{"id":555,"date":"2019-04-08T13:55:54","date_gmt":"2019-04-08T18:55:54","guid":{"rendered":"https:\/\/packitforwarding.com\/?p=555"},"modified":"2020-02-25T09:32:01","modified_gmt":"2020-02-25T15:32:01","slug":"ccna-cyberops-secfnd-objective-6-8","status":"publish","type":"post","link":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/","title":{"rendered":"CCNA CyberOps SECFND Objective 6.8"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Compare and contrast remote exploit and a local exploit<\/p><cite>Understanding Cisco Cybersecurity Fundamentals (210-250)<\/cite><\/blockquote>\n\n\n\n<p>As noted in the <a href=\"https:\/\/packitforwarding.com\/index.php\/2019\/01\/10\/comptia-cysa-common-vulnerability-scoring-system-cvss\/\">CVSS<\/a> metrics, there are two types of exploits, those that can be done remotely and those that require local access to complete. <\/p>\n\n\n\n<p>Remote exploits can be accomplished over the network and do not require physical access. Some may require local network access while others can be done over the Internet. <\/p>\n\n\n\n<p>Local exploits require that the attacker somehow have already gained access to the system either by physical access or through a different exploit. These exploits are often related to privilege escalation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compare and contrast remote exploit and a local exploit Understanding Cisco Cybersecurity Fundamentals (210-250) As noted in the CVSS metrics, there are two types of exploits, those that can be done remotely and those that require local access to complete. Remote exploits can be accomplished over the network and do not require physical access. Some [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":564,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"CCNA CyberOps SECFND Objective 6.8 - Study Notes #ccnacyberops #ciscochampion","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[88,105,31,24],"tags":[107,90,106,149],"class_list":["post-555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ccna-cyberops","category-certification","category-cisco","tag-ccna-cyberops","tag-certification","tag-cisco","tag-cisco-certified-cyber-ops-associate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CCNA CyberOps SECFND Objective 6.8 -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CCNA CyberOps SECFND Objective 6.8 -\" \/>\n<meta property=\"og:description\" content=\"Compare and contrast remote exploit and a local exploit Understanding Cisco Cybersecurity Fundamentals (210-250) As noted in the CVSS metrics, there are two types of exploits, those that can be done remotely and those that require local access to complete. Remote exploits can be accomplished over the network and do not require physical access. Some [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/packitforwarding\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-08T18:55:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-25T15:32:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ben Story\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/ntwrk80\" \/>\n<meta name=\"twitter:site\" content=\"@ntwrk80\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ben Story\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/\"},\"author\":{\"name\":\"Ben Story\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"headline\":\"CCNA CyberOps SECFND Objective 6.8\",\"datePublished\":\"2019-04-08T18:55:54+00:00\",\"dateModified\":\"2020-02-25T15:32:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/\"},\"wordCount\":103,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1\",\"keywords\":[\"CCNA CyberOps\",\"certification\",\"cisco\",\"Cisco Certified Cyber Ops Associate\"],\"articleSection\":[\"Blog\",\"CCNA CyberOps\",\"Certification\",\"cisco\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/\",\"name\":\"CCNA CyberOps SECFND Objective 6.8 -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1\",\"datePublished\":\"2019-04-08T18:55:54+00:00\",\"dateModified\":\"2020-02-25T15:32:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1\",\"width\":640,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/index.php\\\/2019\\\/04\\\/08\\\/ccna-cyberops-secfnd-objective-6-8\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/packitforwarding.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CCNA CyberOps SECFND Objective 6.8\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#website\",\"url\":\"https:\\\/\\\/packitforwarding.com\\\/\",\"name\":\"\",\"description\":\"Paying it forward to the next generation of IT.\",\"publisher\":{\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/packitforwarding.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/packitforwarding.com\\\/#\\\/schema\\\/person\\\/441c2562293c45fbcf483f246430e6c8\",\"name\":\"Ben Story\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\",\"width\":489,\"height\":250,\"caption\":\"Ben Story\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/packitforwarding.