Category: Network Security 1.0

21.7.6 Optional Lab – Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI Answers

21.7.6 Optional Lab – Configure ASA Network Services, Routing, and DMZ with ACLs Using CLI Answers version Topology Topology Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/0 172.16.3.1 255.255.255.0 N/A S3 F0/5 G0/0/1 209.165.200.225 255.255.255.248 ASA G1/1 ASA G1/1 (OUTSIDE) 209.165.200.226 255.255.255.248 N/A R1 …

19.5.6 Lab – Configure a Site-to-Site VPN Answers

19.5.6 Lab – Configure a Site-to-Site VPN Answers version Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 G0/0/1 192.168.1.1 255.255.255.0 N/A S1 F0/5 G0/0/0 10.1.1.1 255.255.255.252 N/A N/A R2 G0/0/0 10.1.1.2 255.255.255.252 N/A N/A G0/0/1 10.2.2.2 255.255.255.252 N/A N/A R3 G0/0/1 192.168.3.1 255.255.255.0 …

16.1.6 Lab – Hashing Things Out Answers

16.1.6 Lab – Hashing Things Out Answers version Objectives Part 1: Hashing a Text File with OpenSSL Part 2: Verifying Hashes Background / Scenario Hash functions are mathematical algorithms designed to take data as input and generate a fixed-size, unique string of characters, also known as the hash. …

15.4.5 Lab – Explore Encryption Methods Answers

15.4.5 Lab – Explore Encryption Methods Answers version Objectives Part 1: Decipher a Pre-Encrypted Message Using the Vigenère Cipher Use an encrypted message, a cipher key, and the Vigenère cipher square to decipher the message. Part 2: Create a Vigenère Cipher Encrypted Message and Decrypt It Work with …