Jump to content
Sadikhov IT Certification forums

joaott

Members
  • Content count

    3
  • Joined

  • Last visited

Community Reputation

0 Neutral

About joaott

  • Rank
    Newbie
  • Birthday 03/21/1974

Contact Methods

  • MSN
    joaott@hotmail.com
  • Website URL
    http://
  • ICQ
    2836640

Profile Information

  • Location
    Faro-Portugal
  1. Portuguese People

    Mais um tuga...já n venho aqui ha mto tempo mas este é e será sempre um lugar de referencia... Estou quase a terminar o CCNP Security
  2. CCNP Security

    My exam is scheduled to July,21 .Lets see what i can do.Im a little worried about the labs....and many things changed.Not many AAA questions.I think they cover more DMVPN and GETVPN questions. I will return here to give you some tips ...
  3. CCNP Security

    Im going till 08 august to try 642-637 - Secure v1.0 Securing Networks with Cisco Routers and Switches (SECURE v1.0), to recertify my CCNP certification . I think its the best method.... My problem now is to get student guides and study material for it,over the internet.Not many people did this exam, so its more hard to get it. If someones have that please message me.I will be very glad. Does someone think that studying by the old 642-504 SNRS , its enough? Thanks in advance Joao
  4. Portuguese People

    Eu nao sou do Algarve mas moro por cá. Já tenho o CCNP há uma data de anos e vou renovando a certificação com exames do CCSP.Quero terminar o CCSP antes de Novembro deste ano.Travbalho nesta área há cerca de 12 anos. Trabalho nao somente com Cisco mas multimarca,afinal quem mora no Algarve tá tramado se só pensar em Cisco,pois nao há mercado para isto. Estou a pensar pirar-me deste país por uns aninhos e trabalhar lá fora,embora nao conheça ninguem.A crise avassala o país e entre ir para Lisboa e ir para fora,prefiro ir para fora.Tou farto da instabilidade....cada vez se ganha menos e cada vez os patroes dizem que somos mais "caros" . QQ dia pedem CCIE,MCSE,IBM,HP como certificações base e estao dispostos a pagar uns 1000€. Querem pessoal certificado e que não dê barraca nos clientes? paguem em condiçoes.... Neste momento estou empregado mas pretendo mudar dadas as dificuldades relativamente a pagamentos.... Quem souber de oportunidades de emprego nesta área...agradeço Quem quiser estudar em conjunto,será um prazer.Falar em portugues é smp mais facil
  5. Hi guys, I have a a problem related to CCSP,and came here just to check if anyone know´s the solution for it. We have customer where we installed a PIX 515E ,and that PIX have multiple ipsec lan2lan connections. That VPN´s are working perfectly between several end points where we installed Vigor Drateks 2700,all of them have a public fixed ip address. What happens is that one site is being renewed ,and they cut de ADSL cable.It will take about 1 month to connect it. Dratek 2700 has a USB port where we can plug a PEN 3G ,wich we already put it to work,and we do have internet access. What happens is that in PIX configuration the configuration of "set peer" parameter in crypto map only accept an IP address,and the IP address of the 3g PEN changes, cause its not a fixed IP. I heard that we can solve that problem using crypto dynamic maps,but in Cisco site i cant find the solution cause they only give examples about configurations using only 1 peer with crypto dynamic maps.I want to mix several lan2lan ,fixed ip addresses, with dynamic ip addresses. does anyone know what can i do? here is the configuration i have ,in bold i highlighted the related peer with dynamic ip address treta# sh runn : Saved : PIX Version 7.2(2) ! hostname treta domain-name treta enable password RuP8wx08gTdyZX13 encrypted names ! interface Ethernet0 speed 100 duplex full nameif Internet security-level 0 pppoe client vpdn group PtPrime ip address pppoe setroute ! interface Ethernet1 nameif inside security-level 100 ip address 10.10.20.2 255.255.255.0 ! interface Ethernet2 nameif Micros security-level 50 ip address 192.168.50.253 255.255.255.0 ! passwd 14HIUu4gUffyEjHv encrypted banner exec ===INSIRA A PASSWORD DE MODO PREVILIGIADO=== banner motd ================================================================ banner motd == Acesso Reservado == banner motd Acesso nao autorizado punido por lei: 109/91; 67/98 banner motd --------------------------------------------------------------- banner motd banner motd banner motd banner motd banner motd banner motd --------------------------------------------------------------- banner motd O acesso a este sistema esta a ser monitorizado. banner motd ================================================================ ftp mode passive clock timezone GMT/BST 0 clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00 dns server-group DefaultDNS domain-name treta same-security-traffic permit