CCNP Data Center Question of the Week: Scalability in OTV

Which statement about scalability in OTV is true? A. The control plane avoids flooding by passing MAC reachability information. B. IP-based functionality provides Layer 3 extension over any transport. C. Any encapsulation overhead is avoided by using IS-IS. D. Unknown unicasts are handled by the authoritative edge device.   Related Courses DCUCI – Data Center […]

Read more

CEH v9 Question of the Week: Password Attack Method

Kelly is a network security officer for a large state-run agency in California. Kelly is asked by the IT manager of another state agency to perform a security audit on their network. This audit she is asked to perform is an external audit. The IT manager thought that Kelly would be a great candidate for this task since she does not work for this other agency and is an accomplished IT auditor. The first task that she is asked to perform is an attempt to crack user passwords. Since Kelly knows that all state agency passwords must abide by the same password policy, she believes she can finish this particular task quickly. What is the best password attack method for Kelly to use in this situation?

Read more

How to Incorporate Social Learning into the Classroom

There’s been a lot of talk about social learning, yet most of what has been shared involves online or blended learning. Why not social learning in the classroom? Many of the recent instructor-led training (ILT) trends have elements of social learning. Below are at least four ways to incorporate social learning into the classroom.

Read more