6.1.6 Lab – Gather System Information After an Incident (Answers) Objectives Collect system information after an incident has occurred. View logs for potential intrusions. Background / Scenario When an incident occurs in an organization, people responsible must know how to respond. An organization needs to develop an incident …
5.6.8 Lab – Use Wireshark to Compare Telnet and SSH Traffic (Answers) Objectives Use Wireshark to capture web browser traffic. Use Wireshark to capture Telnet traffic. Use Wireshark to capture SSH traffic. Background / Scenario Wireshark is a network protocol analyzer that lets you see what’s happening on …
4.4.6 Lab – Generate and Use a Digital Signature (Answers) Objectives Use OpenSSL to generate a digital signature. Sign a document with the digital signature. Verify that a signed document has been changed. Background / Scenario A digital signature is a mathematical technique used to validate the authenticity …
4.4.3 Lab – Use Classic and Modern Encryption Algorithms (Answers) Objectives Part 1: Use a Classic Encryption Algorithm Part 2: Use a Modern Symmetrical Encryption Algorithm Part 3: Use a Modern Asymmetrical Encryption Algorithm Background / Scenario Modern cryptography is primarily based on mathematical theory and computer science …
3.1.11 Lab – Recover Passwords (Answers) Objectives Use a tool to recover user passwords. Change a user password to a stronger password. Background / Scenario There are four user accounts, Alice, Bob, Eve, and Eric, on a Linux system. There is also the superuser account cisco. The user …
3.1.10 Lab – Harden a Linux System (Answers) Objectives Use a security auditing tool to discover system vulnerabilities. Implement recommended solutions to harden the system. Background / Scenario Auditing a system for potential misconfigurations or unprotected services is an important aspect of system hardening. Lynis is an open …
2.7.3 Lab – Use Steganography to Hide Data (Answers) Objectives Use steganography to hide a document within a JPEG file. Background / Scenario The advantage of steganography over cryptography is that the secret message does not attract any special attention. No one would ever know that a picture …
2.4.13 Lab – Configure Authentication and Authorization in Linux (Answers) Objectives Part 1: Add a New Group for Users Part 2: Add Users to the New Group Part 3: Switch Users and Modify Permissions Part 4: Modify Permissions in Absolute Mode Background / Scenario In this lab, you …
2.1.7 Lab – The Cybersecurity Sorcery Cube Scatter Quizlet (Answers) Objectives Identify the three dimensions of the Cybersecurity Sorcery Cube and the elements of each dimension. Required Resources PC or mobile device with internet access Background / Scenario The McCumber Cube was developed by John McCumber in 1992. …
1.2.10 Lab – Use a Port Scanner to Detect Open Ports (Answers) Objectives Use Nmap, a port scanner and network mapping, tool to detect open ports. Background / Scenario Network Mapper, or Nmap, is an open-source utility used for network discovery and security auditing. A common task is …