Howard, Next time you have a job opening, let me know so I can apply - the interview alone would be worth the expense of flying out to see you!
Hee hee - I always have respect for anyone who manages to fit a deadly embrace and Van Eck radiation in the same posting. And as a sidenote, I always found that programming in LISP was much more efficient after the indigestion of alcoholic beverages.... Frank Jimenez, CCIE #5738 [EMAIL PROTECTED] -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Howard C. Berkowitz Sent: Thursday, January 02, 2003 5:41 PM To: [EMAIL PROTECTED] Subject: Re: CCIE Vs. BS or MS degree [7:59481] At 9:16 PM +0000 1/2/03, l0stbyte wrote: >Ladrach, Daniel E. wrote: > >> I have an MIS degree from The Ohio State University Max Fisher >> College of Business. I see some posts out there saying that a CS >> degree is no more than a vocational degree. Obviously this person >> has not been to college! College >> is not there to prepare you to step in and do a Sr. Engineer job, it is >> there to give you a base understanding of IT. I however, have a business >> degree with an IT focus. So, when you have been through the classes I have >> you form a level of respect for anyone who has been down the same >> road. >> >> When the CCIE gets as challenging as the following let me know. >> >> Calculus >> Physics >> Finance >> Accounting >> Economics >> CS-programming >> CS-operating systems >> CS-networking >> >> >> >> Daniel Ladrach >> CCNA, CCNP >> WorldCom >All of the listed should be thought in high school. Unless it's some >kind of quantum programming (is it still a concept?), CCIE should be by >far more challenging. My two cents.. >:) I hope the smiley means you aren't serious. Let me pose some CS questions, which I swear are off the top of my head. In all fairness, I'm not sure if some of these will be advanced undergraduate or graduate level, but we have been talking about CCIE vs. PhD... I have tried to select questions that bear on real networks. CS-programming. Compare and contrast NP-hard, NP-complete, and NP-incomplete algorithms Review the optimal search and update algorithms for trees and tries. Identify four major searching and sorting algorithms and describe their advantages and disadvantages Extract a square root using Newton-Raphson iteration, or select a different method and explain why it is superior. Describe a strategy for change control in a programming team. The software library will include documentation, source, linkable elements, and executables. What record locking mechanisms are needed to ensure integrity of a hierarchical linked list? What are the types of commitment protocols and the basic ACID properties of transactions? How can a buffer overflow be exploited to gain control? Build a Monte Carlo simulator for network traffic following Markov, exponential, fractal, and Erlang B and C pdf's for both interarrival and service time. Characterize the major conceptual differences among the FORTH, FORTRAN IV, LISP, PROLOG, Pascal, C, Ada, C++ and SQL languages Give examples of data structures using isomorphism, homomorphism, and monomorphism. What is a context-free grammar? Differentiate between abstract syntax, operational semantics, and transfer syntax. CS-operating systems Describe the difference between a kernel and a microkernel and their relationships to operating systems. Discuss strategies for managing buffer allocation, fragmentation, and garbage collection. Compare and contrast polling versus interrupts in a real-time OS. Describe at least four major types of multiprocessing. You may include multistream single processors. How can you do a hitless software upgrade on a real-time OS? Differentiate between processes, tasks, and threads in POSIX. Describe the requirements for transparent failover among multiple processors, including the context switching issues. What are the differences between reentrancy and serial reusability? Compare backup strategies and management, including serial media, various types of RAID, and write-once optical storage. What is a deadly embrace? What is the difference between mandatory and discretionary access control? Is compartmentation orthogonal to sensitivity? What is the Bell-Lapadula theorem and where is it used? What is a covert channel and how do you protect against it? What is the difference between spawning and forking? How are named vs. unnamed pipes used, and what is their relationship to semaphores and sockets? CS-networking Compare and contrast error management using ARQ, parallel transmission, and FEC What issues do CALEA and E911 have on multiservice router design? Discuss the evolution in Internet topology that has led to greater BGP instability? Focus on topological changes. Differentiate between codecs and transcoders, and identify the impairments they introduce. What limitation does the Dijkstra algorithm impose on subsecond convergence time? What are potential fixes to the problem? Define unicity distance and its applicability to two coding schemes. What is QAM? Trellis encoding? What is the role of a phase-locked loop in received signal timing? To what sorts of signals is it relevant? Why are there pulse density restrictions in DS-x and E-x signals? In what routing protocol did Floyd identify the problem of weak synchronization, and how is it corrected? What is the effect of the Byzantine Generals (also called Byzantine Corruption) problem on high availability, and what are workarounds? What is van Eck radiation and how does it affect security? Why are external routes given lesser preference in link state protocols, and what is their effect on the Dijkstra algorithm? What is a LFN (elephant) and what do you do about it? Why does OSPF use the lollipop algorithm for sequence numbers? What is Huffman compression and how does it improve JPEG transmission? Why is regenerative feedback a bad method of controlling systems? Describe the functions of the OSI session layer in recovery. What is the limitation of source-destination hash load balancing in traffic engineering? What probability function best describes Internet traffic? Why does TFTP use a fixed record size? What are the differences between XDR and ASN.1? What mathematical principle underlies frame control sequences? Describe the silly window syndrome. Why has the destination preference attribute of BGP not been deployed? Differentiate among system, layer, and station management. Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=60179&t=59481 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

