examination of the position and angles of the wounds indicated that most if not all of them were self-inflicted. The abdominal organs below the ribcage of all four test subjects had been removed. While the heart, lungs and diaphragm remained in place, the skin and most of the muscles attached to the ribs had been ripped off, exposing the lungs through the ribcage. All the blood vessels and organs remained intact, they had just been taken out and laid on the floor, fanning out around the eviscerated but still living bodies of the subjects. The digestive tract of all four could be seen to be working, digesting food. It quickly became apparent that what they were digesting was their own flesh that they had ripped off and eaten over the course of days. Most of the soldiers were Russian special operatives at the facility, but still many refused to return to the chamber to remove the test subjects. They continued to scream to be left in the chamber and alternately begged and demanded that the gas be turned back on, lest they fall asleep... To everyone's surprise the test subjects put up a fierce fight in the process of being removed from the chamber. One of the Russian soldiers died from having his throat ripped out, another was gravely injured by having his testicles ripped off and an artery in his leg severed by one of the subject's teeth. Another 5 of the soldiers lost their lives if you count ones that committed suicide in the weeks following the incident. In the struggle one of the four living subjects had his spleen ruptured and he bled out almost immediately. The medical researchers attempted to sedate him but this proved impossible. He was injected with more than ten times the human dose of a morphine derivative and still fought like a cornered animal, breaking the ribs and arm of one doctor. When heart was seen to beat for a full two minutes after he had bled out to the point there was more air in his vascular system than blood. Even after it stopped he continued to scream and flail for another 3 minutes, struggling to attack anyone in reach and just repeating the word "MORE" over and over, weaker and weaker, until he finally fell silent. The surviving three test subjects were heavily restrained and moved to a medical facility, the two with intact vocal cords continuously begging for the gas demanding to be kept awake... The most injured of the three was taken to the only surgical operating room that the facility had. In the process of preparing the subject to have his organs placed back within his body it was found that he was effectively immune to the sedative they had given him to prepare him for the surgery. He fought furiously against his restraints when the anesthetic gas was brought out to put him under. He managed to tear most of the way through a 4 inch wide leather strap on one wrist, even through the weight of a 200 pound soldier holding that wrist as well. It took only a little more anesthetic than normal to put him under, and the instant his eyelids fluttered and closed, his heart stopped. In the autopsy of the test subject that died on the operating table it was found that his blood had triple the normal level of oxygen. His muscles that were still attached to his skeleton were badly torn and he had broken 9 bones in his struggle to not be subdued. Most of them were from the force his own muscles had exerted on them. The second survivor had been the first of the group of five to start screaming. His vocal cords destroyed he was unable to beg or object to surgery, and he only reacted by shaking his head violently in disapproval when the anesthetic gas was brought near him. He shook his head yes when someone suggested, reluctantly, they try the surgery without anesthetic, and did not react for the entire 6 hour procedure of replacing his abdominal organs and attempting to cover them with what remained of his skin. The surgeon presiding stated repeatedly that it should be medically possible for the patient to still be alive. One terrified nurse assisting the surgery stated that she had seen the patients mouth curl into a smile several times, whenever his eyes met hers. When the surgery ended the subject looked at the surgeon and began to wheeze loudly, attempting to talk while struggling. Assuming this must be something of drastic importance the surgeon had a pen and pad fetched so the patient could write his message. It was simple. "Keep cutting." The other two test subjects were given the same surgery, both without anesthetic as well. Although they had to be injected with a paralytic for the duration of the operation. The surgeon found it impossible to perform the operation while the patients laughed continuously. Once paralyzed the subjects could only follow the attending researchers with their eyes. The paralytic cleared their system in an abnormally short period of time and they were soon trying to escape their bonds. The moment they could speak they were again asking for the stimulant gas. The researchers tried asking why they had injured themselves, why they had ripped out their own guts and why they wanted to be given the gas again. Only one response was given: "I must remain awake." All three subject's restraints were reinforced and they were placed back into the chamber awaiting determination as to what should be done with them. The researchers, facing the wrath of their military 'benefactors' for having failed the stated goals of their project considered euthanizing the surviving subjects. The commanding officer, an ex-KGB instead saw potential, and wanted to see what would happen if they were put back on