Thursday, 30 June 2016
How To Stay Ahead Of The IT Technology Curve
from Tom's IT Pro
via CERTIVIEW
IBM And Cisco Partner On Watson Integrated Cloud-Based Collaboration Tools
from Tom's IT Pro
via CERTIVIEW
What You Should Know Before You Go to Cisco Live 2016
It’s that time of year again: Cisco Live. Whether you’re a NetVet or you’re a first-timer, there’s lots to see and do and it can be an overwhelming experience.
During this year’s event, held in Las Vegas from July 10-14, expect Cisco to unveil their predictions for the coming year on what is going to be important in information and communication technology (ICT). Based on the current landscape, I predict we’ll see big announcements in the areas of:
- Digitization
- Internet of Things (IoT)
- Cloud
- Big data and analytics
As a four-time Cisco Live veteran, I’ve picked up a few tips and tricks for attending the event. This is how I get the most out of my experience:
Sessions of interest
I like to start by checking out the session catalog. There are over 1,000 sessions, so you should to do your homework before you go in order to maximize your time.
Sessions are available for a number of technology areas and within those areas there is a range of experience levels from introductory to advanced – make sure you pick the right session offerings for your interest and expertise.
As a technical advisor, I like to stay up to date with technology and trends. This year I will be attending the Cisco Technical Leadership Council on Monday and Tuesday and then will be attending technical sessions on Wednesday and Thursday. My tech sessions of choice are related to cybersecurity, ACI-Application Centric Infrastructure, Cisco Network Function Virtualization Infrastructure (NFVI), Cisco Digital Network Architecture (DNA) and Cisco’s Virtual Internet Routing Lab (VIRL).
Technical sessions aren’t the only things to do at Cisco Live. You can practice skills, flex your networking muscles, socialize or give back to a nonprofit. Head over to The Hub and the DevNet Zone. This is where you come to learn, code and get hands-on experience with Cisco products and open source SDK’s and APIs. Have a look at VIRL, Cisco’s Virtual Internet Routing Lab.
Don’t forget to go see the band Maroon 5 at the customer appreciation event on Wednesday night.
Make a social impact and assemble meal kits with Stop Hunger Now or build hygiene kits with Clean the World. These are fantastic initiatives – some of my best memories are made here. A list of activities can be viewed at http://ift.tt/296K8GO.
Packing your suitcase
There are a few items you should make sure to bring with you to Cisco Live that will make your experience a lot easier or more comfortable.
- It’s going to be cold inside the conference center so pack a sweater. That’s right, the inside the air conditioning in some locations will be chilly.
- With temperatures outside expected to be over 105 degrees you will need light comfortable clothes when you are traveling between buildings on the Las Vegas Strip.
- There will be lots of walking, bring the most comfortable shoes you have. If you have a Fitbit bring it along too, you may be surprised by how many miles you walk in a day at Cisco Live.
- I recommend bringing a thermal mug like a Contigo. Fill it up with coffee, tea or a cool drink between sessions.
- I also recommend leaving one-third to half of your suitcase space empty. You will acquire lots of swag when visiting the World of Solutions vendor booths.
- Don’t forget all your recharging cables and a portable USB battery pack. If you do forget one, pick up one from Global Knowledge at booth #837.
Follow me @GK_bradhaynes and compare sessions, tips and other information. I hope my tips help you to enjoy and get the most out of your time at Cisco Live.
Can’t make it this year? Cisco Live webcasts and broadcasts are free to attend: http://ift.tt/1vn5zbs
Stay connected and follow the Social Media Central and Contests Social at: http://ift.tt/296JHN1
- ciscolive.com/us
- Twitter @CiscoLive #CLUS
- http://ift.tt/29bVXOT
from
CERTIVIEW
Wednesday, 29 June 2016
New Medical Device Hijack Attacks Hide In Old Malware
from Tom's IT Pro
via CERTIVIEW
Building A Business Case For Cloud Customer Relationship Management (CRM) Tools
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: Firewall Traffic
Jason asked his company’s firewall administrator to set the firewall to inspect all incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network. Why is this request not possible?
