Monday, 29 February 2016
New Cognizant digital healthcare platform drives business outcomes through increased consumer engagement
from
via CERTIVIEW
Allied Telesis Achieves IPv6 Ready Compliance for New Products
from
via CERTIVIEW
Budget 2016: A hit among Indian Startups or yet another disappointment?
from
via CERTIVIEW
EMC DSSD D5: Rack-Scale Flash For The Masses
from Tom's IT Pro
via CERTIVIEW
Dell's Data Protection Digital Landscape
from Tom's IT Pro
via CERTIVIEW
How To Set Up And Use File History In Windows 10
from Tom's IT Pro
via CERTIVIEW
Synametrics Releases Syncribox, A Cloud-Based File Sharing Feature For Syncrify
from Tom's IT Pro
via CERTIVIEW
Upcoming Microsoft Developer Certifications And Exams To Be Retired
from Tom's IT Pro
via CERTIVIEW
Budget 2016-17: Industry Showers Praises but Wants GST
from
via CERTIVIEW
Budget 2016-17: Industry Showers Praises but Wants GST
from
via CERTIVIEW
Budget 2016: “The Rs 2.31 lakh cr earmarked for infrastructure aligns well with the vision to build connected cities”
from
via CERTIVIEW
Launch of Raspberry Pi 3
from
via CERTIVIEW
CCNA Data Center Question of the Week: Why Switches Replaced Bridges
What are three reasons that switches replaced bridges? (Choose three.)
A. Smaller frame buffers increase speed.
B. Forward, filter, or flood frames based in hardware.
C. Multiple simultaneous communications between ports.
D. Larger inspection engine allows for higher throughput.
E. Switches have many ports.
Answer: B, C and E.
Switches and bridges in function are basically the same. They forward traffic based on layer 2 addressing (MAC addresses), relative to the ingress port and the egress port based on the destination address. If the address is not known, it’s a broadcast or an unregistered multicast, is flooded out all ports. The primary difference is that all modern switches make forwarding decisions in hardware (on Cisco switches, ASICs (application specific integrated circuits…in other words a purpose built CPU for that one or limited function). Using hardware based forwarding gives us speed, reduced latency, the appearance (and sometimes actual) concurrent conversations and much higher port density.
Related Resources
Cisco White Papers
Related Course
CCNA-DC – CCNA Data Center Boot Camp
CCNA Data Center Question of the Week Series
- CCNA Data Center Question of the Week: Active Zone Sets
- CCNA Data Center Question of the Week: Virtual Device Contexts
- CCNA Data Center Question of the Week: VSAN 10
- CCNA Data Center Question of the Week: Destination VIF Field
- CCNA Data Center Question of the Week: Fibre Channel HBA
- CCNA Data Center Question of the Week: Fabric Extender
- CCNA Data Center Question of the Week: Cisco Nexus 7000
- CCNA Data Center Question of the Week: Cisco Unified Fabric
- CCNA Data Center Question of the Week: IEEE Protocols
- CCNA Data Center Question of the Week: Layer 3 Switching
- CCNA Data Center Question of the Week: Layer 1 of the OSI Model
- CCNA Data Center Question of the Week: DSAP Field
- CCNA Data Center Question of the Week: Why Switches Replaced Bridges
from
CERTIVIEW
The volume of new mobile malware tripled in 2015
The volume of malware targeting users of mobile devices grew more than three times in 2015, compared to..
from
via CERTIVIEW
Sunday, 28 February 2016
New Cognizant digital healthcare platform drives business outcomes through increased consumer engagement
from
via CERTIVIEW
New Cognizant digital healthcare platform drives business outcomes through increased consumer engagement
from
via CERTIVIEW
Saturday, 27 February 2016
Friday, 26 February 2016
How To Get Friendly Output With WMI And Calculated Properties With PowerShell
from Tom's IT Pro
via CERTIVIEW
Cyfuture drags Ringing Bells to the court for unpaid dues
from
via CERTIVIEW
Cyfuture drags Ringing Bells to the court for unpaid dues
from
via CERTIVIEW
CCNP Security Question of the Week: Prevent VLAN Hopping
According to Cisco best practices, which two commands help prevent VLAN hopping? (Choose two.)
