21.9.5 Lab – Configure ASA Basic Settings and Firewall Using ASDM Answers Lab – Configure ASA Basic Settings and Firewall Using ASDM (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 […]
Continue reading…
NS 1.0 – Lab Answers
21.7.6 Optional Lab – Configure ASA Network Services Routing and DMZ with ACLs Using CLI Answers
21.7.6 Optional Lab – Configure ASA Network Services Routing and DMZ with ACLs Using CLI Answers Optional Lab – Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP […]
Continue reading…
21.2.10 Optional Lab – Configure ASA Basic Settings Using the CLI Answers
21.2.10 Optional Lab – Configure ASA Basic Settings Using the CLI Answers Optional Lab – Configure ASA Basic Settings Using CLI (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/0 […]
Continue reading…
19.5.6 Lab – Configure a Site-to-Site VPN Answers
19.5.6 Lab – Configure a Site-to-Site VPN Answers Lab – Configure a Site-to-Site VPN (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 F0/5 R1 G0/0/0 […]
Continue reading…
17.2.7 Lab – Certificate Authority Stores Answers
17.2.7 Lab – Certificate Authority Stores Answers Lab – Certificate Authority Stores (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Certificates Trusted by Your Browser Part 2: Checking for Man-In-Middle Background / Scenario As the web evolved, so did the need […]
Continue reading…
16.3.12 Lab – Examining Telnet and SSH in Wireshark Answers
16.3.12 Lab – Examining Telnet and SSH in Wireshark Answers Lab – Examining Telnet and SSH in Wireshark (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Examine a Telnet Session with Wireshark Part 2: Examine an SSH Session with Wireshark Background […]
Continue reading…
16.3.11 Lab – Encrypting and Decrypting Data Using a Hacker Tool Answers
16.3.11 Lab – Encrypting and Decrypting Data Using a Hacker Tool Answers Lab – Encrypting and Decrypting Data using a Hacker Tool (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Create and Encrypt Files Part 2: Recover Encrypted Zip File Passwords […]
Continue reading…
16.3.10 Lab – Encrypting and Decrypting Data Using OpenSSL Answers
16.3.10 Lab – Encrypting and Decrypting Data Using OpenSSL Answers Lab – Encrypting and Decrypting Data Using OpenSSL (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Encrypting Messages with OpenSSL Part 2: Decrypting Messages with OpenSSL Background / Scenario OpenSSL is […]
Continue reading…
16.1.6 Lab – Hashing Things Out Answers
16.1.6 Lab – Hashing Things Out Answers Lab – Hashing Things Out (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Hashing a Text File with OpenSSL Part 2: Verifying Hashes Background / Scenario Hash functions are mathematical algorithms designed to take […]
Continue reading…
15.4.5 Lab – Exploring Encryption Methods Answers
15.4.5 Lab – Exploring Encryption Methods Answers Lab – Exploring Encryption Methods (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Decipher a Pre-Encrypted Message Using the Vigenère Cipher Use an encrypted message, a cipher key, and the Vigenère cipher square to […]
Continue reading…