A. Firewalls cannot inspect traffic coming through port 443.
B. Firewalls can only inspect outbound traffic.
C. Firewalls cannot inspect traffic coming through port 80.
D. Firewalls cannot inspect traffic at all, they can only block or allow certain ports.
The correct answer is D.
Firewalls only block or allow data packets based on their TCP/IP properties such as source and destination addresses, port numbers, protocols used, etc.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
- CEH v9 Question of the Week: Prevent Future DoS Attacks
- CEH v9 Question of the Week: Same MAC Address
- CEH v9 Question of the Week: XSS Scripting
- CEH v9 Question of the Week: Sniff a Switched Network
- CEH v9 Question of the Week: TCP/IP Session Hijacking
- CEH v9 Question of the Week: Firewall Traffic
from
CERTIVIEW
Tuesday, 28 June 2016
Archive360's Archive2Azure Offers Data Migration To Azure For Compliance
from Tom's IT Pro
via CERTIVIEW
NetApp Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Why Now Is the Right Time to Combine ITIL and Project Management
Nobody wants to get old, fat and out of touch. But over time, for most of us, it just seems to happen. Companies can be a lot like people. They too can make excuses for not doing the hard work to rejuvenate their businesses. For organizations with the willingness to get in shape and regain their corporate vitality, combining ITIL® with project management tactics can produce miracles.
Why now?
At a time when countless businesses are considering outsourcing all, or most, of their IT activities, ITIL can help IT departments around the world provide real business value. ITIL can help transform IT departments from a company cost center to a competitive service provider. With ITIL’s best practices, internal IT departments can compete with external IT providers by cost-effectively satisfying the needs of the business. ITIL provides the service management framework and project management provides the structure for how to do it.
Where ITIL comes in
When successfully implemented, a company that transitions to ITIL gets the best of both worlds: the highly responsive functionality of a superb service delivery organization, coupled with the agility, mobility and flexibility that is increasingly necessary in today’s competitive marketplace.
Since the dawn of computing, IT has often been disregarded by many within their organizations frequently including, and even led by, senior executives. Why? Because despite their best efforts, many IT departments have been severely challenged in delivering real business value on time and within budget, particularly in comparison to external providers.
ITIL addresses pretty much all of the identified limitations of IT. It provides a service-oriented framework that meets the customer’s business needs in the least expensive and highest-quality way possible, and it enables the IT organization to perform competitively with the very best service providers in the world. But, in order for ITIL to be implemented and in order for ITIL to provide adaptability and change capability, a rigorous project management methodology must be implemented as well.
Project management’s role
Project management has been around for over a hundred years, but it wasn’t until Y2K that it both matured and became broadly recognized. Y2K forced IT organizations to adopt a much more disciplined approach because failure was literally not an option. The entire issue was the result of an obscure and universal oversight that left millions of systems potentially vulnerable to failure. Only through the diligent application of a very structured and disciplined methodology could disaster be avoided. The success of Y2K efforts proved the value of the project management concept.
ITIL requires project management in two specific areas. First, implementing ITIL is a project in and of itself. It entails changing not only the IT organization, but also the rest of the company, and sometimes profoundly. ITIL implementations require exemplary project management. Anything less and the implementation is at risk.
Change management is at the very heart of ITIL. Since the whole point is to ensure high-quality delivery of IT services at the lowest possible cost, change has to be managed very carefully to avoid risk to a stable and functional environment. You also need project management to contain unproductive expenditures, while at the same time remaining highly responsive to the changing business needs of the customer. This is where project management really shines.
What to expect
The biggest challenge to an ITIL implementation is acquiring qualified project managers with sufficient business acumen, a true service mentality, and ITIL knowledge, training and experience.
