CEH
Understanding Network Devices 39 You must familiarize yourself with all the ports mentioned here if you are to master the exam a ...
40 Chapter 2 ■ System Fundamentals that routers connect networks and that switches simply create multiple broadcast domains. Yes ...
Working with MAC Addresses 41 broken down into a six-pair hexadecimal value—for example, c0-cb-38-ad-2b-c4. The first half of th ...
42 Chapter 2 ■ System Fundamentals With the explosion of wireless routers and switches that have flooded the market in the last ...
Intrusion Prevention and Intrusion Detection Systems 43 Firewalls The firewall category includes proxy firewalls; however, becau ...
44 Chapter 2 ■ System Fundamentals network activity without negatively impacting the operation of the network as a whole. The ob ...
Network Security 45 Now that we’ve pushed past the basic vulnerabilities of our homegrown residential wire- less setup, let’s di ...
46 Chapter 2 ■ System Fundamentals As you can see, there are layers of protection to keep unauthorized visitors from perus- ing ...
Knowing Operating Systems 47 ■ Attempts at consumer friendliness have been a tough road for Microsoft. What this means is most i ...
48 Chapter 2 ■ System Fundamentals ■ A primary concern among Mac users, and a benefit to the hacking community, is the Mac owner ...
Summary 49 Backups and Archiving Backing up data is essential to the survival and continuation of integral operations. Anyone in ...
50 Chapter 2 ■ System Fundamentals The OSI model is an industry standard for data communication. It is broken into seven layers: ...
Review Questions 51 Review Questions At which layer of the OSI model does a proxy operate? A. Physical B. Network C. Data link ...
52 Chapter 2 ■ System Fundamentals Hubs operate at what layer of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 Wha ...
Review Questions 53 An administrator has just been notified of irregular network activity; what appliance func- tions in this m ...
54 Chapter 2 ■ System Fundamentals You have selected the option in your IDS to notify you via e-mail if it senses any network i ...
Cryptography CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER: ✓ III. Security ■ D. Cryptography ✓ IV. Tools/Systems/Programs ■ C. Ac ...
This chapter covers cryptography, a topic and body of knowl- edge that you will encounter over and over again during your career ...
Cryptography: Early Applications and Examples 57 evolved dramatically over time, but its underlying goal has never changed, thou ...
58 Chapter 3 ■ Cryptography The pictograms served as a way to illustrate the life story of the deceased of royal and noble desce ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf