3.1.1.5 Lab – Create and Store Strong Passwords (Answers) Objectives Understand the concepts behind a strong password. Part 1: Explore the concepts behind creating a strong password. Part 2: Explore the concepts behind securely storing your passwords? Background / Scenario Passwords are widely used to enforce access to …
1.2.2.5 Lab – What was Taken? (Answers) Objectives Search for and read about a few recent occurrences of security breaches. Background / Scenario Security breaches occur when individuals or applications are trying to gain unauthorized access to data, applications, services, or devices. During these breaches, the attackers, whether …
1.2.1.3 Lab – Compare Data with a Hash (Answers) Objectives Use a hashing program to verify the integrity of data. Background / Scenario It is important to understand when data has been corrupted or it has been tampered with. A hashing program can be used to verify if …
Objectives Find your personal data online and on your computing devices. Background / Scenario If you search your name online, there is a good chance that you will find some information about yourself in the result. Some of the results may be private information, such as your birthday, …
8.3.12 Packet Tracer – Skills Integration Challenge (Answers) Objectives Part 1: Set Up a Home Wireless Network Part 2: Configure and Use a Remote-Access VPN Part 3: Configure and Use a Site-to-Site VPN Background/Scenario In this Packet Tracer Skills Integration Challenge activity, you will play the role of …
6.2.9 Packet Tracer – Investigate Disaster Recovery (Answers) Objectives Part 1: Review a Switch Configuration Part 2: Backup Files to a TFTP Server Part 3: Replace a Failed Switch Part 4: Restore Network Operations Background / Scenario In this Packet Tracer (PT) activity, you will back up switch …
5.5.16 Packet Tracer – Implement Physical Security with IoT Devices (Answers) Objectives Part 1: Connect IoT Devices to the Network Part 2: Add IoT Devices to the Registration Server Part 3: Explore IoT Security Device Functionality Background / Scenario In an attempt to increase the physical security of …
Course Completion Assessment & Survey Cybersecurity Essentials: Course Final Exam Answers 1. Which of the following statements describes a distributed denial of service (DDoS) attack? An attacker sends an enormous quantity of data that a server cannot handle, using a botnet An attacker builds a botnet comprised of …
Cybersecurity Essentials Module 8 Quiz Answers Module 8: Governance and Compliance Quiz Question Answers 1. Which of the following measures can an organization implement to manage user threats? Conduct post-configuration penetration tests Implement LAN server configuration standards Disable internal USB ports Implement IPS 2. The ability to carry …
Cybersecurity Essentials Module 7 Quiz Answers Module 7: Asset and Risk Management Quiz Question Answers 1. An @Apollo employee has completed a six-month project to identify all data stores and catalog their location. The next step is to classify the data and produce some criteria for data sensitivity. …