Managing the constraints of time, price and scope of work, while meeting quality requirements is the foundation of project management. Meeting the customer-defined needs for capability, availability, reliability and cost-effectiveness, while allowing for agility and responsiveness in the face of changing business requirements is the foundation of ITIL. Together, these disciplines truly deliver a competitive advantage.
For individuals in the IT industry, particularly in management, there is not a set of skills more valuable than ITIL and project management. Few skills can better rejuvenate a career, and few initiatives can better rejuvenate an organization, than the combination of ITIL and project management.
Related courses
ITIL Foundation
Project Management Fundamentals
from
CERTIVIEW
Monday, 27 June 2016
Top 7 Key Features of VMware Horizon 7
VMware announced Horizon 7 in February and subsequently released the software updates. Horizon 7 provides a more streamlined, high-performance virtual desktop and application experience. New updates include features such as Instant Clones, Smart Policies, Blast Extreme and greater scalability with Cloud Pod Architecture. Let’s dig into the seven key features that Horizon 7 brings!
1. Instant Clones
This is a new type of virtual desktop that is provisioned much faster than a traditional linked clone. An Instant Clone leverages VMFork to replicate a virtual desktop in memory from an existing running virtual desktop. Besides desktops being provisioned in a matter of seconds, rather than minutes, these new Instant Clone desktops don’t rely on any kind of additional component, like View Composer and its database.
A point to make here is that the instant clone desktops do not persist. After use, the desktop is destroyed and recreated. With this in mind, Instant Clones would be ideal for pools of non-persistent floating desktops. AppVolumes User-Writable Drives and UEM may be used for desktop personalization.
As this is the first release of this feature, it does have some limitations. As aforementioned, only floating desktops are supported, so no dedicated desktops. Also, no remote desktop session host (RDSH) support or NVIDIA GRID. Instant Clones can only be deployed within a single vCenter Server, using a single VLAN and on up to 2,000 desktops.
2. Smart Policies
Smart Policies leverage User Environment Manager’s (UEM) power and give administrators more control over the desktop experience for users. Using variables such as user, client device, IP address, desktop pool, etc., many Horizon features can be disabled, enabled or controlled.
The big benefit here is that different policies, such as disabling copy and paste functions or different PCoIP profile settings, can be configured at a more granular level rather than provisioning a separate pool for each different policy.
There are a few limitations. User Environment Manager 9 must be used in conjunction with Horizon 7 and the latest agents and clients. Also, Smart Policies work with PCoIP and Blast Extreme but remote desktop protocol (RDP) is not supported.
3. New Blast Extreme protocol
VMware is continuing to improve its own remote display protocol, including Blast Extreme with the Horizon 7 release. It is an evolution from the HTML Access that was introduced with Horizon View 5.2. With Blast Extreme users are able to access their virtual desktops using a web browser but it is not strictly a web-only protocol as it can be used with the new Windows, Linux, MacOS and mobile device clients.
Blast Extreme can now be chosen as the default protocol for a desktop pool. It uses the standard HTTPS port (443) and is dual stack, meaning it works over TCP and UDP (UDP is preferred but will use TCP if UDP is unavailable). An important note is that Blast Extreme’s feature support is on par with PCoIP. It now supports unified communications, USB, client drive redirection and local printing. Blast Extreme is optimized for mobile devices, providing better battery life compared to the other Horizon protocols.
4. True SSO
True SSO provides a way for seamlessly signing into a virtual desktop or using an application, including not just Active Directory (AD) but also using smart cards, RSA SecureID or RADIUS tokens. This technology integrates Horizon 7 with VMware Identify Manager 2.7, which is included in Advanced and Enterprise license editions.
True SSO uses Security Assertion Markup Language (SAML) to send a User Principle Name (UPN) such as example@domain.com to the identity provider’s authentication system so it may access Active Directory (AD) credentials. From there, Horizon 7 generates a short-lived, unique certificate used for Windows login. Once authenticated, a user may launch any application or desktop that is entitled without being prompted for their password again.
This is great enhancement that separates authentication from user entitlement. Not only that, but because no passwords are transferred, the user credentials are secured with a digital certificate.
Identity Manager with True SSO supports the following authentication methods:
- RSA SecurID
- Kerberos
- RADIUS
- RSA Adaptive Authentication
- Standards-based, third-party identity providers
Username password and smart cards credentials are also supported, but True SSO is not really needed for those.
5. Cloud Pod Architecture Scale Improvement
Cloud Pod Architecture allows for multiple Horizon instances, or pods, to be interconnected, creating a global level of entitlements. Awareness of sessions in each instance helps to ensure that users are directed to their appropriate home site or a backup site. With this release, alternative home sites may be assigned, along with nested Active Directory groups. The sizing maximums of Cloud Pod Architecture have increased between Horizon 6 and Horizon 7. The following chart outlines the key improvements.
Horizon 6 | Horizon 7 | |
---|---|---|
Total number of sessions | 20,000 | 50,000 |
Total number of sites | 2 | 5 |
Total number of pods | 4 | 25 |
6. Enhanced 3D support
Virtual GPUs were introduced with Horizon 6.1, improving support for workloads requiring 3D acceleration. However, this was limited only to NVIDIA GRID GPUs. The release of Horizon 7 includes increased support for 3D graphics acceleration, no longer limiting us to NVIDIA. Support has expanded to Intel and AMD GPUs. Make sure to check the VMware Compatibility Guide to see the full list of supported GPUs.
7. Tech preview features
VMware mentioned two items that are included with Horizon 7 as a tech preview: Windows Server 2016 support and flash redirection.
Windows Server 2016 may be used as an RDS host, providing remote desktops and hosted applications. However with this release, Windows Universal apps are not supported as hosted remote applications.
Flash redirection is the ability for flash content to be redirected from the virtual desktop to the client so that it may be decoded and rendered locally. The idea is that by using client resources, flash-streaming content will play more smoothly, thus reducing virtual desktop CPU and bandwidth utilization.
Horizon 7 is a pivotal end user computing release for VMware. It offers a more streamlined approach for authentication and access with True SSO and Blast Extreme. Provisioning time is drastically reduced with the use of Instant Clones, manageability is increased with Smart Policies, and Horizon View’s scale is increased with Cloud Pod Architecture.
What are you waiting for? Upgrade today!
Related courses
VMware Horizon 7: Install, Configure, Manage [V7]
from
CERTIVIEW
Essential PowerShell Cmdlets For Managing Hyper-V
from Tom's IT Pro
via CERTIVIEW
CCNA Collaboration Question of the Week: Name, not Number
A user wants their name to show on their phone instead of their number. Which configuration item allows this?
A. Alerting Name
B. Line Text Label
C. External Phone Number Mask
D. Caller Name
E. Description
Answer: B.
Per Cisco: Line Text Label is used only if you do not want the directory number to show on the line appearance. Enter text that identifies this directory number for a line/phone combination.
Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0
Related Certification
CCNA Collaboration
Learn more about Cisco Collaboration training.
CCNA Collaboration Question of the Week Series
- CCNA Collaboration Question of the Week: Cisco Presence Deployment
- CCNA Collaboration Question of the Week: Deploying VoIP
- CCNA Collaboration Question of the Week: Add Multiple Users
- CCNA Collaboration Question of the Week: Name, not Number
from
CERTIVIEW
Friday, 24 June 2016
Free TOSCA Training On Cloud Architecture And Orchestration With Cloudify
from Tom's IT Pro
via CERTIVIEW
Thursday, 23 June 2016
How To Successfully Transition From IT Pro To IT Manager
from Tom's IT Pro
via CERTIVIEW
Voxbone's 'The Workshop' Helps App Developers Test VoIP Tools
from Tom's IT Pro
via CERTIVIEW
Wednesday, 22 June 2016
Building A Business Case For Enterprise Mobility Management (EMM)
from Tom's IT Pro
via CERTIVIEW
Big Switch Updates Big Monitoring Fabric And Big Cloud Fabric
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: TCP/IP Session Hijacking
TCP/IP session hijacking is carried out in which OSI layer?
A. Data Link Layer
B. Transport Layer
C. Network Layer
D. Physical Layer
The correct answer is B.
Transport layer provides accepts a message from the (session) layer above it, splits the message into smaller units (if not already small enough), and passes the smaller units down to the network layer. Transport layer is where the sessions actually take place.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
- CEH v9 Question of the Week: Prevent Future DoS Attacks
- CEH v9 Question of the Week: Same MAC Address
- CEH v9 Question of the Week: XSS Scripting
- CEH v9 Question of the Week: Sniff a Switched Network
- CEH v9 Question of the Week: TCP/IP Session Hijacking
from
CERTIVIEW
Tuesday, 21 June 2016
F5 Networks Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Sysdig's ContainerVision Docker Monitoring Now Works In On-Prem Data Centers
from Tom's IT Pro
via CERTIVIEW
Monday, 20 June 2016
OpenText Continues Buying Binge With HP Document Output, Capture And Discovery Solutions
from Tom's IT Pro
via CERTIVIEW
StorageOS Releases Docker Compatible Storage Platform
from Tom's IT Pro
via CERTIVIEW
Platform9 Managed Kubernetes Simplifies Docker Container Deployment
from Tom's IT Pro
via CERTIVIEW
Docker Engine 1.12 Brings New Orchestration, Deployment, Security Enhancements
from Tom's IT Pro
via CERTIVIEW
CCNA Collaboration Question of the Week: Add Multiple Users
You are looking to add multiple users all at once with Cisco Unified Communications Manager. Which option could you used?
A. Bulk Administration Tool
B. Product Upgrade Tool
C. Command Lookup Tool
D. Cisco Unified Communications Manager User Options Page
E. Cisco Upload Tool
F. Can’t add multiple users at the same time
Answer: A.
The Bulk Administration Tool (BAT), a web-based application, performs bulk transactions to the Cisco CallManager database. BAT lets you add, update, or delete a large number of similar phones, users, or ports at the same time. When you use Cisco CallManager Administration, each database transaction requires an individual manual operation, while BAT automates the process and achieves faster add, update, and delete operations.
Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0
Related Certification
CCNA Collaboration
Learn more about Cisco Collaboration training.
CCNA Collaboration Question of the Week Series
- CCNA Collaboration Question of the Week: Cisco Presence Deployment
- CCNA Collaboration Question of the Week: Deploying VoIP
- CCNA Collaboration Question of the Week: Add Multiple Users
from
CERTIVIEW
Friday, 17 June 2016
Essential PowerShell Cmdlets For Managing Active Directory
from Tom's IT Pro
via CERTIVIEW
CCNP R&S Question of the Week: CPU Spike
Refer to the following access list:
access-list 100 permit ip any any log
After applying the access list on a Cisco router, the network engineer notices that the router CPU has spiked to 99 percent. Why?
A. A packet that matches access-list with the “log” keyword is Cisco Express Forwarding switched.
B. A packet that matches access-list with the “log” keyword is fast switched.
C. A packet that matches access-list with the “log” keyword is process switched.
D. A large amount of IP traffic is being permitted on the router.
Answer: C.
Logging-enabled access control lists (ACLs) provide insight into traffic as it traverses the network or is dropped by network devices. Unfortunately, ACL logging can be CPU intensive and can negatively affect other functions of the network device. There are two primary factors that contribute to the CPU load increase from ACL logging: process switching of packets that match log-enabled access control entries (ACEs) and the generation and transmission of log messages themselves.
