{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":734752231,"defaultBranch":"main","name":"CCNA","ownerLogin":"aw-junaid","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2023-12-22T14:15:22.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/99183233?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1703254523.335757","currentOid":""},"activityList":{"items":[{"before":"1c16bad4bb694c08f861bc72050efc7368e0de34","after":"e9f18fe892cb57fe922dfbce72fe018d459b9ac6","ref":"refs/heads/main","pushedAt":"2023-12-24T21:48:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Any data which is not backed up you risk losing. On corporate networks you should have a detailed backup and recovery plan. You may well use SFTP or some other secure method. In this lab we will back up your router configuration using the File Transfer Protocol.md","shortMessageHtmlLink":"Create Any data which is not backed up you risk losing. On corporate …"}},{"before":"96d671637e998c6b4b75432b471b193df48c5407","after":"1c16bad4bb694c08f861bc72050efc7368e0de34","ref":"refs/heads/main","pushedAt":"2023-12-24T21:48:08.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Virtual Network Computing is one of a number of remote-access tools. Others include pcAnywhere from Symantec and RDP from Microsoft. These offer a way to remotely access a PC or server and control the desktop with your keyboard and mouse as if you were physically present there. They all offer free versions for home use, free trials, and personalenterprise options.md","shortMessageHtmlLink":"Create Virtual Network Computing is one of a number of remote-access …"}},{"before":"1a8244dbfa9e8df614dc62bdbe8f64aa6c535d6f","after":"96d671637e998c6b4b75432b471b193df48c5407","ref":"refs/heads/main","pushedAt":"2023-12-24T21:47:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Remote Desktop Connection (RDC) is a Microsoft Windows tool installed on most operating systems and servers. It can be installed by default or enabled in the settings. WARNING—Getting this to work with different OSs, from virtual machines to LAN devices, and through firewalls can be tricky! If you can, please use two home computers to save any headaches.md","shortMessageHtmlLink":"Create Remote Desktop Connection (RDC) is a Microsoft Windows tool in…"}},{"before":"c719ab948c0e2d6754a4ec958340bc04eb591e03","after":"1a8244dbfa9e8df614dc62bdbe8f64aa6c535d6f","ref":"refs/heads/main","pushedAt":"2023-12-24T21:47:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create SNMP is a very powerful protocol used to monitor and manage network devices. Ideally, you would run it on a dedicated server and use it to monitor traffic, outages, and impending port or device failures. In this lab we will use a Cisco router with a PC and use SNMP to change a router setting.md","shortMessageHtmlLink":"Create SNMP is a very powerful protocol used to monitor and manage ne…"}},{"before":"f04397ab1b5fa2c94e1e9a9ed808849cb0ad76dc","after":"c719ab948c0e2d6754a4ec958340bc04eb591e03","ref":"refs/heads/main","pushedAt":"2023-12-24T21:47:00.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Syslog is a standard for message logging. It can be used for system management, security, and auditing as well as for general troubleshooting. Syslog can be installed on printers, routers, and many other device types. It offers a number of severity levels from debug up to emergency level.md","shortMessageHtmlLink":"Create Syslog is a standard for message logging. It can be used for s…"}},{"before":"2938ab9ebb10fd8caf1b3a9fd4d4585613eddb5e","after":"f04397ab1b5fa2c94e1e9a9ed808849cb0ad76dc","ref":"refs/heads/main","pushedAt":"2023-12-24T21:46:06.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create There are a few options for configuring backups. We will cover incremental backups in this lab. The method of course will differ between platforms and operating systems. Incremental backups only back up changes made since the last backup. Please check your study guide for details on full, differential, and incremental backups.md","shortMessageHtmlLink":"Create There are a few options for configuring backups. We will cover…"}},{"before":"0c99468847b0de63e889bfc96c7eb59ad631a125","after":"2938ab9ebb10fd8caf1b3a9fd4d4585613eddb5e","ref":"refs/heads/main","pushedAt":"2023-12-24T21:45:44.