Friday, 29 July 2016
BlackBerry BES12.5 Multi-OS Mobile Device Management Review
from Tom's IT Pro
via CERTIVIEW
CCNP Data Center Question of the Week: Connecting Multiple Data Centers
Which protocol is optimized for connecting multiple data centers together?
A. LISP
B. OTV
C. FabricPath
D. vPC
Answer: B.
Per Cisco: OTV introduces the concept of “MAC routing,” which means a control plane protocol is used to exchange MAC reachability information between network devices providing LAN extension functionality. This is a significant shift from Layer 2 switching that traditionally leverages data plane learning, and it is justified by the need to limit flooding of Layer 2 traffic across the transport infrastructure. As emphasized throughout this document, Layer 2 communications between sites resembles routing more than switching. If the destination MAC address information is unknown, then traffic is dropped (not flooded), preventing waste of precious bandwidth across the WAN.
OTV also introduces the concept of dynamic encapsulation for Layer 2 flows that need to be sent to remote locations. Each Ethernet frame is individually encapsulated into an IP packet and delivered across the transport network. This eliminates the need to establish virtual circuits, called Pseudowires, between the data center locations. Immediate advantages include improved flexibility when adding or removing sites to the overlay, more optimal bandwidth utilization across the WAN (specifically when the transport infrastructure is multicast enabled), and independence from the transport characteristics (Layer 1, Layer 2 or Layer 3).
OTV provides a native built-in multi-homing capability with automatic detection, critical to increasing high availability of the overall solution. Two or more devices can be leveraged in each data center to provide LAN extension functionality without running the risk of creating an end-to-end loop that would jeopardize the overall stability of the design. This is achieved by leveraging the same control plane protocol used for the exchange of MAC address information, without the need of extending the Spanning-Tree Protocol (STP) across the overlay.
Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0
Related Certification
CCNP Data Center
CCNP Data Center Question of the Week Series
- CCNP Data Center Question of the Week: Cisco Technology
- CCNP Data Center Question of the Week: Aggregation Layer
- CCNP Data Center Question of the Week: Connecting Multiple Data Centers
from
CERTIVIEW
Thursday, 28 July 2016
Scrum Alliance Certification Guide: Overview and Career Paths
from Tom's IT Pro
via CERTIVIEW
Wednesday, 27 July 2016
Cybersecurity Professionals Shortage Leaves Businesses Vulnerable
from Tom's IT Pro
via CERTIVIEW
Mobile Device Management: What’s Legal, What’s Not?
from Tom's IT Pro
via CERTIVIEW
How to Use the Microsoft PowerShell Cmdlets Utility Module
from Tom's IT Pro
via CERTIVIEW
CEH v9 Question of the Week: Password Cracking Tool
Johnny is a member of the hacking group Orpheus1. He is currently working on breaking into the Department of Defense’s front end Exchange Server. He was able to get into the server, located in a DMZ, by using an unused service account that had a very weak password that he was able to guess. Johnny wants to crack the administrator password, but does not have a lot of time to crack it. He wants to use a tool that already has the LM hashes computed for all possible permutations of the administrator password.
What tool would be best used to accomplish this?
A. SMBCrack
B. RainbowTables
C. SmurfCrack
D. PSCrack
The correct answer is B.