A. switchport mode access
B. switchport access vlan 2
C. switchport mode trunk
D. switchport access vlan 1
E. switchport trunk native vlan 1
F. switchport protected
Answer: A and B.
The idea is simply enough, change the default behavior of being dynamic desirable or dynamic auto, to making the port an access port. That way, if whatever device is attached to the port, it will not be able to use 802.1Q tagging to hop from one VLAN to another. Also, as an access port, the default VLAN is VLAN 1, so move it to another, unused VLAN number to black hole any traffic from any unauthorized devices that might connect to the switch.
Related Resources
Cisco White Papers
Related Course
CCNP Security e-Camp
CCNP Security Question of the Week Series
- CCNP Security Question of the Week: Cisco ASA Security Context
- CCNP Security Question of the Week: Authenticating ASDM Users
- CCNP Security Question of the Week: Layer 5-7 Policy Maps
- CCNP Security Question of the Week: 802.1X
- CCNP Security Question of the Week: IPS Updates
- CCNP Security Question of the Week: IPsec VPN Tunnels
- CCNP Security Question of the Week: AnyConnect VPN Client
- CCNP Security Question of the Week: ASA AIP-SSM and ASA AIP-SSC
- CCNP Security Question of the Week: Disable DHCP Server Service
- CCNP Security Question of the Week: Cisco ASA Security Appliance Access List
- CCNP Security Question of the Week: Network Address Translation
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: Packet-Tracer Command
- CCNP Security Question of the Week: SSL Ciphers
- CCNP Security Question of the Week: VLAN Hopping
- CCNP Security Question of the Week: DHCP Server Service
- CCNP Security Question of the Week: Default Behavior of an Access List
- CCNP Security Question of the Week: NAT Control on Cisco ASA Version 8.3
- CCNP Security Question of the Week: IPS Anomaly Detection Features
- CCNP Security Question of the Week: Bogus IPv6 Addresses
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: NTP on a Cisco ASA Default Settings
- CCNP Security Question of the Week: Packet-tracer Command
- CCNP Security Question of the Week: SSL Ciphers
- CCNP Security Question of the Week: Prevent VLAN Hopping
from
CERTIVIEW
Jabong appoints Muralikrishnan B. as Chief Operating Officer
from
via CERTIVIEW
Dell annual threat report reveals cyber criminals using aggressive, shape-shifting threat tactics
from
via CERTIVIEW
DQLive: The Dataquest Business Technology Award Goes to…
from
via CERTIVIEW
Magma Fincorp Deploys Qlik for Customer Behavior Analysis
from
via CERTIVIEW
DQLive: The Dataquest Business Technology Award Goes to…
from
via CERTIVIEW
Thursday, 25 February 2016
SAS Joins BSA | The Software Alliance
from
via CERTIVIEW
Cloudian Announces HyperStore 1500
from Tom's IT Pro
via CERTIVIEW
Juniper Networks Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Building A Business Case For WebRTC
from Tom's IT Pro
via CERTIVIEW
Wipro collaborates with Wind River to showcase carrier grade cloud technologies
from
via CERTIVIEW
BlackBerry Announces CyberSecurity Services, Microsoft Azure Partnership
from Tom's IT Pro
via CERTIVIEW
More than 200 CIOs attend DQ Live Conference and Awards
from
via CERTIVIEW
More than 200 CIOs attend DQ Live Conference and Awards
from
via CERTIVIEW
Google launches ‘Accelerated Mobile Pages’ for search for India
from
via CERTIVIEW
World’s first smart phone MBA launched
from
via CERTIVIEW
Wishlist of the industry stalwarts from the Union Budget 2016
from
via CERTIVIEW
Wednesday, 24 February 2016
Using Windows 10 Sleep And Hibernation Settings
from Tom's IT Pro
via CERTIVIEW
NVMe Gains Hardware RAID Functionality, Broadcom Announces NVMe RAID Controllers
from Tom's IT Pro
via CERTIVIEW
Adaptiva OneSite 5.6 For SCCM Delivers Enhanced Protection From Cyberattacks
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: SQL Injection
What exploitation tool will help you with SQL Injection?
A. sqlmap
B. Swaks
C. Wpscan
D. SQLExtractor v1
The correct answer is B.