inter-interface same-security-traffic permit intra-interface access-list Internet_60_cryptomap extended permit ip 192.168.0.0 255.255.0.0 172.21.1.0 255.255.255.0 access-list Roessner_splitTunnelAcl standard permit 192.168.20.0 255.255.255.0 access-list Internet_40_cryptomap extended permit ip 192.168.0.0 255.255.0.0 172.21.2.0 255.255.255.0 access-list Vilavita_mail_splitTunnelAcl standard permit 192.168.20.0 255.255.255.0 access-list noNAT extended permit ip any 192.168.50.0 255.255.255.0 access-list noNAT extended permit ip host 192.168.50.200 192.168.50.224 255.255.255.224 access-list noNAT extended permit ip host 192.168.20.240 192.168.50.224 255.255.255.224 access-list noNAT extended permit ip host 192.168.20.12 192.168.50.224 255.255.255.224 access-list noNAT extended permit ip 192.168.0.0 255.255.0.0 172.21.1.0 255.255.255.0 access-list noNAT extended permit ip 192.168.0.0 255.255.0.0 172.21.2.0 255.255.255.0 access-list noNAT extended permit ip 192.168.0.0 255.255.0.0 172.21.3.0 255.255.255.0 access-list inside_nat0_outbound extended permit ip any 192.168.50.224 255.255.255.224 access-list Finan_VVH_splitTunnelAcl standard permit host 192.168.50.200 access-list Finan_VVH_splitTunnelAcl standard permit 192.168.20.0 255.255.255.0 access-list AlemanhaOpera_splitTunnelAcl standard permit host 192.168.20.240 access-list AlemanhaOpera_splitTunnelAcl standard permit host 192.168.20.230 access-list AlemanhaOpera_splitTunnelAcl standard permit 192.18.1.0 255.255.255.0 access-list VVPortugal_splitTunnelAcl standard permit 192.168.20.0 255.255.255.0 access-list VVPortugal_splitTunnelAcl standard permit 192.168.80.0 255.255.255.0 access-list VVPortugal_splitTunnelAcl standard permit 192.18.1.0 255.255.255.0 access-list VVPortugal_splitTunnelAcl standard permit host 192.168.50.200 access-list Vpn_Compta standard permit 192.168.0.0 255.255.0.0 access-list Vpn_Compta standard permit 192.18.1.0 255.255.255.0 access-list Vpn_Compta remark Restaurante ArtNautica access-list Vpn_Compta standard permit 172.21.1.0 255.255.255.0 access-list Vpn_Compta remark Salsicharia access-list Vpn_Compta standard permit 172.21.2.0 255.255.255.0 access-list Vpn_Compta remark Vila Alisol access-list Vpn_Compta standard permit 172.21.3.0 255.255.255.0 access-list Internet_access_in extended permit tcp any interface Micros eq smtp access-list Internet_access_in extended permit tcp any interface Internet eq https access-list Internet_access_in extended permit icmp any interface Internet echo access-list VVP_Manut_splitTunnelAcl standard permit 192.168.0.0 255.255.0.0 access-list VVP_Manut_splitTunnelAcl standard permit 192.18.1.0 255.255.255.0 access-list cap extended permit ip host 192.168.20.240 any access-list cap extended permit ip any host 192.168.20.240 access-list VILA_ALISOL_CRYPTOMAP_ID80 remark ======VPN LAN2LAN P/VILA ALISOL(IP FIXO 62.28.55.237)-PONTA DRAYTEK 2800===== access-list VILA_ALISOL_CRYPTOMAP_ID80 extended permit ip 192.168.0.0 255.255.0.0 172.21.3.0 255.255.255.0 access-list Fastcall remark Rede Antiga treta access-list Fastcall standard permit 192.18.1.0 255.255.255.0 access-list Fastcall remark Rede Geral Vila Vita access-list Fastcall standard permit 192.168.0.0 255.255.0.0 access-list Fastcall remark Restaurante ArtNautica access-list Fastcall standard permit 172.21.1.0 255.255.255.0 access-list Fastcall remark Salsicharia access-list Fastcall standard permit 172.21.2.0 255.255.255.0 access-list Fastcall remark Vila Alisol access-list Fastcall standard permit 172.21.3.0 255.255.255.0 pager lines 24 logging enable logging monitor notifications logging trap notifications logging asdm debugging mtu Internet 1500 mtu inside 1500 mtu Micros 1500 ip local pool VPM_Assec 192.168.50.230-192.168.50.240 mask 255.255.255.0 icmp unreachable rate-limit 1 burst-size 1 icmp permit any Internet icmp permit any inside icmp permit any Micros asdm image flash:/asdm asdm history enable arp timeout 14400 nat-control global (Internet) 1 interface nat (inside) 1 10.10.20.0 255.255.255.0 dns nat (Micros) 0 access-list noNAT static (Micros,Internet) tcp interface https 192.168.20.240 https netmask 255.255.255.255 access-group Internet_access_in in interface Internet route Micros 192.18.1.0 255.255.255.0 192.168.50.254 1 route Micros 192.168.0.0 255.255.0.0 192.168.50.254 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout uauth 0:05:00 absolute eou timeout retransmit 10 group-policy VVPortugal internal group-policy VVPortugal attributes banner value #################Welcome to Hotel treta network ################## banner value ############### Your user belongs to VPN group " VVPortugal " ############ wins-server value 192.168.20.230 dns-server value 192.168.20.230 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value VVPortugal_splitTunnelAcl group-policy