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Business continuity is a hot topic for any corporate network. One aspect of this is dual power supplies, whereby your device can continue to operate when one of the supplies fails. Many are hot-swappable, meaning you can remove and insert them while the device is live.md","shortMessageHtmlLink":"Create Business continuity is a hot topic for any corporate network. …"}},{"before":"b0fdaa6223621e5ecf588ae655b7d35e7bae7f28","after":"0c99468847b0de63e889bfc96c7eb59ad631a125","ref":"refs/heads/main","pushedAt":"2023-12-24T21:45:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Collecting interfaces or ports into one big virtual interface is known as link aggregation, link teaming, NIC teaming, or port channeling. The interfaces in the bundle should usually share the same capacity, so you can’t bundle a 100 Mbps interface with a 1 Gbps interface to make it 1.1 Gbps, for example.md","shortMessageHtmlLink":"Create Collecting interfaces or ports into one big virtual interface …"}},{"before":"417e696398506f501643e4b8b6e1d65e0085a606","after":"b0fdaa6223621e5ecf588ae655b7d35e7bae7f28","ref":"refs/heads/main","pushedAt":"2023-12-24T21:44:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create NIC teaming is also known as interface bonding, balancing, or aggregation. It allows you (depending on your platform and software) to group 1–32 network cards into one or more virtual network adapters. This provides load balancing and fault tolerance (if there is more than one physical NIC used).md","shortMessageHtmlLink":"Create NIC teaming is also known as interface bonding, balancing, or …"}},{"before":"d95ffe5bb9b6bb3563413b3bfc9e35b5a1476a42","after":"417e696398506f501643e4b8b6e1d65e0085a606","ref":"refs/heads/main","pushedAt":"2023-12-24T21:44:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create You have covered HA in your study guide, I’m sure. In this example, we’ll aim to keep the PC on the LAN able to reach the internet if one of the routers or router interfaces goes down. Of course you would have more switches and IP addresses on the internet side, but I wanted to keep this lab simple.md","shortMessageHtmlLink":"Create You have covered HA in your study guide, I’m sure. In this exa…"}},{"before":"754a3a565661b5fbe8f1689a6a9961593842dcbc","after":"d95ffe5bb9b6bb3563413b3bfc9e35b5a1476a42","ref":"refs/heads/main","pushedAt":"2023-12-24T21:44:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create PPP over Ethernet encapsulates PPP frames over an Ethernet connection. It is most frequently used with DSL, where individual users connect.md","shortMessageHtmlLink":"Create PPP over Ethernet encapsulates PPP frames over an Ethernet con…"}},{"before":"d72a11d4ad8d398362fe0f89657ecd1a0cad572f","after":"754a3a565661b5fbe8f1689a6a9961593842dcbc","ref":"refs/heads/main","pushedAt":"2023-12-24T21:43:46.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create PPP is a hugely popular WAN protocol. It works on both synchronous and asynchronous links, offers security (authentication and encryption), and can be configured on routers for many vendors due to the fact it is an open standard.md","shortMessageHtmlLink":"Create PPP is a hugely popular WAN protocol. It works on both synchro…"}},{"before":"20dfadce860b614c26790a1b7f0efa9dd38e5559","after":"d72a11d4ad8d398362fe0f89657ecd1a0cad572f","ref":"refs/heads/main","pushedAt":"2023-12-24T21:43:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Frame Relay was once a hugely popular WAN protocol. It offers an inexpensive and easy-to-configure solution for small to medium-sized businesses. It has lost popularity due to DSL and other technologies.md","shortMessageHtmlLink":"Create Frame Relay was once a hugely popular WAN protocol. It offers …"}},{"before":"0fe9100a8959969550e67331aecec7566d5cf852","after":"20dfadce860b614c26790a1b7f0efa9dd38e5559","ref":"refs/heads/main","pushedAt":"2023-12-24T21:43:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Ethernet traffic is encapsulated inside frames. The maximum size (MTU) of this frame is 1500 bytes. Any packet larger than this is referred to as a jumbo frame. An interface receiving a jumbo frame can either fragment it or drop it unless it’s configured to receive them.md","shortMessageHtmlLink":"Create Ethernet traffic is encapsulated inside frames. The maximum si…"}},{"before":"670a24ea19adc59d6455312a9e9b480c06ecda61","after":"0fe9100a8959969550e67331aecec7566d5cf852","ref":"refs/heads/main","pushedAt":"2023-12-24T21:42:41.