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
Swaks is a featureful, flexible, scriptable, transaction-oriented SMTP test tool. WPScan is a black box WordPress vulnerability scanner.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
from
CERTIVIEW
Gartner Identifies the Top 10 Internet of Things technologies for 2017 and 2018
from
via CERTIVIEW
Wipro and SugarCRM announce partnership to deploy CRM solutions for global enterprises
Simplilearn partners with Tableau to nurture talent pool of 200,000 Data Science professionals by 2020
from
via CERTIVIEW
How Redbus slashed latencies by 2 seconds
from
via CERTIVIEW
Tuesday, 23 February 2016
All-Flash Array Market Has A New Hotshot: Nimble Storage Unveils New Predictive AFAs
from Tom's IT Pro
via CERTIVIEW
Pros And Cons Of In-House IT Training Development
from Tom's IT Pro
via CERTIVIEW
Unisplendour Cancels $3.8 Billion Western Digital Investment, SanDisk Acquisition Thrown Into Doubt
from Tom's IT Pro
via CERTIVIEW
IBM And Apple: A Match Made For The Mobile Enterprise
from Tom's IT Pro
via CERTIVIEW
Helping take informed decisions: Power of machine learning
from
via CERTIVIEW
Gartner says IT leaders need a more agile approach to support marketing
from
via CERTIVIEW
Wipro partners with Verveba for advanced mobile radio network optimization solutions
from
via CERTIVIEW
Will Union Budget 2016 bring cheer for Indian IT
from
via CERTIVIEW
Will Union Budget 2016 bring cheer for Indian IT
from
via CERTIVIEW
Monday, 22 February 2016
QLogic Unveils FastLinQ 45000 Series 100 GbE Ethernet Controllers
from Tom's IT Pro
via CERTIVIEW
VMware AirWatch Enterprise Mobility Management Review
from Tom's IT Pro
via CERTIVIEW
Lantronix Reveals The First Enterprise Grade 802.11ac WiFi Bridge Module
from Tom's IT Pro
via CERTIVIEW
How To Align IT Pro's Learning Needs With Career Growth
from Tom's IT Pro
via CERTIVIEW
IBM's Transition To The Cloud Platform And Cognitive Computing Solutions
from Tom's IT Pro
via CERTIVIEW
CCNA Data Center Question of the Week: DSAP Field
In an IEEE 802.3 Ethernet frame, what is the significance of the DSAP field?
A. The DSAP field specifies the TCP or UDP ports of the transport protocol.
B. The DSAP field is only used by the DoD to indicate the information classification level.
C. The DSAP field is only used in Ethernet II frames.
D. The DSAP field indicates the network layer protocol.
Answer: D.
In 802.3 frame types, S-SAP is an 8-bit long field that represents the logical address of the network layer entity that has created the message (network layer protocol that is sending). D-SAP is an 8-bit long field that represents the logical addresses of the network layer entity intended to receive the message (network layer protocol that is receiving). Usually they carry identical values.
Related Resources
Cisco White Papers
Related Course
CCNA-DC – CCNA Data Center Boot Camp
CCNA Data Center Question of the Week Series
- CCNA Data Center Question of the Week: Active Zone Sets
- CCNA Data Center Question of the Week: Virtual Device Contexts
- CCNA Data Center Question of the Week: VSAN 10
- CCNA Data Center Question of the Week: Destination VIF Field
- CCNA Data Center Question of the Week: Fibre Channel HBA
- CCNA Data Center Question of the Week: Fabric Extender
- CCNA Data Center Question of the Week: Cisco Nexus 7000
- CCNA Data Center Question of the Week: Cisco Unified Fabric
- CCNA Data Center Question of the Week: IEEE Protocols
- CCNA Data Center Question of the Week: Layer 3 Switching
- CCNA Data Center Question of the Week: Layer 1 of the OSI Model
- CCNA Data Center Question of the Week: DSAP Field
from
CERTIVIEW
HCL and Symantec expand global strategic partnership
from
via CERTIVIEW
Wincor Nixdorf and Mahindra Comviva to enable NFC and QR Code transactions at ATM
from
via CERTIVIEW
Google Maps to allow pit stops and detours in navigation mode
from
via CERTIVIEW
Sunday, 21 February 2016
Ruckus Wireless shares vision for the future of In-Building Cellular
from
via CERTIVIEW
from
via CERTIVIEW
IBM's Ross Mauri On Ensuring Mainframe Relevance In The Modern Era
from Tom's IT Pro
via CERTIVIEW
Saturday, 20 February 2016
The Week In Storage: Nutanix Vs. VMware Round 3, NetAPP Staff Get The Ax, Clinton Group Strikes Again
from Tom's IT Pro
via CERTIVIEW
Friday, 19 February 2016
How To Use The PowerShell Registry Provider
from Tom's IT Pro
via CERTIVIEW
2016 Veeam Availability Report: Availability gap widens with application downtime costing enterprises $16 mn each year
from
via CERTIVIEW
CCNP Security Question of the Week: SSL Ciphers
What command changes the SSL ciphers used by the Cisco Email Security Appliance for Transport Layer Security sessions and HTTPS access?
