Compare cert salaries and plan your next career move
earweed wrote: » About time you've decided to schedule it.lol
phoeneous wrote: » Im thinking of doing the same, havent studied in a week....
knwminus wrote: » Ouch guys You should man. We could totally double up on blog post and cover all of the objectives lol
Devilsbane wrote: » I've also been tempted to change it. I went to wefest last Wednesday and just got home last night. Without giving too many details, I only got drunk once. (Lasted from Wednesday afternoon to Sunday morning). So now I'm feeling very behind. I'm still working on Darril's book, have half the train signals, and I've taken 1 Transcender. 3 nights studying from the moment I get home is still only 12 hours of study and to complete everything I'll likely need more
earweed wrote: » Why don't all 3 of you shoot for the 28th? You can IM each other while you're celebarting your new certs and getting
Devilsbane wrote: » I refuse to bump it back. I might not be prepared as I would like to be, but I have confidence that I'll pass. Plus I already have the time off work. August 12th it is.
phoeneous wrote: » Good luck tomorrow, I'm sure you'll pass. I'm opening a new branch office so I get to configure the network gear, server, and workstations all by myself. Not much time to study.
knwminus wrote: » I think he is going to beat us dude
Devilsbane wrote: » Yeah, but I'm also going to copy down all of the answers like we talked about.
knwminus wrote: » You know I can't read
Devilsbane wrote: » Getting grilled by Transcender right now. Maybe this isn't going to go so hot. 70% is the best that I have done so far...
phoeneous wrote: » Haha too late though right? It's under 24 hours. Sink or swim Dbane
xSequentialx wrote: » From my notes (think straight from sybex book)
Devilsbane wrote: » Thanks for all of the definitions. I think only two or three of these were in Darril's book. Or maybe I just missed them. I need to collect all of my notes tonight and assemble them in a format that I can read through, right now they are spead out through several .txt files and even a couple sheets of notebook paper.
xSequentialx wrote: » From my notes (think straight from sybex book) Armoured Virus - designed to make itself difficult to detect or analyze. Cover themselves with protective code that stops debuggers or disassemblers from examining critical elements of the virus. Some aspects of the programming act as a decoy to distract analysis while the actual code hides in other areas in the program. The more time it takes to deconstruct, the longer it can live, meaning the more time it has to replicate. Companion Virus - attaches itself to legitimate programs and then creates a program with a different filename extension. When a user types the name of the legitimate program, the companion virus executes instead of the real program, effectively hiding the virus from the user. Macro Virus - exploits the enhancements made to many application programs. They can infect all the documents on your system and spread to other systems via email or other methods. Multipartite Virus - attacks your system in multiple ways in the hope that you won't be able to correct all the problems and will allow the infestation to continue. Phage Virus - modifies and alters other programs and databases, infecting all the files. The only way to remove this virus is to reinstall the programs that are infected. If you miss even a single incident of this virus, the process will start again and infect the system once more. Polymorphic Virus - change form in order to avoid detection. It will attempt to hide from your antivirus software by encrypting parts of itself to avoid detection. When it does this it's referred to as mutation.Retrovirus - attacks or bypasses the antivirus software installed on a computer. They can directly attack your antivirus software and potentially destroy the virus definition database file. Stealth Virus - attempts to avoid detection by masking itself from applications. It may attach itself to the boot sector of the hard drive. When a system utility or program runs, the stealth virus redirects commands around itself in order to avoid detection. They can also move themselves from fileA to fileB during a virus scan. Good luck with the test 2moro
DoubleD wrote: » do you need to know about them for the test? is it like they will come up?
phoeneous wrote: » If we knew what was on the test, we would all get 100%. You should know them just to know them.
Devilsbane wrote: » .r.... it helps to take a test when you know how to read. ...
Plantwiz wrote: » Thanks, I needed a good laugh tonight!
Compare salaries for top cybersecurity certifications. Free download for TechExams community.