Related Courses
ROUTE – Implementing Cisco IP Routing v2.0
SWITCH – Implementing Cisco IP Switched Networks v2.0
TSHOOT – Troubleshooting and Maintaining Cisco IP Networks v2.0
Related Certification
CCNP Routing and Switching
CCNP R&S Question of the Week Series
- CCNP R&S Question of the Week: IPv6
- CCNP R&S Question of the Week: BGP Attribute
- CCNP R&S Question of the Week: Gateway of Last Resort
- CCNP R&S Question of the Week: Routing Protocols into OSPF
- CCNP R&S Question of the Week: BPDU Guard
- CCNP R&S Question of the Week: Private VLANs
- CCNP R&S Question of the Week: Blocking to Forwarding State
- CCNP R&S Question of the Week: FTP to HTTP
- CCNP R&S Question of the Week: Alerts
- CCNP R&S Question of the Week: Configuration Sequence
- CCNP R&S Question of the Week: TCP Traffic
- CCNP R&S Question of the Week: IPv4 and IPv6
- CCNP R&S Question of the Week: clear ip route
- CCNP R&S Question of the Week: IPv6 Traffic Filter Impact
- CCNP R&S Question of the Week: EtherChannel
- CCNP R&S Question of the Week: Interface FastEthernet0/1
- CCNP R&S Question of the Week: Directly Connected CDP Devices
- CCNP R&S Question of the Week: IPsec Modes
- CCNP R&S Question of the Week: Troubleshooting an EIGRP Problem
- CCNP R&S Question of the Week: CPU Spike
from
CERTIVIEW
Thursday, 16 June 2016
7 Most In-Demand Tech Skill Areas For 2016
from Tom's IT Pro
via CERTIVIEW
IBM Teams With Acxiom To Deliver Consumer Analytics Offering
from Tom's IT Pro
via CERTIVIEW
Why Self-Directed Learning Matters in Today’s Cloud-Focused World
As technology continues to shift more and more to the cloud, the mentality of those in charge of dispersing training funds could be following in the same direction.
In the past, spending a week away from the office for training may have been the most viable and possibly the only option. Now times are changing and we’re heading more towards self-directed learning options that include things like online videos, e-learning classes and other digital based features.
More companies are experiencing a cultural shift
Not only are remote workers transforming the way training is delivered, but even non-remote workers are changing how they learn. According to our 2016 IT Skills Salary Report when IT respondents were asked to identify their preferred learning method, they selected classroom training sessions delivered out of the office and self-paced e-learning methods almost equally. Those two choices combined accounted for over 60 percent of responses.
Perhaps, the rise in online training is because managers expect their employees to fit professional development in and around their busy schedules. Or, maybe it’s because students enjoy having more control over when and where they want to learn. Whatever the reason, the shift towards self-directed learning appears to be on the rise.
Today’s worker is on the clock 24 hours
The remote worker is embraced in many organizations, but with that comes more responsibility.
Work doesn’t really end for many now. Vacations get interrupted by cell phones. Most people check their emails and social media on their mobile devices before they go to sleep and as soon as they wake up. And, now that a lot of self-paced training is available on mobile devices, it’s becoming easier and easier to absorb the information whenever and whenever it can be fit in.
So for those with skill gaps or just busy schedules, working around the clock is becoming a norm. One-third of IT respondents to our salary survey indicated they can train only on an ad hoc basis or if a project requires specific skills.
More choices now exist
Take our Microsoft On-Demand digital learning offerings for example. Students can choose between individual courses for three months or an entire collection of courses for 12 months. With the latter choice, project-based training becomes easier. It’s available exactly when you are. When you experience a question or problem – instead of spending time scouring the internet, a student can watch a module on the topic of their choice or experiment in a lab environment or just ask a mentor.
