LSagee wrote: »
You most definitely need to know the formulas. I only had one Linux question and it was super easy. You didn't even need to know Linux to understand what it was asking. Make sure you have a good understanding about what the appliances / devices do to block attacks and where they should be placed within a network. I can almost guarantee you will see a time consuming PBQ (I had two) on your test about that.
apisky4 wrote: »
I ended up rescheduling to the 22nd of October and purchasing cybrary transcenders.
I am doubling back on the labs in the Sybex book, attacks and mitigation strategies, stream vs block, risk management formulas, protocol analyzers vs vulnerability scanners, Linux commands, and symmetric vs asymmetric.
Hoping to get it this time so I can take the project + between November-December and then finish up my Bachelors in January. Fingers crossed.
rneupane1 wrote: »
Thanks for the heads-up. Are there two questions about devices blocking attacks on the network or just one?
shochan wrote: »
I always need an analogy when studying for these certs...
How I differentiated between (S)ymmetric = (S)ame key & Asymmetric (opposite of same, meaning 2 keys - encrypt/decrypt)...hope that helps.
On the algorithms, distinguishing between those...
With Symmetric - I found the ones that end in "S" are no brainer - like AES, 3DES, DES...and since "R" is next to "S" in alphabet then you know RC4/5 are symmetric too, I haven't figured out an analogy for the Fish alg (Blowfish/TwoFish)...
With Asymmetric - I found the ones ending in "A" - Like RSA, DSA are easy to remember...but ECC is one that is difficult to distinguish - except R(A)M in servers.
If anyone else has any pointers, feel free to jump in!