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1\"},\"description\":\"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/packitforwarding\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/benstory\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/www.twitter.com\\\/ntwrk80\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CCNA CyberOps SECFND Objective 6.8 -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/","og_locale":"en_US","og_type":"article","og_title":"CCNA CyberOps SECFND Objective 6.8 -","og_description":"Compare and contrast remote exploit and a local exploit Understanding Cisco Cybersecurity Fundamentals (210-250) As noted in the CVSS metrics, there are two types of exploits, those that can be done remotely and those that require local access to complete. Remote exploits can be accomplished over the network and do not require physical access. Some [&hellip;]","og_url":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/","article_publisher":"https:\/\/www.facebook.com\/packitforwarding","article_author":"https:\/\/www.facebook.com\/packitforwarding","article_published_time":"2019-04-08T18:55:54+00:00","article_modified_time":"2020-02-25T15:32:01+00:00","og_image":[{"width":640,"height":432,"url":"https:\/\/i2.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1","type":"image\/jpeg"}],"author":"Ben Story","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/ntwrk80","twitter_site":"@ntwrk80","twitter_misc":{"Written by":"Ben Story"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/#article","isPartOf":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/"},"author":{"name":"Ben Story","@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"headline":"CCNA CyberOps SECFND Objective 6.8","datePublished":"2019-04-08T18:55:54+00:00","dateModified":"2020-02-25T15:32:01+00:00","mainEntityOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/"},"wordCount":103,"commentCount":0,"publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1","keywords":["CCNA CyberOps","certification","cisco","Cisco Certified Cyber Ops Associate"],"articleSection":["Blog","CCNA CyberOps","Certification","cisco"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/","url":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/","name":"CCNA CyberOps SECFND Objective 6.8 -","isPartOf":{"@id":"https:\/\/packitforwarding.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/#primaryimage"},"image":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1","datePublished":"2019-04-08T18:55:54+00:00","dateModified":"2020-02-25T15:32:01+00:00","breadcrumb":{"@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/#primaryimage","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1","width":640,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/08\/ccna-cyberops-secfnd-objective-6-8\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/packitforwarding.com\/"},{"@type":"ListItem","position":2,"name":"CCNA CyberOps SECFND Objective 6.8"}]},{"@type":"WebSite","@id":"https:\/\/packitforwarding.com\/#website","url":"https:\/\/packitforwarding.com\/","name":"","description":"Paying it forward to the next generation of IT.","publisher":{"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/packitforwarding.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/packitforwarding.com\/#\/schema\/person\/441c2562293c45fbcf483f246430e6c8","name":"Ben Story","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1","width":489,"height":250,"caption":"Ben Story"},"logo":{"@id":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2026\/02\/cropped-PIF_Logo-Color-Horizontal-Rounded-1.png?fit=489%2C250&ssl=1"},"description":"In the course of my career, I have had the pleasure of working in multiple verticals including Education, Logistics and Healthcare. Although I started as a systems administrator (aka server jockey), I am now firmly in the network engineering arena. Currently I am working for a multi-state hospital system.","sameAs":["https:\/\/www.facebook.com\/packitforwarding","https:\/\/www.linkedin.com\/in\/benstory","https:\/\/x.com\/https:\/\/www.twitter.com\/ntwrk80"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/04\/access-black-and-white-blur-270514.jpg?fit=640%2C432&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pay9MD-8X","jetpack-related-posts":[{"id":488,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/05\/ccna-cyberops-secfnd-objective-2-2\/","url_meta":{"origin":555,"position":0},"title":"CCNA CyberOps SECFND Objective 2.2","author":"Ben Story","date":"March 5, 2019","format":false,"excerpt":"Compare and contrast these concepts: Risk, Threat, Vulnerability, and Exploit.Understanding Cisco Cybersecurity Fundamentals (210-250) Risk: the possibility that something bad will happenThreat: any potential danger to a security assetVulnerability: exploitable weakness in a system or designExploit: software or commands that take advantage of a vulnerability Risk is the possibility of\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/roulette-roulette-wheel-ball-turn.jpg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/roulette-roulette-wheel-ball-turn.jpg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/roulette-roulette-wheel-ball-turn.jpg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":737,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/07\/31\/ccna-cyberops-secops-objective-1-2\/","url_meta":{"origin":555,"position":1},"title":"CCNA CyberOps SECOPS &#8211; Objective 1.2","author":"Ben Story","date":"July 31, 2019","format":false,"excerpt":"Describe