Skip to content
Pass Microsoft, Cisco, Sap and Salesforce Exams
Menu
  • Home
  • Exams
  • Certifications
  • Cloud Computing
  • Cyber Security
  • Contact Us
  • Log in
  • Sign up
Menu

Author: examcert

Types of Cyber Threats – 100-150 Exam Study Guide

Posted on 2024-09-262024-09-09 by examcert

Types of Cyber Threats (38.1.2) Cyber threats can be classified into different categories, as shown in Table 38-1. This allows organizations to assess the likelihood of a threat occurring and understand the monetary impact of a threat so that they can prioritize their security efforts. Table 38-1 Cyber Threat Categories and Examples Internal vs. External…

Read more

What Did I Learn in This Chapter?-2

Posted on 2024-09-242024-09-09 by examcert

Packet capture and protocol analysis applications enable you to investigate packet content as it flows through the network. The software decodes the protocol layers housed within a packet. Wireshark is an example of a popular open-source packet capture/protocol analysis application. Bandwidth and throughput are characteristics of network data flow. Bandwidth is the theoretical amount of…

Read more

What Did I Learn in This Chapter?-1

Posted on 2024-09-242024-09-09 by examcert

Network baselines are a series of measurements of network performance taken during different types of network usage. The baselines help to understand the parameters of a properly working network so that network performance or security problems can be identified when performance deviates significantly from previous baseline measurements. Cisco Discovery Protocol (CDP) is a Cisco protocol…

Read more

Network Management Systems

Posted on 2024-09-242024-09-09 by examcert

Network Management Systems (37.6.5) Network management refers to two related concepts. First is the process of configuring, monitoring, and managing the performance of a network. Second is the platform that IT and network operations teams use to complete these tasks. Modern network management platforms provide advanced analytics, machine learning, and intelligent automation to continually optimize…

Read more

Understanding VPNs – 100-150 Exam Study Guide

Posted on 2024-09-232024-09-09 by examcert

Understanding VPNs (37.6.4) To securely communicate and share resources over a network that is not secure, such as the Internet, a Virtual Private Network (VPN) is used. The most common types of VPN are used to access a corporate private network either by remote users or by remote corporate sites. A VPN uses dedicated secure…

Read more

Cybersecurity Threats, Vulnerabilities, and Attacks

Posted on 2024-09-232024-09-09 by examcert

ObjectivesUpon completion of this chapter, you will be able to answer the following questions: Key TermsThis chapter uses the following key terms. You can find the definitions in the Glossary.Infrastructure as a Service (IaaS)Platform as a Service (PaaS)Software as a Service (SaaS)threat domain Introduction (38.0)It’s Webster again! The college help desk gets support tickets for…

Read more

Remote Access with Telnet, SSH, and RDP

Posted on 2024-09-232024-09-09 by examcert

Remote Access with Telnet, SSH, and RDP (37.6.2) Long before desktop computers with sophisticated graphical interfaces existed, people used text-based systems, which were often just display terminals physically attached to a central computer. After networks became available, people needed a way to remotely access computer systems in the same manner that they did with the…

Read more

Troubleshoot Connectivity Remotely

Posted on 2024-09-222024-09-09 by examcert

Troubleshoot Connectivity Remotely (37.6) Quite often the issue is in a remote location. This section discusses the tools at your disposal to help you support remote users and troubleshoot problems from a distance. Supporting Remote Users (37.6.1) When assisting remote users, it is often not efficient to verbally walk a user through complicated procedures. Remote-access…

Read more

Packet Capture and Protocol Analysis

Posted on 2024-09-222024-09-09 by examcert

Packet Capture and Protocol Analysis (37.5.2) Protocol analyzers can investigate packet content while flowing through the network. A protocol analyzer decodes the various protocol layers in a recorded frame and presents this information in a relatively easy-to-use format. As a technician, you may be tasked to capture traffic from a specific host. Therefore, it is…

Read more

Troubleshoot a Network – 100-150 Exam Study Guide

Posted on 2024-09-212024-09-09 by examcert

Troubleshoot a Network (37.5) There are many tools that can help you determine the cause and scope of problems affecting the network. This section introduces you to some of those tools and commands. Network Devices as Sources of Network Information (37.5.1) When documenting or diagnosing a network problem, it is often necessary to gather information…

Read more
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 40
  • Next

Categories

  • 100-150 Study Course
  • AWS Study Course
  • AZ-104 Study Course
  • Certified Advanced Salesforce Admin
  • Cisco Study Course
  • CLF-C02 Study Course
  • Google
  • Google Associate Cloud Engineer
  • Microsoft Study Course
  • Salesforce
  • Study Course
© 2024 Zeusexam, Inc. All rights reserved. | Privacy Statement | Terms of Use | Use of Cookies | Trust | Accessibility | Cookie Preferences | Your Privacy Choices