7.1.1.6 Lab – Hardening a Linux System Answers

7.1.1.6 Lab – Hardening a Linux System Answers Lab – Hardening a Linux System (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Demonstrate the use of a security auditing tool to harden a Linux system. Background / Scenario Auditing a system for potential […]
Continue reading…

 

5.2.2.4 Lab – Using Digital Signatures Answers

5.2.2.4 Lab – Using Digital Signatures Answers Lab – Using Digital Signatures (Answers Version) Answers Note: Have students pair up for this lab. Objectives Understand the concepts behind digital signature. Part 1: Demonstrate the use of digital signatures. Part 2: Demonstrate the verification of a digital signature. Background / Scenario A digital signature is a […]
Continue reading…

 

5.1.2.4 Lab – Password Cracking Answers

5.1.2.4 Lab – Password Cracking Answers Lab – Password Cracking (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Use a password cracking tool to recover a user’s password. Background / Scenario There are four user accounts, Alice, Bob, Eve, and Eric, on a […]
Continue reading…

 

4.3.2.3 Lab – Using Steganography Answers

4.3.2.3 Lab – Using Steganography Answers Lab – Using Steganography (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Use steganography to hide a document within a JPEG file. Background / Scenario Steghide is an open source steganography program that hides data in various […]
Continue reading…

 

3.3.1.9 Lab – Detecting Threats and Vulnerabilities Answers

3.3.1.9 Lab – Detecting Threats and Vulnerabilities Answers Lab – Detecting Threats and Vulnerabilities (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Use Nmap, a port scanner and network mapping tool to detect threats and vulnerabilities on a system. Background / Scenario Network […]
Continue reading…

 

2.5.2.5 Lab – Authentication Authorization Accounting Answers

2.5.2.5 Lab – Authentication Authorization Accounting Answers Lab – Authentication, Authorization, and Accounting (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on […]
Continue reading…

 

2.5.2.4 Lab – Install a Virtual Machine On A Personal Computer Answers

2.5.2.4 Lab – Install a Virtual Machine On A Personal Computer Answers Lab – Install a Virtual Machine on a Personal Computer (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Part 1: Prepare a Computer for Virtualization Part 2: Import a Virtual Machine […]
Continue reading…

 

2.4.3.6 Lab – The Cybersecurity Cube Scatter Quizlet Answers

2.4.3.6 Lab – The Cybersecurity Cube Scatter Quizlet Answers Lab – The Cybersecurity Cube Scatter Quizlet (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Identify the three dimensions of the Cybersecurity Cube and the elements of each dimension. Required Resources PC or mobile […]
Continue reading…

 

1.5.3.4 Lab – Exploring the World of Cybersecurity Professionals Answers

1.5.3.4 Lab – Exploring the World of Cybersecurity Professionals Answers Lab – Exploring the World of Cybersecurity Professionals (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Explore the security features used by organizations like Google and Cisco to keep your data safe. Part […]
Continue reading…

 

1.3.1.6 Lab – Threat identification Answers

1.3.1.6 Lab – Threat identification Answers Lab – Threat Identification (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Explore the security features used by organizations to keep data safe. Part 1: Exploring the Threat of Cyberattacks Part 2: CIA Triad Background / Scenario […]
Continue reading…

 

1.2.2.4 Lab – Cybersecurity Job Hunt Answers

1.2.2.4 Lab – Cybersecurity Job Hunt Answers Lab – Cybersecurity Jobs Hunt (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Explore the career opportunities for cybersecurity professionals. Explore the career requirements for cybersecurity professionals. Part 1: Exploring Cybersecurity Jobs Part 2: Cybersecurity Job […]
Continue reading…