Lab – Configure Router-on-a-Stick Inter-VLAN Routing (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/1.3 192.168.3.1 255.255.255.0 N/A G0/0/1.4 192.168.4.1 255.255.255.0 N/A G0/0/1.8 N/A N/A N/A S1 VLAN 3 192.168.3.11 255.255.255.0 192.168.3.1 S2 VLAN 3 192.168.3.12 255.255.255.0 192.168.3.1 PC-A NIC 192.168.3.3 255.255.255.0 …
Lab – Implement VLANs and Trunking (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask S1 VLAN 10 192.168.10.11 255.255.255.0 VLAN 20 192.168.20.11 255.255.255.0 VLAN 30 192.168.30.11 255.255.255.0 S2 VLAN 10 192.168.10.12 255.255.255.0 PC-A NIC 192.168.20.13 255.255.255.0 PC-B NIC 192.168.30.13 255.255.255.0 VLAN Table VLAN Name Interface …
Lab – Configure VLANs and Trunking (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask S1 VLAN 1 192.168.1.11 255.255.255.0 S2 VLAN 1 192.168.1.12 255.255.255.0 PC-A NIC 192.168.10.3 255.255.255.0 PC-B NIC 192.168.10.4 255.255.255.0 Objectives Part 1: Build the Network and Configure Basic Device Settings Part 2: …
Lab – Initialize and Reload a Router and Switch (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Objectives Part 1: Set Up Devices in the Network as Shown in the Topology Part 2: Initialize the Router …
3.0.3 Class Activity – Design a Communications System (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Objectives Explain the role of protocols and standards organizations in facilitating interoperability in network communications. Background / Scenario You have just …
CyberOps Associate (Version 1.0) – CyberOps Associate 1.0 Final exam answers 1. Which two statements are characteristics of a virus? (Choose two.) A virus typically requires end-user activation. A virus can be dormant and then activate at a specific time or date. A virus replicates itself by independently …
CyberOps Associate (Version 1.0) – CyberOps Associate 1.0 Practice Final exam answers 1. What are two problems that can be caused by a large number of ARP request and reply messages? (Choose two.) All ARP request messages must be processed by all nodes on the local network. A …
CyberOps Associates v1.0 – Skills Assessment Introduction You have been hired as a junior security analyst. As part of your training, you were tasked to determine any malicious activity associated with the Pushdo trojan. You will have access to the internet to learn more about the events. You …
CyberOps Associate (Version 1.0) – Modules 26 – 28: Analyzing Security Data Group Exam 1. Match the intrusion event defined in the Diamond Model of intrusion to the description. network path used to establish and maintain command and control : infrastructure a tool or technique used to attack …
CyberOps Associate (Version 1.0) – Modules 24 – 25: Protocols and Log Files Group Exam 1. Which ICMP message type should be stopped inbound? source quench echo-reply echo unreachable 2. How can IMAP be a security threat to a company? Someone inadvertently clicks on a hidden iFrame. Encrypted …