Terminal PBQs: Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
easyQuestion 1 of 21
You are a network security engineer on the incident response team at your organization. The threat intelligence team has placed a file containing known Indicators of Compromise (IoCs) on your analysis workstation. Navigate to the appropriate directory, review the IoC file, and identify the malicious IP addresses and domain names listed so they can be added to the firewall and DNS block lists.
Objectives
- •Locate the threat intelligence feed files on the analysis workstation
- •Identify which IoC reports are available for review
- •Review the IoC feed to understand the reported threat indicators
- •Isolate the malicious IP addresses flagged in the report
bash
engineer@certnova:/$
Type commands and press Enter to execute. Use ↑↓ to navigate history. Ctrl+C to cancel, Ctrl+L to clear.
Progress
0 of 4 steps detectedRun at least one command to mark this question complete
0 of 21 marked complete