A. sslconfig
B. sslciphers
C. tlsconifg
D. httpsconfig
Answer: A.
With AsyncOS, you can configure the SSL or TLS protocols and ciphers that are advertised for inbound and requested for outbound connections with the sslconfig command.
Related Resources
Cisco White Papers
Related Course
CCNP Security e-Camp
CCNP Security Question of the Week Series
- CCNP Security Question of the Week: Cisco ASA Security Context
- CCNP Security Question of the Week: Authenticating ASDM Users
- CCNP Security Question of the Week: Layer 5-7 Policy Maps
- CCNP Security Question of the Week: 802.1X
- CCNP Security Question of the Week: IPS Updates
- CCNP Security Question of the Week: IPsec VPN Tunnels
- CCNP Security Question of the Week: AnyConnect VPN Client
- CCNP Security Question of the Week: ASA AIP-SSM and ASA AIP-SSC
- CCNP Security Question of the Week: Disable DHCP Server Service
- CCNP Security Question of the Week: Cisco ASA Security Appliance Access List
- CCNP Security Question of the Week: Network Address Translation
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: Packet-Tracer Command
- CCNP Security Question of the Week: SSL Ciphers
- CCNP Security Question of the Week: VLAN Hopping
- CCNP Security Question of the Week: DHCP Server Service
- CCNP Security Question of the Week: Default Behavior of an Access List
- CCNP Security Question of the Week: NAT Control on Cisco ASA Version 8.3
- CCNP Security Question of the Week: IPS Anomaly Detection Features
- CCNP Security Question of the Week: Bogus IPv6 Addresses
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: NTP on a Cisco ASA Default Settings
- CCNP Security Question of the Week: Packet-tracer Command
- CCNP Security Question of the Week: SSL Ciphers
from
CERTIVIEW
India consumer storage flash memory market grows threefold over five years: CMR
from
via CERTIVIEW
Thursday, 18 February 2016
Lenovo upgrades touch screen experience with WRITEit 2.0
from
via CERTIVIEW
NEC and Juniper Networks expand global alliance to deliver latest NFV-based solutions
from
via CERTIVIEW
Seagate 8TB Enterprise Capacity 3.5 HDD v5 Review
from Tom's IT Pro
via CERTIVIEW
IBM Brings Petabyte Scale To New Storwize V5000 Hybrid Storage Systems
from Tom's IT Pro
via CERTIVIEW
ISACA Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Samsung Announces Availability Of New ARTIK Platform
from Tom's IT Pro
via CERTIVIEW
Investment Round to Push Vera Growth in 2016
from Tom's IT Pro
via CERTIVIEW
“TabletAdda.com” Exclusive Portal for Tablets Launched
from
via CERTIVIEW
Nokia launches data center, cloud transformation services as operators move towards the telco cloud #MWC16
from
via CERTIVIEW
Phicomm launches E 670, claimed to be India’s most affordable 4G dual SIM smart phone, in partnership with Snapdeal
from
via CERTIVIEW
Wednesday, 17 February 2016
Chennai’s multi-brand retail chain Poorvika chooses Avaya for growth
from
via CERTIVIEW
VMWare Announces AirWatch 8.3
from Tom's IT Pro
via CERTIVIEW
How To Create And Edit The Windows 10 Registry File
from Tom's IT Pro
via CERTIVIEW
PMI Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: CVE-2007-2447
You have found a CVE-2007-2447: Remote Command Injection Vulnerability. This bug was originally reported against the anonymous calls to the SamrChangePassword() MS-RPC function in combination with the “username map script”smb.conf option (which is not enabled by default). The vulnerables version are Samba 3.0.0 – 3.0.25rc3. You want to exploit it and get access to the system.
