ࡱ> proc *MbjbjZWZW D^8=`\8=`\Y++d9d9d9d9d9x9x9x989\ :x9E::(:::;;;DDDDDDD$dIL:Dud9;;;;;Dd9d9::4DE???;d9:d9:D?;D??BC:9v<^BDZE0EB,TM=&TMCCTMd9C;;?;;;;;DD*?;;;E;;;;TM;;;;;;;;;+> *8: CCNA Cyber Ops SECOPS 210-255 Official Cert Guide First Edition Copyright 2017 Cisco Systems, Inc. ISBN-10: 1-58714-703-3 ISBN-13: 978-1-58714-703-6 Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an "as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the CD or programs accompanying it. When reviewing corrections, always check the print number of your book. Corrections are made to printed books with each subsequent printing. First Printing: June 2017 Corrections for December 16, 2017 PgError Second PrintingCorrection18Chapter 2, Do I Know This Already? Quiz, Question 4 Reads: 4. Which of the following is not true regarding the use of digital evidence?Should read: 4. Which of the following is true regarding the use of digital evidence? 163Chapter 6, Second Bullet Point Reads: % Confidentiality (C) measures the degree of impact to the confidentiality of the system. It can assume the following values: % Low (L) % Medium (M) % High (H)Should read: % Confidentiality (C) measures the degree of impact to the confidentiality of the system. It can assume the following values: % High (H) % Low (L) % None (N)163Chapter 6, Third Bullet Point Reads: % Integrity (I) measures the degree of impact to the integrity of the system. It can assume the following values: % Low (L) % Medium (M) % High (H)Should read: % Integrity (I) measures the degree of impact to the integrity of the system. It can assume the following values: % High (H) % Low (L) % None (N)163Chapter 6, Fourth Bullet Point Reads: % Availability (A) measures the degree of impact to the availability of the system. It can assume the following values: % Low (L) % Medium (M) % High (H)Should read: % Availability (A) measures the degree of impact to the availability of the system. It can assume the following values: % High (H) % Low (L) % None (N) 163Chapter 6, Ninth Bullet Point Reads: % Modified Base Metrics (MAV, MAC, MAPR, MUI, MS, MC, MI, MA), which allow the organization to tweak the base metrics based on specific characteristic of the environmentShould Read: % Modified Base Metrics (MAV, MAC, MPR, MUI, MS, MC, MI, MA), which allow the organization to tweak the base metrics based on specific characteristic of the environment281Appendix A, Do I Know This Already? Answers, Chapter 2, Answer to Question 2 Reads: 2. B. Integrity protection encompasses more than just data; it not only protects data, but also operating systems, applications, and hardware from being altered by unauthorized individuals.Should read: 2. A. Integrity protection encompasses only data and information.281Appendix A, Do I Know This Already? Answers, Chapter 2, Answer to Question 4 Reads: 4. +,128@AQRefmo|}   IJzrzgr_TITh!56OJQJhSq56OJQJhySOJQJhRwh0OJQJh0OJQJhRwh1 