A better bang for your buck
With more and more companies out there promising they can integrate all of your systems together, you can almost guarantee that your competition isn’t using the exact same solutions you are. Which means that training can get pretty specific and specialized. If you are looking to take JBoss training for example, finding a course in your area when you want it, can often prove difficult. But with the Red Hat Learning Subscription, all JBoss courses are at your fingertips.
Whether you are a remote worker or busy employee trying to squeeze in training, it’s likely, regardless of your learning preferences, that at some point you are going to come into contact with self-directed learning.
The new era of self-directed learning combines the power of choice and technology. It will allow you to control the rate at which you learn and define your professional learning experience. You ultimately get to determine your future successes and how to get the best return on the investment of your time and money.
Relevant Courses
Microsoft Total Access Collection
Red Hat Learning Subscription
Cisco Total Access Collection
VMware Learning Zone
from
CERTIVIEW
Wednesday, 15 June 2016
Mobility Management: Blanacing Security With Productivity
from Tom's IT Pro
via CERTIVIEW
Autodesk Updates Forge Developer Platform, Adds New APIs
from Tom's IT Pro
via CERTIVIEW
Mellanox Announces ConnectX-5 Advanced PCIe 4 Compatible NIC
from Tom's IT Pro
via CERTIVIEW
Cisco Intros CCNA Cyber Ops, Offers $10M In IT Security Cert Scholarships
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: Sniff a Switched Network
Martin, a network security auditor, is aware that his company uses a switched network, which cannot be sniffed by some programs without some tweaking. What technique could he use to sniff his agency’s switched network?
A. ARP spoof the default gateway
B. Conduct MiTM against the switch
C. Launch smurf attack against the switch
D. Flood the switch with ICMP packets
The correct answer is A.
In computer networking, ARP spoofing, ARP cache poisoning or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. If Martin can successfully spoofs the default gateway, all the traffic in the network will be routed through his system and the network adapter can listen to all the traffic passing in the network.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
- CEH v9 Question of the Week: Prevent Future DoS Attacks
- CEH v9 Question of the Week: Same MAC Address
- CEH v9 Question of the Week: XSS Scripting
- CEH v9 Question of the Week: Sniff a Switched Network
from
CERTIVIEW
Tuesday, 14 June 2016
MongoDB Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
The Pinkslipbot Is Back, Mobile App Collusion Threats On The Rise
from Tom's IT Pro
via CERTIVIEW
Portworx Takes Care Of Storage For Containers With PX-Enterprise
from Tom's IT Pro
via CERTIVIEW
Monday, 13 June 2016
Essential PowerShell Cmdlets For Auditing And Maintaining Storage
from Tom's IT Pro
via CERTIVIEW
VMware Updates Workspace ONE Remote Application Management Platform
from Tom's IT Pro
via CERTIVIEW
VMware's TrustPoint Combines Endpoint Security And Management
from Tom's IT Pro
via CERTIVIEW
VMware Mobile Security Alliance Expands To CASB Vendors
from Tom's IT Pro
via CERTIVIEW
CCNA Collaboration Question of the Week: Deploying VoIP
Which three network variables that are crucial when deploying VoIP? (Choose three.)
A. Round-trip latency
B. QoS values
C. Bandwidth
D. Ethernet
E. FDDI
F. Token ring
Answer: A, B and C.
Per Cisco, when deploying VoIP, there needs to be ample bandwidth to support the voice calls. Also, the support for QoS markings to prioritize the voice data and signaling. Typically the voice data is marked with a Class of Service (COS) of 5 at layer; IP Precedence of 5 or DSCP value of 46 or EF (Expedited Forwarding) at layer 3. The signaling is typically marked as COS of 3; IP Precedence of 3 or DSCP of 24 or CS3 (Class Selector). The final critical piece is the latency or the delay from end to end. Cisco recommends no more than 150 milliseconds for a one way or 300 milliseconds round trip delay for toll quality voice.
Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0
Related Certification
CCNA Collaboration
Learn more about Cisco Collaboration training.