A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a plaintext password up to a certain length, consisting of a limited set of characters.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
- CEH v9 Question of the Week: Prevent Future DoS Attacks
- CEH v9 Question of the Week: Same MAC Address
- CEH v9 Question of the Week: XSS Scripting
- CEH v9 Question of the Week: Sniff a Switched Network
- CEH v9 Question of the Week: TCP/IP Session Hijacking
- CEH v9 Question of the Week: Firewall Traffic
- CEH v9 Question of the Week: Full TCP connection
- CEH v9 Question of the Week: Password Cracking Tool
from
CERTIVIEW
Tuesday, 26 July 2016
Pokemon Go is Endangering Your Company’s Security
from Tom's IT Pro
via CERTIVIEW
BlackBerry Reveals 'World's Most Secure Android Phone'
from Tom's IT Pro
via CERTIVIEW
Finally, Windows 10 MCSA Is Coming Together
from Tom's IT Pro
via CERTIVIEW
Monday, 25 July 2016
How to Deploy a Docker Container in Windows Server 2016
from Tom's IT Pro
via CERTIVIEW
How to Validate Windows Server 2016 with Pester
from Tom's IT Pro
via CERTIVIEW
Windows 10 Anniversary Update: Best New Features
from Tom's IT Pro
via CERTIVIEW
Best Free Prep Materials for Certified Ethical Hacker
from Tom's IT Pro
via CERTIVIEW
Friday, 22 July 2016
How to use the IIS Administration PowerShell Cmdlets Server 2016
from Tom's IT Pro
via CERTIVIEW
Outdated Tech Could Kill Your Company
from Tom's IT Pro
via CERTIVIEW
Thursday, 21 July 2016
How To Become a Certified Information Systems Security Professional (CISSP)
from Tom's IT Pro
via CERTIVIEW
How to Use the New FileShare PowerShell Cmdlets in Server 2016
from Tom's IT Pro
via CERTIVIEW
Wednesday, 20 July 2016
Microsoft Now Offers a Professional Degree Program Online
from Tom's IT Pro
via CERTIVIEW
8 Free Computer Forensics Training Resources For IT Pros
from Tom's IT Pro
via CERTIVIEW
Tuesday, 19 July 2016
How to Test Windows Server 2016 in Azure
from Tom's IT Pro
via CERTIVIEW
Monday, 18 July 2016
5 Tips for Mentoring IT Employees
from Tom's IT Pro
via CERTIVIEW
Friday, 15 July 2016
How To Become A White Hat Hacker
from Tom's IT Pro
via CERTIVIEW
CCNP Data Center Question of the Week: Aggregation Layer
Which three are characteristics of the aggregation layer of a Cisco Data Center Unified Fabric network? (Choose three.)
A. no packet filtering
B. QoS – policing
C. Voice, data, and wireless convergence
D. Scalable routing protocols
E. Provides redundant default gateways using FHRP
F. QoS – classification and queuing
G. Routing manipulation and filtering
H. Aggregates end users
Answer: B, E and G.
Cisco recommends a three layered model for the data Center, for scalability and reliability. The three layers are Access, Aggregation and Core. The aggregation layer is the L3 and L2 boundary for the data center infrastructure. In common designs, the aggregation layer is also the connection point for data center firewalls and other services. Thus, it consolidates L2 traffic in a high-speed packet switching fabric and provides a platform for network- based services at the interface between L2 and L3 in the data center. Typically, the aggregation layer is made up of two or more switches and is the demarcation point for the VLANs facing into the access layer and the path into the core. This is where we would run our FHRP (like HSRP or VRRP); routing and layer 3 filtering would be applied; and where QoS policy would be applied.
Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0
Related Certification
CCNP Data Center
CCNP Data Center Question of the Week Series
- CCNP Data Center Question of the Week: Cisco Technology
- CCNP Data Center Question of the Week: Aggregation Layer
from
CERTIVIEW
Thursday, 14 July 2016
How to Remotely Manage a Nano Server
from Tom's IT Pro
via CERTIVIEW
Wednesday, 13 July 2016
Buying Into VMware Education
from Tom's IT Pro
via CERTIVIEW
Tuesday, 12 July 2016
How to Apply Windows Updates to Nano Server
from Tom's IT Pro
via CERTIVIEW
How To Install Nano Server In Windows Server 2016
from Tom's IT Pro
via CERTIVIEW
3 Steps for Implementing Business Analysis
Implementing business analysis (BA) in organizations needs to be done in a well-planned process. The three steps are contingent on the BA maturity of the organization, its vision for how BA will be used and the degree of executive sponsorship.
During Step 1, you’ll identify the members of the primary group. This group will be principally responsible for business analysis and will be given initial training on the skills, techniques, methodologies and knowledge needed to implement BA. Training will include the International Institute of Business Analysis’ best practices model, benchmarked methods, history, quality and continuous improvement methods. Step 2 consists of training the rest of your personnel and Step 3 is when BA will be applied.