GroupPolicy1 internal group-policy GroupPolicy1 attributes vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Finan_VVH_splitTunnelAcl group-policy VPN_AcessoGeral internal group-policy VPN_AcessoGeral attributes vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Finan_VVH_splitTunnelAcl group-policy VPN_Compta internal group-policy VPN_Compta attributes banner value ################ Welcome to Hotel treta network ############### banner value ############## O seu utilizador pertence ao grupo VPN_Compta ############ banner value ###### Redes : 192.168.0.X / 192.18.1.X/ 172.21.1.X /172.21.2.X/172.21.3.X###### vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Vpn_Compta group-policy Fastcall internal group-policy Fastcall attributes banner value ################ Welcome to Hotel treta network ############### banner value ############## O seu utilizador pertence ao grupo VPN "Fastcall" ############ banner value ###### Redes : 192.168.0.X / 192.18.1.X/ 172.21.1.X /172.21.2.X/172.21.3.X###### vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Fastcall group-policy Manut internal group-policy Manut attributes banner value ##################Bem vindo a rede do Hotel treta ################ banner value O seu utilizador pertence ao grupo VPN "Manut" wins-server value 192.168.20.230 dns-server value 192.168.20.230 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value VVP_Manut_splitTunnelAcl group-policy AlemanhaOpera internal group-policy AlemanhaOpera attributes wins-server value 192.168.20.230 dns-server value 192.168.20.230 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value AlemanhaOpera_splitTunnelAcl group-policy Roessner internal group-policy Roessner attributes dns-server value 192.168.20.230 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Roessner_splitTunnelAcl group-policy Vilavita_mail internal group-policy Vilavita_mail attributes wins-server value 192.168.20.230 dns-server value 192.168.20.230 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Vilavita_mail_splitTunnelAcl group-policy Finan_VVH internal group-policy Finan_VVH attributes wins-server value 192.168.20.230 dns-server value 192.168.20.230 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value Finan_VVH_splitTunnelAcl username Scheer password 3GYE..HQ3a1qCPVi encrypted privilege 0 username Scheer attributes vpn-group-policy Finan_VVH username ssacramento password kGN90fxw8lUZsemd encrypted privilege 0 username ssacramento attributes vpn-group-policy VVPortugal username cromero password RL8lAMC.Uo4nXi5/ encrypted privilege 0 username cromero attributes vpn-group-policy VVPortugal username bpohl password dBmz9AW.Ud/6h6HS encrypted username bpohl attributes vpn-group-policy Finan_VVH username aschmidt password 4GkY290iaryOX.pA encrypted privilege 0 username aschmidt attributes vpn-group-policy Finan_VVH username Acorreia password cbnaZfx.Oz5TRUml encrypted privilege 15 username Acorreia attributes vpn-group-policy VPN_Compta username joaott password cZQigAoExDYGaZms encrypted privilege 15 username joaott attributes vpn-group-policy Fastcall username petra password cktJoZznoVbtzcug encrypted privilege 0 username petra attributes vpn-group-policy AlemanhaOpera username cfernandes password NuCW2OBlxTLAuq6W encrypted privilege 0 username cfernandes attributes vpn-group-policy VVPortugal username joao password UNYr49aS3sNqUmMm encrypted privilege 0 username joao attributes vpn-group-policy VVPortugal username escher password oMd7BozohxsynxUV encrypted privilege 0 username escher attributes vpn-group-policy Finan_VVH username varitable password uIbU3VC9a19kRFXz encrypted privilege 0 username varitable attributes vpn-group-policy VVPortugal username bela password WiXS6I75pGERIcXQ encrypted privilege 0 username bela attributes vpn-group-policy Manut username kbauval password rYyDt4fxXwLly59I encrypted privilege 0 username kbauval attributes vpn-group-policy VVPortugal username kara password LZ8ZVh5Up9qzQy1s encrypted privilege 0 username kara attributes vpn-group-policy AlemanhaOpera username lfernandes password uNXCVunMRQM0gscJ encrypted privilege 0 username lfernandes attributes vpn-group-policy VVPortugal username toril password R9NsXKD.qI5qzijj encrypted privilege 0 username toril attributes vpn-group-policy AlemanhaOpera username corinna password qkuUUv5D/SiSo4Ct encrypted privilege 0 username corinna attributes vpn-group-policy AlemanhaOpera username thiel password NpUcbJDD6NIuafB/ encrypted privilege 0 username thiel attributes vpn-group-policy VVPortugal username jfernandes password kDHfTpsjEPuidktQ encrypted privilege 15 username jfernandes attributes vpn-group-policy Fastcall username compta password HUMJs.mkVklfOhcl encrypted privilege 15 username compta attributes vpn-group-policy VPN_AcessoGeral username sonja password gdiPbF2XdVrdJiZu encrypted