these terms as they are defined in the CVSS 3.0: Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope Implementing Cisco Cybersecurity Operations (210-255) The CVSS Base Metrics are defined by the terms Attack Vector, Attack Complexity, Privileges Required, User Interaction, and Scope. Attack Vector The attack vector (AV)\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"concentric windows lit up in circles","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-background-bright-285174.jpg?fit=640%2C465&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-background-bright-285174.jpg?fit=640%2C465&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/07\/art-background-bright-285174.jpg?fit=640%2C465&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":534,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/19\/ccna-cyberops-secfnd-objective-6-2\/","url_meta":{"origin":555,"position":2},"title":"CCNA CyberOps SECFND Objective 6.2","author":"Ben Story","date":"March 19, 2019","format":false,"excerpt":"Describe these network attacks: Denial of Service, Distributed Denial of Service, Man-in-the-MiddleImplementing Cisco Cybersecurity Operations (210-255) Denial of Service A Denial of Service (DoS) attack has the goal of preventing normal operations of an asset. This can be accomplished by either rendering an asset unavailable due to a crash or\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-416760.jpeg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-416760.jpeg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/10\/pexels-photo-416760.jpeg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":483,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/03\/04\/ccna-cyberops-secfnd-objective-2-0\/","url_meta":{"origin":555,"position":3},"title":"CCNA CyberOps SECFND Objective 2.1","author":"Ben Story","date":"March 4, 2019","format":false,"excerpt":"Describe the principles of the defense in depth strategy\u00a0 Understanding Cisco Cybersecurity Fundamentals (210-250) Defense in depth uses a layered approach to security. Each layer by itself is not secure, but together they provide a better security for the data being protected. These layers can be summarized as the following:\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/03\/ogres-layers.jpg?fit=1146%2C778&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":552,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/04\/01\/ccna-cyberops-secfnd-objective-6-7\/","url_meta":{"origin":555,"position":4},"title":"CCNA CyberOps SECFND Objective 6.7","author":"Ben Story","date":"April 1, 2019","format":false,"excerpt":"Describe privilege escalationUnderstanding Cisco Cybersecurity Fundamentals (210-250) Privilege escalation is the manner in which an attacker gains privileges in an application that they shouldn't have. By accomplishing this attack, an attacker gains more rights that can then allow further exploitation of the host and other network connected hosts. For example,\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/teddy-teddy-bear-association-ill-42230.jpeg?fit=640%2C518&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/teddy-teddy-bear-association-ill-42230.jpeg?fit=640%2C518&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2018\/09\/teddy-teddy-bear-association-ill-42230.jpeg?fit=640%2C518&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":894,"url":"https:\/\/packitforwarding.com\/index.php\/2019\/08\/29\/ccna-cyberops-secops-objective-5-1-cyber-kill-chain\/","url_meta":{"origin":555,"position":5},"title":"CCNA CyberOps SECOPS &#8211; Objective 5.1","author":"Ben Story","date":"August 29, 2019","format":false,"excerpt":"Classify intrusion events into these categories as defined by the Cyber Kill Chain Model Implementing Cisco Cybersecurity Operations (210-255) The cyber kill chain model outlines all of the steps necessary for a cyber attack to be successful. If the chain is broken, the attack will fail. The cyber kill chain\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/packitforwarding.com\/index.php\/category\/blog\/"},"img":{"alt_text":"A graphical depiction of the cyber kill chain model.","src":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/Cyber-Kill-Chain.png?fit=800%2C600&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/Cyber-Kill-Chain.png?fit=800%2C600&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/Cyber-Kill-Chain.png?fit=800%2C600&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/packitforwarding.com\/wp-content\/uploads\/2019\/08\/Cyber-Kill-Chain.png?fit=800%2C600&ssl=1&resize=700%2C400 2x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/comments?post=555"}],"version-history":[{"count":1,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/555\/revisions"}],"predecessor-version":[{"id":1087,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/posts\/555\/revisions\/1087"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media\/564"}],"wp:attachment":[{"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/media?parent=555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/categories?post=555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/packitforwarding.com\/index.php\/wp-json\/wp\/v2\/tags?post=555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}