By: Ali Jahangiri
Publisher: Dr. Ali Jahangiri
Publication Date: July 2010
Reviewed by: Mike Feld
Review Date: September 2010
Dr. Ali Jahangiri has written several books in the realm of computer security. With his background in information technology and network security as well as extensive experience leading workshops in various computer related fields, these books have proven valuable to those wishing to increase their knowledge of key network-related topics. Jahangiri’s latest work, CEH Exam Self Assessment, is a follow-up to 2009’s Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts.
The CEH Exam Self Assessment book is written as a companion text for those taking the Certified Ethical Hacker course. There are 260 questions, each with several possible answers, given as multiple choice. Below the answer choices, is the correct answer(s). Note that with a few exceptions, explanations are not provided. Explains the author, “…this book and its contents will not help the candidates who just want to pass the exam without attending the training program.” This book is meant for those who have attended the training program.
As is the case with Dr. Jahangiri’s earlier books, he chooses example questions that will be relevant to system administrators and technicians responsible for overall IT security. Of particular note are the many questions that deal with Microsoft Active Directory integration, external and internal DNS, and details of TCP negotiations. This last point is of note. A clear understanding of TCP negotiation (as shown in questions 176 and 102) is essential for the detection and remediation of many of today’s more sophisticated network hacks.
On more than one occasion I have had to deal with man-in-the-middle attacks on my customers' networks. Dr. Jahangiri provides a number of example questions that the reader will find extremely useful in clearly understanding this type of attack. Although this book is intended as an aid to passing the CEH exam, it can be used as a quick check on a system administrator or security technician’s network security knowledge. I have actually used this book for such a purpose and found that some of my IT staff could use a bit more training!
Quill says: Add this book to your IT administration and security management library!
For more information on CEH Exam Self Assessment: Sample Questions and Answers for Certified Ethical Hacker (CEH) Exam, please visit the author's website at: AliJahangiri.org
Disclosure in Accordance with FTC Guidelines 16 CFR Part 255
Copyrights © 2023 Feathered Quill Reviews All Rights Reserved. | Designed & Developed by Unglitch.io