Step 1: Determining the organizational vision and primary group
The first question that needs to be answered is, “What does BA mean in this organization?” Executives need to define the vision that will become the basis for the entire BA program and it needs to be given necessary time to develop. Without a strong vision that has full executive support, business analysis will only be a mantra and will never be fully accepted, implemented or maintained. It will not survive in the long run.
Next, the BA primary group will be picked, and a location for where they will “live” needs to be decided on. It is usually a good idea to place the BA group in an area of the organization that easily reaches to all departments and who report to a senior executive. Ultimately, the BA group should be permanent staff and made-up of individuals with varying levels of experience and expertise. This provides those with less experience the opportunity to develop and those with more experience with the possibility to eventually take on more of a leadership role. The BA team members’ roles must also be defined both at the group level, as mentioned in the overview, and within the BA unit.
Step 2: Training
The training phase essentially needs to consist of a core curriculum and additional training as necessary. Although needs vary from organization to organization, it has been found that these three basic types of training work well:
- An orientation or awareness program that introduces the concepts of BA
- A skills-building program that enables members to collect/elicit and analyze data, apply quantitative and qualitative measures to requirements and work processes, and create improvements.
- Programs that help to clarify new roles and expectations and provide employees with the essential tools and techniques for implementing a more supportive and participative environment. Examples include leadership and communication, conflict resolution skills and so on.
Training delivery should begin with giving senior managers a one-hour to a half-day orientation of the BA program, and repeating the orientation throughout the organization. Since the BA group will eventually interact with all elements in the organization, it becomes imperative that everyone understands the program and its objectives and methodology.
Providing real-time information is also a good way to decrease any resistance and increase acceptance. In the absence of this real-time information, individuals and groups will make assumptions that may or may not be correct. It is strongly suggested that the training be provided to work groups, since this allows the groups to discuss their own unit’s mission, discover improvement opportunities and to identify any barriers that might impede their progress. Possible training includes:
Orientation training
Orientation training introduces participants to the business analysis process. This training will ensure an understanding of the organization’s mission, vision, values and objectives related to BA. Participants will form an understanding of their roles for contributing to ongoing process improvement. Next, the orientation explains the background and concepts, the state of BA, why the company is investing in business analysis, and the general approach and methodology. A final objective of the orientation is to make sure that employees know what is expected of them and what they can expect from the new function.
Requirements, process identification and analysis training
Requirements, process identification and analysis training enables participants to begin applying the tools of business analysis as soon as they return to their jobs. This training should emphasize techniques for identifying internal and external customers / stakeholders, performing enterprise analysis, eliciting and writing requirements, modeling processes, validation and verification, and building an understanding of team and stakeholder expectations.
Process improvement training
The emphasis here is on “putting it all together” using a systematic model. This is where participants receive the tools, techniques and methodologies for improvement and opportunities to practice. They include modeling the “as is,” state evaluating the processes using the elicited requirements and success criteria, modeling the “to be” state and presenting the completed analysis.
In addition to the above steps, the training on the following subjects may be included:
- Project management
- Statistical quality control
- Leadership and communication
- Problem solving
Step 3: Implementation
Training needs to be followed by the application of newly acquired skills or the training investment will be lost. Application needs to begin as soon as the training is complete so the information and skills learned are reinforced and do not have time to disintegrate. Immediate practice also reinforces the organization’s commitment to BA. Work on this project should begin when employees return to the workplace. Four criteria should be used in the selection of initial projects:
- Importance: The process is important to the organization and its employees. Successful completion will yield a measurable and clearly visible improvement for the organization.
- Feasibility: The process can be worked on by the organization and employees have the necessary skills, resources, and abilities to successfully complete the project in a reasonable period of time (usually less than six months).
- Energizing: The project is of inherent interest and employees are stakeholders.
- Ownership: The process owner is sponsoring the project. Others who have a stake in the project, but are not directly involved, are kept informed by the team.
In summary, implementing BA needs to be handled like any other change management project. It needs to be planned, organized and deployed thoughtfully.
Need help implementing your BA solution? See our complete business analysis training portfolio.
from
CERTIVIEW
Monday, 11 July 2016
Why Small Businesses Must Regulate Mobile Devices
from Tom's IT Pro
via CERTIVIEW
How To Become A Cloud Architect
from Tom's IT Pro
via CERTIVIEW
CCNA Collaboration Question of the Week: Jabber
A new user has registered Cisco Jabber. Which option verifies that the Jabber client is connected to all appropriate systems?
