Okay, I've got a strategy here. Tcpdump is used for network packet sniffing, so the malicious insider was likely trying to capture and analyze the actual data being transmitted on the network. I'll go with option D.
I'm a bit confused on how to calculate the third subnet. I know the network is divided into /28 subnets, but I'm not sure how to determine the starting address for the third one. I'll need to review the subnet calculation process to be sure I get this right.
This seems straightforward enough. The key things to focus on are the directory paths and whether the files are deleted or moved after processing. I think I've got a good handle on this.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Bettina
4 months agoBlossom
4 months agoKenda
4 months agoFlo
4 months agoLenna
5 months agoJina
5 months agoLilli
5 months agoRashad
5 months agoPeggie
5 months agoZita
5 months agoPaola
5 months agoTimothy
5 months ago