CCNA Collaboration Question of the Week Series
- CCNA Collaboration Question of the Week: Cisco Presence Deployment
- CCNA Collaboration Question of the Week: Deploying VoIP
from
CERTIVIEW
Friday, 10 June 2016
Free Upgrade To MCSA: Windows Server 2016 And MCSA: SQL Sever 2016
from Tom's IT Pro
via CERTIVIEW
CCNP R&S Question of the Week: Troubleshooting an EIGRP Problem
When troubleshooting an EIGRP problem, you notice that two directly connected EIGRP routers are not forming an EIGRP relationship. A ping shows that the two routers can talk to each other. What is the next item that you should check?
A. Verify that the EIGRP hello and hold timers match.
B. Verify that EIGRP broadcast packets are not being.
C. Verify that EIGRP stub is configured on both routers.
D. Verify that EIGRP is enabled for the appropriate networks.
Answer: D.
OSPF requires that the timers match; EIGRP does not. Also, the stub concept is a local feature to a router and also does not have to match. EIGRP sends to a multicast or unicast, not broadcast. We need to verify that the interfaces interconnecting the two routers are part of the EIGRP process. Use the show ip eigrp interface command to see which interfaces are part of the process.
Related Courses
ROUTE – Implementing Cisco IP Routing v2.0
SWITCH – Implementing Cisco IP Switched Networks v2.0
TSHOOT – Troubleshooting and Maintaining Cisco IP Networks v2.0
Related Certification
CCNP Routing and Switching
CCNP R&S Question of the Week Series
- CCNP R&S Question of the Week: IPv6
- CCNP R&S Question of the Week: BGP Attribute
- CCNP R&S Question of the Week: Gateway of Last Resort
- CCNP R&S Question of the Week: Routing Protocols into OSPF
- CCNP R&S Question of the Week: BPDU Guard
- CCNP R&S Question of the Week: Private VLANs
- CCNP R&S Question of the Week: Blocking to Forwarding State
- CCNP R&S Question of the Week: FTP to HTTP
- CCNP R&S Question of the Week: Alerts
- CCNP R&S Question of the Week: Configuration Sequence
- CCNP R&S Question of the Week: TCP Traffic
- CCNP R&S Question of the Week: IPv4 and IPv6
- CCNP R&S Question of the Week: clear ip route
- CCNP R&S Question of the Week: IPv6 Traffic Filter Impact
- CCNP R&S Question of the Week: EtherChannel
- CCNP R&S Question of the Week: Interface FastEthernet0/1
- CCNP R&S Question of the Week: Directly Connected CDP Devices
- CCNP R&S Question of the Week: IPsec Modes
- CCNP R&S Question of the Week: Troubleshooting an EIGRP Problem
from
CERTIVIEW
Thursday, 9 June 2016
BlackBerry Extends WatchDox Functionality With Salesforce And Rights Management
from Tom's IT Pro
via CERTIVIEW
How To Get The Most Out Of IT Staff Training
from Tom's IT Pro
via CERTIVIEW
Wednesday, 8 June 2016
Top Enterprise Gear For The 802.11ac Wi-Fi Standard
from Tom's IT Pro
via CERTIVIEW
Salesforce Finds New Ways To Build Its Developer Ecosystem
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: XSS Scripting
Which of the following is a countermeasure against XSS scripting?
A. Create an IP access list and restrict connections based on port number
B. Replace “<” and “>” characters with “<” and “>” using server scripts
C. Disable Javascript in IE and Firefox browsers
D. Connect to the server using HTTPS protocol instead of HTTP
The correct answer is B.
Escaping the “<” and “>” characters with HTML entity encoding is the best countermeasure to prevent switching into any execution context, such as script, style, or event handlers.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
- CEH v9 Question of the Week: Prevent Future DoS Attacks
- CEH v9 Question of the Week: Same MAC Address
- CEH v9 Question of the Week: XSS Scripting
from
CERTIVIEW