Home > Articles > Challenges in the Security Operations Center (SOC)

Challenges in the Security Operations Center (SOC)

Chapter Description

In this sample chapter from Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide, you will learn how attackers obtain stealth access and the tricks used to negatively impact detection and forensic technologies.

Define Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

Tor

Tor exit node

peer-to-peer (P2P) communication

virtual private network (VPN)

remote-access VPN

traffic timing attack

clientless VPN

Secure Shell (SSH)

resource exhaustion attack

traffic fragmentation attack

protocol misinterpretation attack

traffic substitution and insertion attack

pivoting

site-to-site VPN

6. Review Questions | Next Section Previous Section

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.