{"version":"1.0","provider_name":"","provider_url":"https:\/\/packitforwarding.com","title":"CCNA CyberOps SECOPS - Objective 3.6 -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"O31b6K2fvf\"><a href=\"https:\/\/packitforwarding.com\/index.php\/2019\/08\/17\/ccna-cyberops-secops-objective-3-6\/\">CCNA CyberOps SECOPS &#8211; Objective 3.6<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/packitforwarding.com\/index.php\/2019\/08\/17\/ccna-cyberops-secops-objective-3-6\/embed\/#?secret=O31b6K2fvf\" width=\"600\" height=\"338\" title=\"&#8220;CCNA CyberOps SECOPS &#8211; Objective 3.6&#8221; &#8212; \" data-secret=\"O31b6K2fvf\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/packitforwarding.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/i1.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/cabinet-data-data-center-325229.jpg?fit=640%2C224&ssl=1","thumbnail_width":640,"thumbnail_height":224,"description":"Identify these elements used for server profiling: Listening ports, Logged in users\/service accounts, Running processes, Running tasks, Applications Implementing Cisco Cybersecurity Operations (210-255) Server profiling helps to establish what type of server is running and what applications are running on the server. Used in baselining it can help to show when malicious services have been [&hellip;]"}