A. Show Connection Status
B. Report A Problem
C. Advanced Settings
D. About Jabber
E. Reset Jabber
Answer: A.
The Help>Show Connection Status> will show you the current status of all the back end systems that Cisco Jabber is connected to.
Related Courses
CICD – Implementing Cisco Collaboration Devices
CIVND2 – Implementing Cisco Video Network Devices v1.0
Related Certification
CCNA Collaboration
Learn more about Cisco Collaboration training.
CCNA Collaboration Question of the Week Series
from
CERTIVIEW
Friday, 8 July 2016
Building A Business Case For Data Loss Prevention (DLP) Tools
from Tom's IT Pro
via CERTIVIEW
EMM Use Cases: What Mobility Success Looks Like for You
from Tom's IT Pro
via CERTIVIEW
CCNP Data Center Question of the Week: Cisco Technology
Which technology sets Cisco apart from other vendors in a data center?
A. NPV
B. NPIV
C. VSANs
D. FCoE
Answer: C.
Cisco Systems designed VSANs modelled after the virtual local area network (VLAN) concept in Ethernet networking, but applying the idea to a storage area network. In October 2004 the Technical Committee T11 of the International Committee for Information Technology Standards approved VSAN technology as a standard of the American National Standards Institute (ANSI).
Related Courses
DCUCI – Data Center Unified Computing Implementation v5.0
DCUFI – Implementing Cisco Data Center Unified Fabric v5.0
DCUCD – Designing Cisco Data Center Unified Computing v5.0
DCUFD – Designing Cisco Data Center Unified Fabric v5.0
DCUCT – Troubleshooting Cisco Data Center Unified Computing v5.0
DCUFT – Troubleshooting Cisco Data Center Unified Fabric v5.0
Related Certification
CCNP Data Center
CCNP Data Center Question of the Week Series
- CCNP Data Center Question of the Week: Cisco Technology
from
CERTIVIEW
Wednesday, 6 July 2016
CEH v9 Question of the Week: Full TCP connection
Which type of scan opens a full TCP connection?
A. TCP Connect Scan
B. FIN Scan
C. SYN Scan
D. RST Scan
The correct answer is A.
TCP connect() scanning is the most basic form of TCP scanning. The connect() system call provided by your operating system is used to open a connection to every interesting port on the target machine. It completes the whole SYNàSYN-ACKàACK handshake process. FIN and RST scanning, on the other hand, sets just the TCP FIN and RST bit. SYN scan is also known as half-open scanning.
Related Course
Certified Ethical Hacker v9
CEH v9 Question of the Week Series
- CEH v9 Question of the Week: Retina Scanners
- CEH v9 Question of the Week: Employee Behavior
- CEH v9 Question of the Week: CVE-2007-2447
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Web Application Penetration Testing
- CEH v9 Question of the Week: iptables
- CEH v9 Question of the Week: Examine Streams of Packets
- CEH v9 Question of the Week: Scans
- CEH v9 Question of the Week: SQL Injection
- CEH v9 Question of the Week: Standard Risk Assessment
- CEH v9 Question of the Week: Penetration Testing
- CEH v9 Question of the Week: SMB Over TCP/IP
- CEH v9 Question of the Week: Block Cipher
- CEH v9 Question of the Week: Prevent Future DoS Attacks
- CEH v9 Question of the Week: Same MAC Address
- CEH v9 Question of the Week: XSS Scripting
- CEH v9 Question of the Week: Sniff a Switched Network
- CEH v9 Question of the Week: TCP/IP Session Hijacking
- CEH v9 Question of the Week: Firewall Traffic
- CEH v9 Question of the Week: Full TCP connection
from
CERTIVIEW
Tuesday, 5 July 2016
How To Become A Chief Information Security Officer (CISO)
from Tom's IT Pro
via CERTIVIEW
Friday, 1 July 2016
Pluralsight Ups The Bar For Online IT Training With Live Mentoring
from Tom's IT Pro
via CERTIVIEW