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Unified threat management is an approach to security whereby a single hardware or software device provides multiple functions, such as firewall, VPN, wireless, intrusion detectionprevention, antivirus, web proxy, and more.md","shortMessageHtmlLink":"Create Unified threat management is an approach to security whereby a…"}},{"before":"cfe5c78273dbd59421226b7b41f4e7e47b9f3c0e","after":"670a24ea19adc59d6455312a9e9b480c06ecda61","ref":"refs/heads/main","pushedAt":"2023-12-24T21:42:14.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create As you can imagine, getting your hands on next-generation firewalls (NGFWs) can be a challenge. At the moment, Meraki (which was recently acquired by Cisco) lets you log in to a web-based installation of its software.md","shortMessageHtmlLink":"Create As you can imagine, getting your hands on next-generation fire…"}},{"before":"fdb1c6b25e3b843d5015ffb5739a251845e205be","after":"cfe5c78273dbd59421226b7b41f4e7e47b9f3c0e","ref":"refs/heads/main","pushedAt":"2023-12-24T21:41:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Many vendors supply basic (layer 2) switches but also higher-specification switches which can perform routing (layer 3) or content switching (layers 4–7). The main difference between the way switches route traffic and the way routers do it is that switches use application-specific integrated circuits (ASICs) and routers use softwareCPU.md","shortMessageHtmlLink":"Create Many vendors supply basic (layer 2) switches but also higher-s…"}},{"before":"9a4c4ece2eaf09a02b4b9ed2afc631993c1985a2","after":"fdb1c6b25e3b843d5015ffb5739a251845e205be","ref":"refs/heads/main","pushedAt":"2023-12-24T21:41:15.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Wireless LAN controllers (depending on the model) can control several access points, allocate DHCP information, and provide internet access for your network. We will configure a simple WLC in this lab.md","shortMessageHtmlLink":"Create Wireless LAN controllers (depending on the model) can control …"}},{"before":"529eed05c242ea6a4dcd2d1c71c109ed2ef52c69","after":"9a4c4ece2eaf09a02b4b9ed2afc631993c1985a2","ref":"refs/heads/main","pushedAt":"2023-12-24T21:40:55.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Installing VoIP devices is a somewhat specialized task; however, you may be required to do it even in small companies.md","shortMessageHtmlLink":"Create Installing VoIP devices is a somewhat specialized task; howeve…"}},{"before":"b786b30a86fd0e9018edb0e34d2f833f6c88e987","after":"529eed05c242ea6a4dcd2d1c71c109ed2ef52c69","ref":"refs/heads/main","pushedAt":"2023-12-24T21:40:30.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create WAPs are ubiquitous and you are more than likely to be required to install them as part of your job as a network engineer. This lab will cover the basics; we will look into wireless security later in this guide.md","shortMessageHtmlLink":"Create WAPs are ubiquitous and you are more than likely to be require…"}},{"before":"d8f65c12731cec937f335158b7da9640631a8e85","after":"b786b30a86fd0e9018edb0e34d2f833f6c88e987","ref":"refs/heads/main","pushedAt":"2023-12-24T21:40:08.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create You have already learned in your study guide no doubt that hubs have no facility to store a table of which devices are connected to which interface, meaning every packet or frame is repeated out of each port. In this lab we will see this happening.md","shortMessageHtmlLink":"Create You have already learned in your study guide no doubt that hub…"}},{"before":"82c31556b60c5aa997d893a916c3d0ce9035d0c6","after":"d8f65c12731cec937f335158b7da9640631a8e85","ref":"refs/heads/main","pushedAt":"2023-12-24T21:39:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create A bridge is a network switch for all intents and purposes; it does, however, feature fewer ports (usually two). In this lab we will see the bridge learn and store the device MAC address, preventing the packet from crossing to the next hub. The hubs have no capacity to store a MAC address, so they will continue to forward packets out of all ports.md","shortMessageHtmlLink":"Create A bridge is a network switch for all intents and purposes; it …"}},{"before":"3487d71a360a69ac90eb6a781e99486c3356a95b","after":"82c31556b60c5aa997d893a916c3d0ce9035d0c6","ref":"refs/heads/main","pushedAt":"2023-12-24T21:39:27.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Installing, configuring, and troubleshooting layer 2 switches will be part of your day-to-day routine as a network engineer. In this lab we cover basic VLAN and trunk configuration. Our two VLANs will use the trunk to connect. To keep things simple, each switch has only one host per VLAN.md","shortMessageHtmlLink":"Create Installing, configuring, and troubleshooting layer 2 switches …"}},{"before":"1e2383cd3b85ae5a9527996749e37f0555d0e541","after":"3487d71a360a69ac90eb6a781e99486c3356a95b","ref":"refs/heads/main","pushedAt":"2023-12-24T21:39:05.