O'Reilly logo

CCNA Cyber Ops SECOPS - Certification Guide 210-255 by Andrew Chu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Questions

  1. If one of the devices in the network has an address of 10.114.115.55/24, which regex string would represent any address in the network?
    1. 10.114.115.55
    2. 10\.114\.115\.\d{0,3}
    3. 10\.114\.d{0.3}\.\d{0,3}
    4. 10.\D{0,3}\.D{0.3}\.\D{0,3}

The following three questions are related to the scenario and the following screenshot.

syslog in Linux (/var/log/syslog) captures information about a range of different activities. The following edited log has extracted some of the events between 22:52 and 22:59 on February 2nd:

  1. An analyst suspects that a piece of malware has amended cron—the Linux task scheduler—in order to run itself. How could the analyst ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required