7.1.1.6 Lab – Hardening a Linux System Answers

7.1.1.6 Lab – Hardening a Linux System Answers Lab – Hardening a Linux System (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Demonstrate the use of a security auditing tool to harden a Linux system. Background / Scenario Auditing a system for potential […]
Continue reading…

 

5.2.2.4 Lab – Using Digital Signatures Answers

5.2.2.4 Lab – Using Digital Signatures Answers Lab – Using Digital Signatures (Answers Version) Answers Note: Have students pair up for this lab. Objectives Understand the concepts behind digital signature. Part 1: Demonstrate the use of digital signatures. Part 2: Demonstrate the verification of a digital signature. Background / Scenario A digital signature is a […]
Continue reading…

 

5.1.2.4 Lab – Password Cracking Answers

5.1.2.4 Lab – Password Cracking Answers Lab – Password Cracking (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Use a password cracking tool to recover a user’s password. Background / Scenario There are four user accounts, Alice, Bob, Eve, and Eric, on a […]
Continue reading…

 

5.1.2.4 Lab – Password Cracking Answers

5.1.2.4 Lab – Password Cracking Answers Lab – Password Cracking (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Use a password cracking tool to recover a user’s password. Background / Scenario There are four user accounts, Alice, Bob, Eve, and Eric, on a […]
Continue reading…

 

4.3.2.3 Lab – Using Steganography Answers

4.3.2.3 Lab – Using Steganography Answers Lab – Using Steganography (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Use steganography to hide a document within a JPEG file. Background / Scenario Steghide is an open source steganography program that hides data in various […]
Continue reading…

 

3.3.1.9 Lab – Detecting Threats and Vulnerabilities Answers

3.3.1.9 Lab – Detecting Threats and Vulnerabilities Answers Lab – Detecting Threats and Vulnerabilities (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Use Nmap, a port scanner and network mapping tool to detect threats and vulnerabilities on a system. Background / Scenario Network […]
Continue reading…

 

3.3.1.9 Lab – Detecting Threats and Vulnerabilities Answers

3.3.1.9 Lab – Detecting Threats and Vulnerabilities Answers Lab – Detecting Threats and Vulnerabilities (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Use Nmap, a port scanner and network mapping tool to detect threats and vulnerabilities on a system. Background / Scenario Network […]
Continue reading…

 

2.5.2.5 Lab – Authentication Authorization Accounting Answers

2.5.2.5 Lab – Authentication Authorization Accounting Answers Lab – Authentication, Authorization, and Accounting (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on […]
Continue reading…

 

2.5.2.4 Lab – Install a Virtual Machine On A Personal Computer Answers

2.5.2.4 Lab – Install a Virtual Machine On A Personal Computer Answers Lab – Install a Virtual Machine on a Personal Computer (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Part 1: Prepare a Computer for Virtualization Part 2: Import a Virtual Machine […]
Continue reading…