privilege 0 username sonja attributes vpn-group-policy AlemanhaOpera username herdade password EjRzC1WJ.0d2fbZq encrypted privilege 0 username herdade attributes vpn-group-policy VVPortugal username Laurentino password KjbuL80B2BSATqke encrypted privilege 0 username Laurentino attributes vpn-group-policy Manut username bmonteiro password 9JW0KIpA95gPxx1H encrypted privilege 0 username bmonteiro attributes vpn-group-policy Manut username bmateus password GQmImFNdIFgm4sIp encrypted privilege 0 username bmateus attributes vpn-group-policy VVPortugal username filosofcompany password RWBwzDmUY9YL3CGx encrypted privilege 0 username filosofcompany attributes vpn-group-policy Finan_VVH username slorenz password mCQz0AQ3g2ntGoDr encrypted privilege 0 username slorenz attributes vpn-group-policy Finan_VVH aaa authentication ssh console LOCAL aaa authorization command LOCAL http server enable http 0.0.0.0 0.0.0.0 Internet http 10.10.20.0 255.255.255.0 inside http x.x.x.x 255.255.255.255 Internet no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto dynamic-map SSHARIA_IPDINAMICO 10 set transform-set ESP-DES-MD5 crypto map Internet_map 40 match address Internet_40_cryptomap crypto map Internet_map 40 set peer A.B.C.D crypto map Internet_map 40 set transform-set ESP-DES-MD5 crypto map Internet_map 60 match address Internet_60_cryptomap crypto map Internet_map 60 set peer E.F.G.H crypto map Internet_map 60 set transform-set ESP-DES-MD5 crypto map Internet_map 80 match address VILA_ALISOL_CRYPTOMAP_ID80 crypto map Internet_map 80 set peer I.J.L.M crypto map Internet_map 80 set transform-set ESP-DES-MD5 crypto map Internet_map 65535 ipsec-isakmp dynamic SSHARIA_IPDINAMICO crypto map Internet_map interface Internet crypto isakmp identity address crypto isakmp enable Internet crypto isakmp enable inside crypto isakmp enable Micros crypto isakmp policy 30 authentication pre-share encryption des hash md5 group 2 lifetime 86400 crypto isakmp policy 50 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto isakmp nat-traversal 20 tunnel-group DefaultRAGroup ipsec-attributes pre-shared-key * tunnel-group A.B.C.D type ipsec-l2l tunnel-group A.B.C.D ipsec-attributes pre-shared-key * tunnel-group VPN_Compta type ipsec-ra tunnel-group VPN_Compta general-attributes address-pool VPM_Assec default-group-policy VPN_Compta tunnel-group VPN_Compta ipsec-attributes pre-shared-key * isakmp keepalive threshold 300 retry 10 tunnel-group E.F.G.H type ipsec-l2l tunnel-group E.F.G.H ipsec-attributes pre-shared-key * tunnel-group treta_mail type ipsec-ra tunnel-group treta_mail general-attributes default-group-policy treta_mail tunnel-group treta_mail ipsec-attributes pre-shared-key * tunnel-group Manut type ipsec-ra tunnel-group Manut general-attributes address-pool VPM_Assec default-group-policy Manut tunnel-group Manut ipsec-attributes pre-shared-key * tunnel-group Roessner type ipsec-ra tunnel-group Roessner general-attributes address-pool VPM_Assec default-group-policy Roessner tunnel-group Roessner ipsec-attributes pre-shared-key * tunnel-group Finan_VVH type ipsec-ra tunnel-group Finan_VVH general-attributes address-pool VPM_Assec default-group-policy Finan_VVH tunnel-group Finan_VVH ipsec-attributes pre-shared-key * tunnel-group AlemanhaOpera type ipsec-ra tunnel-group AlemanhaOpera general-attributes address-pool VPM_Assec default-group-policy AlemanhaOpera tunnel-group AlemanhaOpera ipsec-attributes pre-shared-key * tunnel-group VVPortugal type ipsec-ra tunnel-group VVPortugal general-attributes address-pool VPM_Assec default-group-policy VVPortugal tunnel-group VVPortugal ipsec-attributes pre-shared-key * tunnel-group I.J.L.M type ipsec-l2l tunnel-group I.J.L.M ipsec-attributes pre-shared-key * tunnel-group VPN_FastCall type ipsec-ra tunnel-group VPN_FastCall ipsec-attributes pre-shared-key * tunnel-group VPN_Fastcall type ipsec-ra tunnel-group VPN_Fastcall general-attributes address-pool VPM_Assec default-group-policy Fastcall tunnel-group VPN_Fastcall ipsec-attributes pre-shared-key * isakmp keepalive threshold 300 retry 10 tunnel-group VPN_AcessoGeral type ipsec-ra tunnel-group VPN_AcessoGeral general-attributes default-group-policy VPN_AcessoGeral tunnel-group VPN_AcessoGeral ipsec-attributes pre-shared-key * telnet 0.0.0.0 0.0.0.0 inside telnet 0.0.0.0 0.0.0.0 Micros telnet timeout 5 ssh 0.0.0.0 0.0.0.0 Internet ssh timeout 60 console timeout 0 vpdn group PtPrime request dialout pppoe vpdn group PtPrime localname treta@sul02.websidefix vpdn group PtPrime ppp authentication chap vpdn username treta@sul02.websidefix password ********* store-local ! class-map inspection_default match default-inspection-traffic ! ! policy-map global_policy class inspection_default ! service-policy global_policy global prompt hostname context : end treta#
  6. Portuguese People

