5.6.8 Lab – Use Wireshark to Compare Telnet and SSH Traffic (Answers) Objectives Use Wireshark to capture web browser traffic. Use Wireshark to capture Telnet traffic. Use Wireshark to capture SSH traffic. Background / Scenario Wireshark is a network protocol analyzer that lets you see what’s happening on …
4.4.6 Lab – Generate and Use a Digital Signature (Answers) Objectives Use OpenSSL to generate a digital signature. Sign a document with the digital signature. Verify that a signed document has been changed. Background / Scenario A digital signature is a mathematical technique used to validate the authenticity …
4.4.3 Lab – Use Classic and Modern Encryption Algorithms (Answers) Objectives Part 1: Use a Classic Encryption Algorithm Part 2: Use a Modern Symmetrical Encryption Algorithm Part 3: Use a Modern Asymmetrical Encryption Algorithm Background / Scenario Modern cryptography is primarily based on mathematical theory and computer science …
3.1.11 Lab – Recover Passwords (Answers) Objectives Use a tool to recover user passwords. Change a user password to a stronger password. Background / Scenario There are four user accounts, Alice, Bob, Eve, and Eric, on a Linux system. There is also the superuser account cisco. The user …
3.1.10 Lab – Harden a Linux System (Answers) Objectives Use a security auditing tool to discover system vulnerabilities. Implement recommended solutions to harden the system. Background / Scenario Auditing a system for potential misconfigurations or unprotected services is an important aspect of system hardening. Lynis is an open …
2.7.3 Lab – Use Steganography to Hide Data (Answers) Objectives Use steganography to hide a document within a JPEG file. Background / Scenario The advantage of steganography over cryptography is that the secret message does not attract any special attention. No one would ever know that a picture …
2.4.13 Lab – Configure Authentication and Authorization in Linux (Answers) Objectives Part 1: Add a New Group for Users Part 2: Add Users to the New Group Part 3: Switch Users and Modify Permissions Part 4: Modify Permissions in Absolute Mode Background / Scenario In this lab, you …
2.1.7 Lab – The Cybersecurity Sorcery Cube Scatter Quizlet (Answers) Objectives Identify the three dimensions of the Cybersecurity Sorcery Cube and the elements of each dimension. Required Resources PC or mobile device with internet access Background / Scenario The McCumber Cube was developed by John McCumber in 1992. …
1.2.10 Lab – Use a Port Scanner to Detect Open Ports (Answers) Objectives Use Nmap, a port scanner and network mapping, tool to detect open ports. Background / Scenario Network Mapper, or Nmap, is an open-source utility used for network discovery and security auditing. A common task is …
1.1.17 Lab – Explore Social Engineering Techniques (Answers) Objectives Part 1: Explore Social Engineering Techniques Part 2: Create a Cybersecurity Awareness Poster Introduction Cybersecurity is critical because it involves protecting unauthorized access to sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property (IP), …