Which exploitation framework will help you with the task?
A. BeEF
B. Metasploit
C. SET toolkit
D. Powersploit
The correct answer is B.
Metasploit comes with exploitation modules that enable pen testers to exploit known vulnerabilities in operating systems and applications. BeEF is a browser exploitation framework that focuses on the web browser and not other applications such as Samba. SET toolkit is specifically designed to perform advanced attacks against the human element. PowerSploit is a collection of security-related modules and functions written in PowerShell. Many of the scripts in the project are extremely useful in post-exploitation in Windows environments.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
from
CERTIVIEW
Sanjeev Verma elevated as CEO, AGC Networks
from
via CERTIVIEW
Tuesday, 16 February 2016
ICICI Bank launches mobile app development challenge ‘ICICI Appathon’
from
via CERTIVIEW
NPCI Hackathon attempts to fast track digital payments adoption
from
via CERTIVIEW
Ringing Bells launches world’s cheapest Smartphone at Rs 251
from
via CERTIVIEW
EMC, VMware Release VxRail Appliances
from Tom's IT Pro
via CERTIVIEW
ITIL Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Tax panel at Make in India says GST will improve ease of doing business
from
via CERTIVIEW
Maveric Systems strengthens its domain, digital and, technology-led offerings; appoints three new Vice-Presidents
from
via CERTIVIEW
Avaya appoints Maan Al-Shakarchi to head Avaya Networking in Europe, Middle East and Africa, and Asia-Pacific
from
via CERTIVIEW
Mphasis Next Labs launches InfraGraf
from
via CERTIVIEW
Adwind: Malware-as-a-Service platform that hits more than 400,000 users and organizations globally
from
via CERTIVIEW
How big data can diagnose cancer
Healthcare is one of the key areas that requires a lot of focus from the governments and researchers. Globally,..
from
via CERTIVIEW
Monday, 15 February 2016
VMware accelerates the shift to digitization and hybrid cloud with vRealize Suite 7
from
via CERTIVIEW
IBM Bolsters Hybrid Cloud Encryption With New z13 Mainframe Offerings
from Tom's IT Pro
via CERTIVIEW
5 Must-Have Tips For Keeping IT Skills Current
from Tom's IT Pro
via CERTIVIEW
New Veritas Data Genomics Index delivers industry first insights into business data composition
from
via CERTIVIEW
Mphasis unleashes digital helpdesk with the launch of The Social Room, in collaboration with Soho Square
from
via CERTIVIEW
HCL Infosystems partners with Symantec to provide security solutions
from
via CERTIVIEW
How technology is changing the way we think about security
With the prevalence of a wide..
from
via CERTIVIEW
Sunday, 14 February 2016
mrupee ties up with IRCTC, offers easy payment option
from
via CERTIVIEW
NEC Indonesia to implement mobile technology in hospitals
from
via CERTIVIEW
Infoholic Research: Asia Pacific to lead A2P SMS Market by 2022
from
via CERTIVIEW
Aasaanjobs raises $5 mn in Series A funding from VCs
Online marketplace for recruitment, Aasaanjobs recently raised $5 mn in Series A round of..
from
via CERTIVIEW
New HP ink tank printers for small businesses provide options for lower cost printing
from
via CERTIVIEW
How is payment gateway changing the business
By: Kumar Karpe, CEO, TechProcess
The adage ‘Cash is trash’ couldn’t be truer than it is in today’s digital times...
from
via CERTIVIEW
Saturday, 13 February 2016
The Week In Storage: Dell/EMC Merger Woes, Netflix Exits Stage Left, Imation Sells IronKey
from Tom's IT Pro
via CERTIVIEW
Friday, 12 February 2016
How To Manage User Profiles With PowerShell
from Tom's IT Pro
via CERTIVIEW