    Oi GoodSpeed novamente, Não esmoreças perante os resultados de colegas teus,a autoconfiança é o mais importante,acho que o essencial é tu próprio têres a a noçao que não decoraste tudo (porque há perguntas que tens mesmo que decorar,por serem tão caricatas)Não me considero nenhum Ás em redes e no entanto passei à primeira com uma nota razoavelmente boa,e já fiz 3 exames do CCNP.O mais importante é entender os conceitos de um modo geral , e praticá-los com o TK 2 ou 3 vezes.Na altura que passei estudei também por um study guide da TroyTechnologies ,pouco conhecido mas que achei excelente,pois inclui uma parte com os "Keypoints" de cada capitulo,que não são nada mais nada menos que os resumos ,importantíssimos e que realmente sairam no exame.É um manual que não é maçudo e que ajuda bastante.Antes li os manuais do curso que também estão bons.E claro...se não tens muita experiência nesta área ,nada melhor que practicar com um router e com um switch. Recomendo: Sybex Study Guide TK - última versão Boson Simulator ou um router e um switch ,não precisam sêr grande coisa Manuais do curso ICND com alguma dedicação....passas sem qq problema Boa sorte JTT
  7. Portuguese People

    Oi Goodspeed, O meu tirei em 2000 talvez...n me recordo claramente(na Rumos),mas foi por volta dessa altura.Penso que se tens alguma experiencia,que acho que seja o caso pelos post´s que li teus,não terás practicamente nenhuma dificuldade em tirar o CCNA sem ires ao curso.Se fôr o caso da empresa ondes trabalhas pagar...então aproveita,não digo que seja desperdício....dá sempre umas "luzes".No meu caso posso adiantar que as dúvidas pertinentes surgiram quando já tinha feito o curso e passei à fase dos estudos.Nessa altura pensei "agora é que dava jeito ir". Boa sorte na certificação JTT
  8. Portuguese People

