Cisco CyberOps Associate CBROPS 200-201_ Official Cert Guide by Omar Santos

Cisco CyberOps Associate CBROPS 200-201_ Official Cert Guide by Omar Santos

Author:Omar Santos
Language: eng
Format: mobi
Publisher: Cisco Press
Published: 1999-12-31T16:00:00+00:00


Coordination Center

All of these answers are correct.

11. Source and destination IP addresses are usually shown in NetFlow records and security events. What other artifacts are part of NetFlow records? (Select all that apply.)

Destination ports

Usernames

IPS Signature IDs

Source ports

12. Which of the following are artifacts that are usually shown in IDS and IPS events? (Select all that apply.)

Signature IDs

Passwords

PII

Source and destination IP addresses

13. You are responding to a security incident and collected logs from a Linux system. You notice that there are thousands of entries in /var/log/auth.log, but you need to filter out valid connections and display only invalid user entries. The following example shows a few of the log entries:

Click here to view code image

Apr 8 04:17:01 us-dev1 CRON[3754]: pam_unix(cron:session): session opened for user root by (uid=0) Apr 8 04:17:01 us-dev1 CRON[3754]: pam_unix(cron:session): session closed for user root Apr 8 05:17:01 us-dev1 CRON[3808]: pam_unix(cron:session): session opened for user root by (uid=0) Apr 8 05:17:01 us-dev1 CRON[3808]: pam_unix(cron:session): session closed for user root Apr 8 05:18:21 us-dev1 sshd[31199]: Failed password for invalid user admin from 10.1.2.3 port 49821 ssh2

Which of the following regular expression commands will display log messages for any invalid users attempting to connect to the Linux server?

grep invalid\ user.*ssh /var/log/auth.log



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9805)
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide by Eric McLeroy(6321)
The KCNA Book by Nigel Poulton(4326)
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 by Dwayne Natwick(3688)
Designing and Implementing Microsoft Azure Networking Solutions by David Okeyode(3591)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart and Joe Anich(3544)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart & Joe Anich(3465)
TCP IP by Todd Lammle(2997)
Microsoft Power BI Data Analyst Certification Guide by Ed Corcoran Orrin Edenfield(2926)
Unity Certified Programmer: Exam Guide by Philip Walker(2637)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2531)
Networking A Beginner's Guide by Bruce Hallberg(2220)
Microsoft Power Platform Solution Architect's Handbook by Hugo Herrera(2048)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1869)
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102) by Ian Neil and Mark Birch(1804)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(1671)
PHP 7 Zend Certification Study Guide by Andrew Beak(1653)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1554)
CompTIA A+ Certification Guide (220-901 and 220-902) by Matthew Bennett(1532)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(1494)