OJQJhRwhhN5OJQJhRwhRwOJQJhhN5OJQJhMOJQJ hchc#hMhB5CJOJQJ^JaJ#hMhM5CJOJQJ^JaJhM5OJQJ^JaJhMCJ!OJQJ^JaJ!hMhMOJQJ^JaJ2@AfQ   6 A $Ifgd :$If]:gd  p@@gdSq $ p@@a$gd0o$a$o$a$gd0n$a$gdc$a$gd-  A B P J N R X Z ̴̟̟vivivP1hqh!B* OJPJQJ^JaJnHphftHhqhLwudWW>Wd$7$8$H$If^`gd') $Ifgd :$If]:gdkdX$$IflFv2r0 3    4 layt Y`UD7 $IfgdY :$If]:gdkd$$IflFv2r0 3    4 layt $If^`gd') $Ifgd8Y`c,-ͱ~h~P;~0h p5OJQJaJ(hYhYOJPJQJ^JaJnHtH.hYhY5OJPJQJ\^JaJnHtH+hYhYOJPJQJ\^JaJnHtHhYhYOJQJaJhqhqOJQJaJ1hqhqB*OJPJQJ^JaJnHphtH7hqhq5B*OJPJQJ\^J aJnHphtH1hqhqB* OJPJQJ^JaJnHphftH1hqhqB* OJPJQJ^JaJnHphftH `+,-op<kd$$IflFv2r0 3    4 layt V$If^V`gdY $IfgdVd$7$8$H$If^V`gdY-/3npB*C,CFCHCLCNCxDzD|D¬}sfXfT6hhN5OJQJhY$356OJQJhhN556OJQJhM56OJQJ6h')hYB*OJQJ^JaJfHph"""q 0hYB*OJQJ^JaJfHph"""q 9h')hY5B*OJQJ^JaJfHph"""q (h')hYOJPJQJ^JaJnHtH(hY5OJPJQJ\^JaJnHtH.h')hY5OJPJQJ\^JaJnHtHh')hYOJQJaJHHHHH I6IwppbUK $If $IfgdY3 :$If]: p@@kd$$IflFv2r0 3    4 laytY`HHI6I8IRIIINJPJnJtJJKKKvLxL|L~LLLLLLLLªت~g\TPTPTPTPLDjhC^KUhC^KhY`jhY`UhMhMOJQJ-hMhMB*OJQJ^JaJnHph"""tH-hMhMB*OJQJ^JaJnHphtH(hMhMOJPJQJ^JaJnHtH.hMhM5OJPJQJ\^JaJnHtH+hMhMOJPJQJ\^JaJnHtHhMhMOJQJaJhhN5OJQJhM5OJQJhhN55OJQJ6I8I*B*@V 1@ FollowedHyperlink>*B* R/BR ITd` CJOJ PJQJ _HmH sH tH f/Rf BL'  d^` CJOJ PJQJ _HmH sH tH f/bf BX'  d^` CJOJ PJQJ _HmH sH tH f/rf NL'  d^` CJOJ PJQJ _HmH sH tH f/f NX'  d^` CJOJ PJQJ _HmH sH tH ^/^ UC d^#6CJOJ PJQJ _HmH sH tH Z/Z UL d^ CJOJ PJQJ _HmH sH tH Z/Z UX d^ CJOJ PJQJ _HmH sH tH N/N TN d#5CJOJ PJQJ _HmH sH tH NoN TH d#6CJOJ PJQJ _HmH sH tH T/T TS$da$#6CJOJ PJQJ _HmH sH tH V/V TC @d#5CJOJ PJQJ _HmH sH tH RoR TB @dx CJOJ PJQJ _HmH sH tH R/R TX! @d CJOJ PJQJ _HmH sH tH N/"N LH "d#6CJOJ PJQJ _HmH sH tH V/2V C1#d]#>*CJOJ PJQJ _HmH sH tH R/BR C2$d]#>*CJOJ PJQJ _HmH sH tH V/RV CX%d]#>*CJOJ PJQJ _HmH sH tH Z/bZ MN&d]^ CJOJ PJQJ _HmH sH tH d/rd SH"'$``d]`^`a$#6CJOJ PJQJ _HmH sH tH Z/Z SB(``d]`^` CJOJ PJQJ _HmH sH tH Z/Z NO)``d]`^` CJOJ PJQJ _HmH sH tH Z/Z TI*``d]`^` CJOJ PJQJ _HmH sH tH Z/Z CA+``d]`^` CJOJ PJQJ _HmH sH tH ^/^ EH,$d^a$&56CJOJ PJQJ _HmH sH tH Z/Z ET- d^ CJOJ PJQJ _HmH sH tH Z/Z EX. d^ CJOJ PJQJ _HmH sH tH N/N FC /d#6CJOJ PJQJ _HmH sH tH N/N FN 0d#5CJOJ PJQJ _HmH sH tH L/L M01 1d CJOJ PJQJ _HmH sH tH L/"L M02 2d CJOJ PJQJ _HmH sH tH L/2L M03 3d CJOJ PJQJ _HmH sH tH L/BL M04 4d CJOJ PJQJ _HmH sH tH L/RL M05 5d CJOJ PJQJ _HmH sH tH L/bL M06 6d CJOJ PJQJ _HmH sH tH L/rL M07 7d CJOJ PJQJ _HmH sH tH T/T PD8d&56CJOJ PJQJ _HmH sH tH j/j ENL*9 @@@d^` CJOJ PJQJ _HmH sH tH j/j ENX*: @@@d^` CJOJ PJQJ _HmH sH tH N/N HA ;d#5CJOJ PJQJ _HmH sH tH N/N HB <d#5CJOJ PJQJ _HmH sH tH N/N HD =d#5CJOJ PJQJ _HmH sH tH N/N HE >d#5CJOJ PJQJ _HmH sH tH N/N HF ?d#5CJOJ PJQJ _HmH sH tH N/N HG @d#5CJOJ PJQJ _HmH sH tH h/h EL*A @@@d^` CJOJ PJQJ _HmH sH tH `/"` LC1Bd]^#>*CJOJ PJQJ _HmH sH tH \/2\ LC2Cd]^#>*CJOJ PJQJ _HmH sH tH `/B` LCXDd]^#>*CJOJ PJQJ _HmH sH tH R/RR TRE @dx CJOJ PJQJ _HmH sH tH N/bN AU Fd#6CJOJ PJQJ _HmH sH tH d/rd MH"G$d]^a$#6CJOJ PJQJ _HmH sH tH L/L M08 Hd CJOJ PJQJ _HmH sH tH \/\ CLTI``d]`^` CJOJ PJQJ _HmH sH tH `/` FTNJ``d]`^`#6CJOJ PJQJ _HmH sH tH P/P BTSUB Kd CJOJ PJQJ _HmH sH tH V/V LXLd]#>*CJOJ PJQJ _HmH sH tH \/\ NOXM``d]`^` CJOJ PJQJ _HmH sH tH \/\ TIXN``d]`^` CJOJ PJQJ _HmH sH tH \/\ CAXO``d]`^` CJOJ PJQJ _HmH sH tH \/\ SBXP``d]`^` CJOJ PJQJ _HmH sH tH N/N BT Qd#5CJOJ PJQJ _HmH sH tH L/"L M09 Rd CJOJ PJQJ _HmH sH tH L/2L M10 Sd CJOJ PJQJ _HmH sH tH L/BL M11 Td CJOJ PJQJ _HmH sH tH L/RL M12 Ud CJOJ PJQJ _HmH sH tH L/bL M13 Vd CJOJ PJQJ _HmH sH tH L/rL M14 Wd CJOJ PJQJ _HmH sH tH L/L M15 Xd CJOJ PJQJ _HmH sH tH f/f CSH"Y$d]^a$#6CJOJ PJQJ _HmH sH tH X/X CHDZ@d^@#5CJOJ PJQJ _HmH sH tH X/X CHE[@d^@#5CJOJ PJQJ _HmH sH tH T/T CFT\@d^@ CJOJ PJQJ _HmH sH tH h/h CBL'] `0p`d^p`` CJOJ PJQJ _HmH sH tH h/h CBX'^ `0p`d^p`` CJOJ PJQJ _HmH sH tH h/h CNL'_ `0p`d^p`` CJOJ PJQJ _HmH sH tH h/h CNX'` `0p`d^p`` CJOJ PJQJ _HmH sH tH X/X CTHa@d^@#5CJOJ PJQJ _HmH sH tH `/"` CTCb @d^@#5CJOJ PJQJ _HmH sH tH \/2\ CTBc @d^@ CJOJ PJQJ _HmH sH tH \/B\ CTXd @d^@ CJOJ PJQJ _HmH sH tH N/RN EDTN ed CJOJ PJQJ _HmH sH tH L/bL ADD fd CJOJ PJQJ _HmH sH tH P/rP PTTOC gd CJOJ PJQJ _HmH sH tH P/P CTTOC hd CJOJ PJQJ _HmH sH tH T/T TOCPART id CJOJ PJQJ _HmH sH tH P/P TOCHB jd CJOJ PJQJ _HmH sH tH P/P TOCHC kd CJOJ PJQJ _HmH sH tH P/P TOCHD ld CJOJ PJQJ _HmH sH tH R/R CRHC md#5CJOJ PJQJ _HmH sH tH RoR CRHD nd#5CJOJ PJQJ _HmH sH tH JoJ CR od CJOJ PJQJ _HmH sH tH V/V CREDTI pd#5CJOJ PJQJ _HmH sH tH R/R CREDNM qd CJOJ PJQJ _HmH sH tH P/"P DED rd#6CJOJ PJQJ _HmH sH tH  Q2 CLs"B" frttBZRB Plain Textud CJOJ QJ 4 @b4 Footer v !4r4 Header w !HH 1 Balloon TextxCJOJ QJ ^J aJH>H -Titley$da$5CJ$OJQJ\aJ(( -ver12redPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VvnB`2ǃ,!"E3p#9GQd; H xuv 0F[,F᚜K sO'3w #vfSVbsؠyX p5veuw 1z@ l,i!b I jZ2|9L$Z15xl.(zm${d:\@'23œln$^-@^i?D&|#td!6lġB"&63yy@t!HjpU*yeXry3~{s:FXI O5Y[Y!}S˪.7bd|n]671. tn/w/+[t6}PsںsL. J;̊iN $AI)t2 Lmx:(}\-i*xQCJuWl'QyI@ھ m2DBAR4 w¢naQ`ԲɁ W=0#xBdT/.3-F>bYL%׭˓KK 6HhfPQ=h)GBms]_Ԡ'CZѨys v@c])h7Jهic?FS.NP$ e&\Ӏ+I "'%QÕ@c![paAV.9Hd<ӮHVX*%A{Yr Aբ pxSL9":3U5U NC(p%u@;[d`4)]t#9M4W=P5*f̰lk<_X-C wT%Ժ}B% Y,] A̠&oʰŨ; \lc`|,bUvPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!R%theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] `^ CCCXXX[ n-|DHL*M (*.A J`pzDH6IlJK*M ')+,-$/07@[ @ @H 0(  0(  B S  ?STtu45^ _ - .    ^a- 0    ^a32@fE)L^ABLMZ[t3WXcdno{}P ]  - / t a n @   GI\^a'){}  _   n p p     Q[^ar`s?2gh^`OJQJo(hHh^`OJ QJ ^J o(hHohpp^p`OJ QJ o(hHh@ @ ^@ `OJQJo(hHh^`OJ QJ ^J o(hHoh^`OJ QJ o(hHh^`OJQJo(hHh^`OJ QJ ^J o(hHohPP^P`OJ QJ o(hHr`s         REM/p=,-p=,-ddK0o<9M/2:76TT) 1 y$./BD{ ,t,0Y$3Y3hN5&Q>C^KlLM?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^`abcdefhijklmnqRoot Entry F.9vsData 01Table8dMWordDocumentD^SummaryInformation(_DocumentSummaryInformation8gCompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q