the gas. The researchers strongly objected, but were overruled. In preparation for being sealed in the chamber again the subjects were connected to an EEG monitor and had their restraints padded for long term confinement. To everyone's surprise all three stopped struggling the moment it was let slip that they were going back on the gas. It was obvious that at this point all three were putting up a great struggle to stay awake. One of subjects that could speak was humming loudly and continuously; the mute subject was straining his legs against the leather bonds with all his might, first left, then right, then left again for something to focus on. The remaining subject was holding his head off his pillow and blinking rapidly. Having been the first to be wired for EEG most of the researchers were monitoring his brain waves in surprise. They were normal most of the time but sometimes flat lined inexplicably. It looked as if he were repeatedly suffering brain death, before returning to normal. As they focused on paper scrolling out of the brainwave monitor only one nurse saw his eyes slip shut at the same moment his head hit the pillow. His brainwaves immediately changed to that of deep sleep, then flatlined for the last time as his heart simultaneously stopped. The only remaining subject that could speak started screaming to be sealed in now. His brainwaves showed the same flatlines as one who had just died from falling asleep. The commander gave the order to seal the chamber with both subjects inside, as well as 3 researchers. One of the named three immediately drew his gun and shot the commander point blank between the eyes, then turned the gun on the mute subject and blew his brains out as well. He pointed his gun at the remaining subject, still restrained to a bed as the remaining members of the medical and research team fled the room. "I won't be locked in here with these things! Not with you!" he screamed at the man strapped to the table. "WHAT ARE YOU?" he demanded. "I must know!" The subject smiled. "Have you forgotten so easily?" The subject asked. "We are you. We are the madness that lurks within you all, begging to be free at every moment in your deepest animal mind. We are what you hide from in your beds every night. We are what you sedate into silence and paralysis when you go to the nocturnal haven where we cannot tread." The researcher paused. Then aimed at the subject's heart and fired. The EEG flatlined as the subject weakly choked out, "So... nearly... free..."
1. What application layer protocol is commonly used to support for file transfers between a client and a server? HTML HTTP FTP Telnet 2. What are two forms of application layer software? (Choose two.) applications dialogs requests services syntax 3. A network administrator is designing a network for a new branch office of twenty-five users. What are the advantages of using a client-server model? (Choose two.) centralized administration does not require specialized software security is easier to enforce lower cost implementation provides a single point of failure 4. What is the purpose of resource records in DNS? temporarily holds resolved entries used by the server to resolve names sent by the client to during a query passes authentication information between the server and client 5. What is the automated service that matches resource names with the required IP address? HTTP SSH FQDN DNS Telnet SMTP 6. What three protocols operate at the Application layer of the OSI model? (Choose three.) ARP DNS PPP SMTP POP ICMP 7. What are three properties of peer-to-peer applications? (Choose three.) acts as both a client and server within the same communication. requires centralized account administration. hybrid mode includes a centralized directory of files. can be used in client-server networks. requires a direct physical connection between devices. centralized authentication is required. 8. Which application layer protocols correctly match a corresponding function? (Choose two.) DNS dynamically allocates IP addresses to hosts HTTP transfers data from a web server to a client POP delivers email from the client to the server email server SMTP supports file sharing Telnet provides a virtual connection for remote access 9. Which email components are used to forward mail between servers? (Choose two.) MDA IMAP MTA POP SMTP MUA 10. As compared to SSH, what is the primary disadvantage of telnet? not widely available does not support encryption consumes more network bandwidth does not support authentication 11. Which statements are correct concerning the role of the MTA in handling email? (Choose three.) routes email to the MDA on other servers receives email from the client’s MUA receives email via the POP3 protocol passes email to the MDA for final delivery uses SMTP to route email between servers delivers email to clients via the POP3 protocol 12. Which two protocols are used to control the transfer of web resources from a web server to a client browser? (Choose two.) ASP FTP HTML HTTP HTTPS IP 13. A small home network has been installed to interconnect three computers together for gaming and file sharing. What two properties represent this network type? (Choose two.) User accounts are centralized. Security is difficult to enforce. Specialized operating system software is required. File permissions are controlled by a single computer. A computer that responds to a file sharing request is functioning as a server. 14. Which layer of the OSI model supplies services that allow user to interface with the network? physical session network presentation application transport 15.
