Step 1: Download one of the malware test files. You can select from PE, APK, MacOSX, and ELF. If you...
JoinedMay 2, 2023
Articles649
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
Keep in mind, this information will be logged as well, so you can query your logs. Here is a list...
There are two good commands to run:...
Test a security policy rule: test security-policy-match application twitter-posting source-user cordero\kcordero destination 98.2.144.22 destination-port 80 source 10.200.11.23 protocol 6...
Used the “test decryption-policy-match” command: corderoPA-A(active)> test decryption-policy-match source {SOURCE-IP} destination {DESTINATION-IP} Matched rule: 'Do Not Decrypt' action: no-decrypt...
The nominal speed of a network connection, such as Gigabit Ethernet (1G) or 10-Gigabit Ethernet (10G), refers to the maximum...
Cisco Application Centric Infrastructure CLI Commands (APIC, Leaf/Spine) Clustering User Commands <controller> – shows the current cluster size and state of...