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Routers can take several hours to install and configure. This lab will cover just a few of the basic steps you need to follow to connect your router in a branch office (R1) and your HQ (R0).md","shortMessageHtmlLink":"Create Routers can take several hours to install and configure. This …"}},{"before":"787a237872c7ca1bde9a2ed57baf2fa4d34035f3","after":"1e2383cd3b85ae5a9527996749e37f0555d0e541","ref":"refs/heads/main","pushedAt":"2023-12-24T21:38:40.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create The CompTIA Net+ exam asks you to installconfigure a firewall but also adds the fact that the exam is vendor-neutral. They do list several tools you should spend time learning to use at the end of the syllabus, and one of these is a firewall.md","shortMessageHtmlLink":"Create The CompTIA Net+ exam asks you to installconfigure a firewall …"}},{"before":"42b203826a289aabf5d8d52abf8a21694c25d547","after":"787a237872c7ca1bde9a2ed57baf2fa4d34035f3","ref":"refs/heads/main","pushedAt":"2023-12-24T21:37:57.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create The Internet of Things is the network of sensors, devices, servers, and software which enables things to exchange data. You can use it to turn on the aircon at home as you are leaving work, or your car can signal your garage that a part is wearing out and needs replacing.md","shortMessageHtmlLink":"Create The Internet of Things is the network of sensors, devices, ser…"}},{"before":"24026a5a9fa390b986f028d96eabf1923f776ba2","after":"42b203826a289aabf5d8d52abf8a21694c25d547","ref":"refs/heads/main","pushedAt":"2023-12-24T21:37:38.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create You will often be given a network or network segment to design and manage. Whoever is responsible for IP addressing in your company may allocate you an address range you can use. It will be down to you to create an efficient addressing scheme which avoids discontinuous addressing (bad for routing protocols) and allows you to send a summary address to upstream routers to reduce traffic.md","shortMessageHtmlLink":"Create You will often be given a network or network segment to design…"}},{"before":"d120f100e326fec3c5ea4cc571975c8a31140dec","after":"24026a5a9fa390b986f028d96eabf1923f776ba2","ref":"refs/heads/main","pushedAt":"2023-12-24T21:37:17.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Here is another subnetting question. If you learn subnetting, you will easily get good marks in the exam. You will also be asked this type of question in technical interviews, so you must learn it.md","shortMessageHtmlLink":"Create Here is another subnetting question. If you learn subnetting, …"}},{"before":"be8ba9b044ee5ef62d2d7f7acc31d31ca46b252b","after":"d120f100e326fec3c5ea4cc571975c8a31140dec","ref":"refs/heads/main","pushedAt":"2023-12-24T21:36:53.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create In the exam, you may be asked to answer a subnetting question. They could ask you to determine which subnet a host address is in, what the subnetbroadcast address is in a particular network, or how many subnethosts you would have with a particular subnet mask.md","shortMessageHtmlLink":"Create In the exam, you may be asked to answer a subnetting question.…"}},{"before":"27c2237d37dd43628264a3801796ef649a880057","after":"be8ba9b044ee5ef62d2d7f7acc31d31ca46b252b","ref":"refs/heads/main","pushedAt":"2023-12-24T21:36:17.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"aw-junaid","name":"Abdul Wahab Junaid","path":"/aw-junaid","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/99183233?s=80&v=4"},"commit":{"message":"Create Named ACLs can be either standard or extended. You would use named ACLs if you had to apply several of them to your router and needed an easy way to remember what they do.md","shortMessageHtmlLink":"Create Named ACLs can be either standard or extended. You would use n…"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyMy0xMi0yNFQyMTo0ODozNC4wMDAwMDBazwAAAAPRY76h","startCursor":"Y3Vyc29yOnYyOpK7MjAyMy0xMi0yNFQyMTo0ODozNC4wMDAwMDBazwAAAAPRY76h","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0xMi0yNFQyMTozNjoxNy4wMDAwMDBazwAAAAPRYyUz"}},"title":"Activity · aw-junaid/CCNA"}