10.6.13 Lab – Research Password Recovery Procedures (Answers)

Lab – Research Password Recovery Procedures (Instructor Version) Objectives Part 1: Research the Configuration Register Identify the purpose of the configuration register. Describe router behavior for different configuration register values. Part 2: Document the Password Recovery Procedure for a Specific Cisco Router Research and record the process for …

10.4.10 Lab – Research Network Monitoring Software (Answers)

Lab – Research Network Monitoring Software (Instructor Version) Objectives Part 1: Survey Your Understanding of Network Monitoring Part 2: Research Network Monitoring Tools Part 3: Select a Network Monitoring Tool Background / Scenario Network monitoring is needed for any sized network. Proactively monitoring the network infrastructure can assist …

6.8.2 Lab – Configure NAT for IPv4 (Answers)

Lab – Configure NAT for IPv4 (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask R1 G0/0/0 209.165.200.230 255.255.255.248 G0/0/1 192.168.1.1 255.255.255.0 R2 G0/0/0 209.165.200.225 255.255.255.248 Lo1 209.165.200.1 255.255.255.224 S1 VLAN 1 192.168.1.11 255.255.255.0 S2 VLAN 1 192.168.1.12 255.255.255.0 PC-A NIC 192.168.1.2 255.255.255.0 PC-B NIC 192.168.1.3 …

5.5.2 Lab – Configure and Verify Extended IPv4 ACLs (Answers)

Lab – Configure and Verify Extended IPv4 ACLs (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1 N/A N/A N/A G0/0/1.20 10.20.0.1 255.255.255.0 G0/0/1.30 10.30.0.1 255.255.255.0 G0/0/1.40 10.40.0.1 255.255.255.0 G0/0/1.1000 N/A N/A Loopback1 172.16.1.1 255.255.255.0 R2 G0/0/1 10.20.0.4 255.255.255.0 N/A S1 VLAN …

3.8.8 Lab – Explore DNS Traffic (Answers)

Lab – Explore DNS Traffic (Instructor Version) Objectives Part 1: Capture DNS Traffic Part 2: Explore DNS Query Traffic Part 3: Explore DNS Response Traffic Background / Scenario Wireshark is an open source packet capture and analysis tool. Wireshark gives a detailed breakdown of the network protocol stack. …

3.5.7 Lab – Social Engineering (Answers)

Lab – Social Engineering (Instructor Version) Objective In this lab, you will research examples of social engineering and identify ways to recognize and prevent it. Resources Computer with internet Access Instructions Step 1: Research Social Engineering Examples Social engineering, as it relates to information security, is used to …