21.9.5 Lab – Configure ASA Basic Settings and Firewall Using ASDM Answers

21.9.5 Lab – Configure ASA Basic Settings and Firewall Using ASDM Answers Lab – Configure ASA Basic Settings and Firewall Using ASDM (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 […]
Continue reading…

 

21.7.6 Optional Lab – Configure ASA Network Services Routing and DMZ with ACLs Using CLI Answers

21.7.6 Optional Lab – Configure ASA Network Services Routing and DMZ with ACLs Using CLI Answers Optional Lab – Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP […]
Continue reading…

 

21.2.10 Optional Lab – Configure ASA Basic Settings Using the CLI Answers

21.2.10 Optional Lab – Configure ASA Basic Settings Using the CLI Answers Optional Lab – Configure ASA Basic Settings Using CLI (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/0 […]
Continue reading…

 

19.5.6 Lab – Configure a Site-to-Site VPN Answers

19.5.6 Lab – Configure a Site-to-Site VPN Answers Lab – Configure a Site-to-Site VPN (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 F0/5 R1 G0/0/0 […]
Continue reading…

 

17.2.7 Lab – Certificate Authority Stores Answers

17.2.7 Lab – Certificate Authority Stores Answers Lab – Certificate Authority Stores (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Certificates Trusted by Your Browser Part 2: Checking for Man-In-Middle Background / Scenario As the web evolved, so did the need […]
Continue reading…

 

16.3.12 Lab – Examining Telnet and SSH in Wireshark Answers

16.3.12 Lab – Examining Telnet and SSH in Wireshark Answers Lab – Examining Telnet and SSH in Wireshark (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Examine a Telnet Session with Wireshark Part 2: Examine an SSH Session with Wireshark Background […]
Continue reading…

 

16.3.11 Lab – Encrypting and Decrypting Data Using a Hacker Tool Answers

16.3.11 Lab – Encrypting and Decrypting Data Using a Hacker Tool Answers Lab – Encrypting and Decrypting Data using a Hacker Tool (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Create and Encrypt Files Part 2: Recover Encrypted Zip File Passwords […]
Continue reading…

 

16.3.10 Lab – Encrypting and Decrypting Data Using OpenSSL Answers

16.3.10 Lab – Encrypting and Decrypting Data Using OpenSSL Answers Lab – Encrypting and Decrypting Data Using OpenSSL (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Encrypting Messages with OpenSSL Part 2: Decrypting Messages with OpenSSL Background / Scenario OpenSSL is […]
Continue reading…

 

16.1.6 Lab – Hashing Things Out Answers

16.1.6 Lab – Hashing Things Out Answers Lab – Hashing Things Out (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Hashing a Text File with OpenSSL Part 2: Verifying Hashes Background / Scenario Hash functions are mathematical algorithms designed to take […]
Continue reading…

 

15.4.5 Lab – Exploring Encryption Methods Answers

15.4.5 Lab – Exploring Encryption Methods Answers Lab – Exploring Encryption Methods (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Part 1: Decipher a Pre-Encrypted Message Using the Vigenère Cipher Use an encrypted message, a cipher key, and the Vigenère cipher square to […]
Continue reading…