ccna 1 chapter 3 answers 100%
Refer to the exhibit. What is the destination port for the communication that is represented on line 5? 80 1261 15533 3912 65520 16. What are two characteristics of peer-to-peer networks? (Choose two.) scalable one way data flow decentralized resources centralized user accounts resource sharing without a dedicated server 17. What application layer protocol describes the services that are used for file sharing in Microsoft networks? DHCP DNS SMB SMTP Telnet 18. What are two characteristics of clients in data networks? (Choose two.) use daemons initiate data exchanges are repositories of data may upload data to servers listen for requests from servers 19. What is the role of the OSI application layer? provides segmentation of data provides encryption and conversion of data provides the interface between the applications on either end of the network provides control of all the data flowing between the source and destination devices 20. How does the application layer on a server usually process multiple client request for services? ceases all connections to the service denies multiple connections to a single daemon suspends the current connection to allow the new connection uses support from lower layer functions to distinguish between connections to the service
CCNA 1 Chapter 2 V4.0 Answers 100% updated 2011 1. Which statements correctly identify the role of intermediary devices in the network? (Choose three.) determine pathways for data initiate data communications retime and retransmit data signals originate the flow of data manage data flows final termination point for data flow 2. Select the statements that are correct concerning network protocols. (Choose three.) define the structure of layer specific PDU’s dictate how to accomplish layer functions outline the functions necessary for communications between layers limit the need for hardware compatibility require layer dependent encapsulations eliminate standardization among vendors 3. What are two functions of encapsulation? (Choose two.) tracks delay between end devices enables consistent network paths for communication allows modification of the original data before transmission identifies pieces of data as part of the same communication ensures that data pieces can be directed to the correct receiving end device 4. What is a primary function of the trailer information added by the data link layer encapsulation? supports error detection ensures ordered arrival of data provides delivery to correct destination identifies the devices on the local network assists intermediary devices with processing and path selection 5. Which two layers of the OSI model have the same functions as the TCP/IP model Network Access Layer? (Choose two.) Network Transport Physical Data Link Session 6. What is a PDU? corruption of a frame during transmission data reassembled at the destination retransmitted packets due to lost communication a layer specific encapsulation 7. Which characteristic correctly refers to end devices in a network? manage data flows originate data flow retime and retransmit data signals determine pathways for data 8.
ccna 1 chapter 2
Refer to the exhibit. “Cell A” at IP address 10.0.0.34 has established an IP session with “IP Phone 1″ at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function of wireless device “Cell A?” the destination device an end device an intermediate device a media device 9.
ccna 1 chapter 2
Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.) Network A — WAN Network B — WAN Network C — LAN Network B — MAN Network C — WAN Network A – LAN 10. Which three statements best describe a Local Area Network (LAN)? (Choose three.) A LAN is usually in a singlegeographical area. The network is administered by a single organization. The connection between segments in the LAN is usually through a leased connection. The security and access control of the network are controlled by a service provider. A LAN provides network services and access to applications for users within a common organization. Each end of the network is generally connected to a Telecommunication Service Provider (TSP). 11.
ccna 1 chapter 2
Refer to the exhibit. Which networking term describes the data interleaving process represented in the graphic? piping PDU streaming multiplexing encapsulation 12. What is the primary purpose of Layer 4 port assignment? to identify devices on the local media to identify the hops between source and destination to identify to the intermediary devices the best path through the network to identify the source and destination end devices that are communicating to identify the processes or services that are communicating within the end devices 13. What device is considered an intermediary device? file server IP phone laptop printer switch 14.
ccna 1 chapter 2
Refer to the exhibit. Which term correctly identifies the device type that is included in the area B? source end transfer intermediary 15.
ccna 1 chapter 2
Refer to the exhibit. What type of network is shown? WAN MAN LAN WLAN 16. Which layer encapsulates the segment into packets? physical data link network transport 17. What can be identified by examining the network layer header? the destination device on the local media the destination host address the bits that will be transferred over the media the source application or process creating the data 18.