    ehehehehehhe! Olha um tuga que conheço a fuça.......! Tenho que ter respeito pq sou um newbie....... depois arranjo-te o manual que queres....cumprimentos senhor engenheiro.
  9. How Old Are You

    I´m 31.....gosh! but i know younger people that seems to be older than me.Old Spirit.....they just sit in front of TV drinking beer and watching soccer.
  10. Portuguese People

    E mais outro Tuga ainda....É sempre bom vêr gente de cá num forum deste calibre.Já cá tinha estado inscrito ,mas o meu login "passou-se" e tive que me registar outra vez com outro user,mas ainda não tinha visto a área Lusitana. Sou do Algarve e faço auto-estudo desde o início da certificaçao CCNP ,é puxadote assim...tenho dois exames passados - BCRAN + BCMSN . Dia 11 vou fazer o BSCI,vamos lá vêr como corre..... O único curso que fiz na Rumos foi o CCNA,mas o formador n era grande coisa.Na minha opinião o ideal é fazer o autoestudo e só depois ir aos cursos,pq as dúvidas que tiramos depois passam a sêr outras. Outro aspecto que não gostei na Rumos(e enviei um email a reclamar) foi o facto das salas de testes para além de serem minúsculas,ainda por cima depois de algumas pessoas terminarem os testes ,a rapariga que trabalha lá ,punha-se a imprimir a papelada referente a essas mesmas pessoas,desconcentrando os outros que ainda estavam a fazer.Acho isso completamente ridículo,uma vez que não se pode dizer que os exames sejam baratos. Quanto à Galileo o meu irmao tirou lá o E-master (acho que é isso) e não o ouvi dizer nada de mau da entidade. Saudaçoes lusitanas a todos.....
×