CompTIA Network+ Command Line Interface Tools

Posted filed under CompTIA Network+.

Traceroute – A command-line troubleshooting tool that enables you to view the route to a specified host. This will show how many hops the packets have to travel and how long it takes. In Windows operating systems, the command used is “tracert”.

CompTIA Security+ Protocols

Posted filed under CompTIA Security+.

SNMP: It (SNMP) is a mainstream convention for system administration. It is utilized for gathering data from, and designing, system gadgets, for example, servers, printers, centers, switches, and switches on an Internet Protocol (IP) system.

CISSP Access Control Models

Posted filed under CISSP.

Data access controls are established to control how subjects can access data, what they can access with it, and what they can do with it once accessed. Three primary types of access control are discussed in this section.     Mandatory Access Control (MAC)

CISSP Legal Systems

Posted filed under CISSP.

The two law systems that form the basis of legal systems in most countries are:

CISSP Kerberos

Posted filed under CISSP.

Kerberos is a network authentication protocol created by the Massachusetts Institute of Technology (MIT) that uses secret-key cryptography. Kerberos has three parts: a client, server, and trusted third party (KDC) to mediate between them.

CISSP Attacks

Posted filed under CISSP.

Types of Attacks Denial of Service (DoS) Smurf Fraggle SYN Flood Teardrop Distributed Denial of Service (DDoS) Ping Sweep Port Scan Salami attack Man-in-the-Middle Session or TCP Hijacking Replay Buffer Overflow Scareware and Ransomeware Password attack Covert channels  Web Attacks SQL Injection – An injection of SQL query through input data from client to application (database)…. Read more »

CISSP Asymmetric Systems

Posted filed under CISSP.

CISSP algorithms

Asymmetric Systems –Uses a pair of keys (private and public) for encryption and decryption

Cisco CCNA Extended Access List

Posted filed under Cisco CCNA.

Cisco extended Access list

Follow @ASM_Educational Cisco CCNA-Extended access list In this Lab we will cover the concept of Extended ACL , make sure read another blogs about Standard ACL .

Cisco CCNA Video Training- DHCP Server

Posted filed under Cisco CCNA.

Follow @ASM_Educational In this lab we are trying to make our Cisco Router Act as a DHCP server , that is R1 will give ip address to left side Pc and it will give the IP address to right side of PC. The Goal is Prepare you for your Cisco CCNA Certification exam.

CompTIA A+ Authentication

Posted filed under CompTIA A+.

Authentication : The verification of a person’s identity – Helps protect against unauthorized access.

CompTIA A+ Storage Devices

Posted filed under CompTIA A+.

PATA HDD connector

Hard Disk Drives are nonvolatile (meaning they don’t lose data when power off) devices that store data, generally 3.5”. Types of HDD include:


Posted filed under CompTIA A+.

RAID stands for Redundant Array of Inexpensive Disks. RAID 0  is striping, RAID 1  is mirroring , RAID 5  is striping with parity, RAID 10  is mirrored sets in a striped set. RAID 0  is not fault-tolerant. If RAID 1 uses two disk controllers, it is disk duplexing.             Short… Read more »

CompTIA A+ Sound cards

Posted filed under CompTIA A+.


Sound cards connect as x1 PCIe or PCI cards and normally have PC 99 color-coded 1/8” mini-jacks for I/O and speakers, and optical I/Os known as S/PDIF (example: TOSLINK).   Alternatively referred to as an audio output device, sound board, or audio card. A sound card is an expansion card or IC for producing sound… Read more »

CompTIA A+ Video cards

Posted filed under CompTIA A+.

CompTIA video card

Video cards connect to motherboards by way of x16 PCIe (most common, typically black), AGP (brown), or PCI (white) expansion slots.


Posted filed under CompTIA A+.


The Central Processing Unit (CPU) or processor takes care of all calculations.

CompTIA A+ Motherboards

Posted filed under CompTIA A+.

Motherboards – Connect everything together. Typical form factors include ATX (most common), microATX, ITX, and BTX.

CCNP Port Security

Posted filed under Cisco CCNP.

  In order to Prevent Man-In-Middle Attack we will use Port Security (for Example to secure Port f0/3)  


Posted filed under Blog.

Search our blog. Welcome to ASM Blogs . For your convenience we offer the Exam cram and Tips  in different formats. Please feel free to contact us about our blogs or courses Notes & Cisco CCNA Exam Notes & Tips Cisco CCNP Exam Notes & Tips Juniper JNCIA Exam Notes & Tips CompTIA A+ Exam Notes &… Read more »