ccna 1 chapter 2
Refer to the exhibit. Which set of devices contains only end devices? A, C, D B, E, G, H C, D, G, H, I, J D, E, F, H, I, J E, F, H, I, J 19. During the encapsulation process, what occurs at the data link layer? No address is added. The logical address is added. The physical address is added. The process port number is added. 20. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation reliability, flow control, and error detection network media control the division of segments into packets 21. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer? physical, network, application, data link, presentation, session, transport application, physical, session, transport, network, data link, presentation application, presentation, physical, session, data link, transport, network application, presentation, session, transport, network, data link, physical presentation, data link, session, transport, network, physical, application
1. Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.) They are non-network connections. They are used to connect the router to the rest of the production network. They are synchronous serial ports. They are used for initial router configuration. They are asynchronous serial ports. They are accessed using their assigned IP address. 2. The console port can be used for which of the following? (Choose three.) debugging. password recovery. routing data between networks. troubleshooting. connecting one router to another. 3. Which of the following describes the function of a WAN? connects peripherals in a single location. connects multiple networks in a single building. provides connectivity on a LAN. provides connectivity over a large geographic area. 4. An internetwork must include which of the following? (Choose three.) switching. static addressing. IETF standardization. dynamic or static routing. consistent end-to-end addressing. 5. ABC Company just purchased three new routers to start their company network. Which items are needed to establish a terminal session between a PC and the router for the initial configuration? (Choose three.) straight-through cable. terminal emulation software. rollover cable. RJ-45 to DB-9 connector. V.35 cable. 6.Terminal emulation software, such as HyperTerminal, can be used to configure a router. Which of the following HyperTerminal options shown in the graphic are correctly set to allow configuration of a Cisco router? (Choose three.) bits per second. data bits. parity. stop bits. flow control. 7. Which of the following devices are used in the construction of a WAN? (Choose three.) hubs. routers. communication servers. transceivers. modems. multi-port repeaters. 8. Which of the following are functions of RAM? (Choose three.) contains startup configuration file. stores routing table. holds fast switching cache. retains contents when power is removed. stores running configuration file. 9. Why is a console connection to a router or switch preferred when troubleshooting? (Choose two.) can be accessed remotely. does not depend on network services. displays startup and error messages by default. does not require special components. ccna answersccna finalccna exploration 10. Which basic components do a router and a standard desktop PC have in common? (Choose three.) CPU. hard drive. input/output interfaces. keyboard. monitor. system bus. 11. During the initial configuration of a 2600 series Cisco router, which cable is required for connecting a PC to the console port? twisted. crossover. rollover. straight. 12. A router is composed of many internal components. Which of the following components stores a copy of the router’s configuration file? metal-oxide memory. read only memory. flash memory. non-volatile random access memory. 13. What contains the instructions that a router uses to control the flow of traffic through its interfaces? packet configuration. configuration files. flash memory. internal components. 14. Several Ethernet hosts on a LAN need the gateway services of a Cisco 2500 series router. Which of the following would be needed to physically connect a router to all of the hosts on the LAN? (Choose two.) a crossover cable between the transceiver on a router and a switch. a crossover cables between a switch and hosts on a LAN. a straight-through cable between the auxiliary port on a router and a switch. a rollover cable between the console port on a router and a switch. straight-through cables between a switch and hosts on a LAN. a straight-through cable between the transceiver on a router and a switch. 15. Which router component holds the configuration file when power is lost? volatile random access memory. read only memory. non-volatile random access memory. flash memory. 16. Which of the following layers of the OSI model are incorporated in WAN standards? (Choose two.) physical layer. application layer. transport layer. data link layer. session layer. 17. Which of the following are true regarding router interfaces? (Choose three.) provide temporary memory for the router configuration files. connect the router to the network for packet entry and exit. can be on the motherboard or a separate module. hold the IOS image. connect the router to LANs and WANs. 18. Which of the following tasks can be accomplished through a management connection on a router? (Choose three.) troubleshooting problems. monitoring the system. capturing LAN data packets. configuring the router. routing data packets. 19. What do routers use to select the best path for outgoing data packets? ARP tables. bridging tables. routing tables. switching tables. 20. Which of the following are functions of NVRAM? (Choose two.) stores the routing table. retains contents when power is removed. stores the startup configuration file. contains the running configuration file. stores the ARP table. 21. Select the statements that correctly describe flash memory in a 2600 series router? (Choose two.) holds the startup configuration by default. can be upgraded with single in-line memory modules. stores Cisco IOS software images. stores routing table information by default. maintains the only copy of an IOS image after the router is booted.