Posts

16.2.6 Lab – Research Network Security Threats (Answers)

Image
Objectives for the 16.2.6 Lab on Researching Network Security Threats Part 1: Look around the SANS website  Part 2: Recognize recent threats to network security Part 3: Describe a Particular Network Security Threat's History and Situation An administrator must recognise external dangers that endanger the network in order to protect it against assaults. Websites dedicated to security may be used to spot new threats and provide network defence methods. SysAdmin, Audit, Network, Security is one of the most well-known and reliable websites for fighting off threats to computer and network security (SANS). The SANS website offers a variety of services, including the weekly @Risk: The Consensus Security Alert email and a list of the top 20 Critical Security Controls for Effective Cyber Defense. This newsletter describes recent network vulnerabilities and assaults. In this lab, you will find the SANS website, browse it, utilise it to find current network security dangers, investigate addit...

15.4.8 Lab – Observe DNS Resolution Answers

Image
Lab – Observe DNS Resolution (Answers Version) Objectives Part 1: Observe the DNS-to-IP Address Conversion of a URL Part 2: Observe DNS Lookup Utilizing nslookup on a Website Part 3: Observe DNS Lookup Utilizing nslookup with Mail Servers Context / Scenario When you input a Uniform Resource Locator (URL) such as http://www.cisco.com into a web browser, the Domain Name System (DNS) is activated. The first portion of the URL specifies the employed protocol. Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol over Secure Socket Layer (HTTPS), and File Transfer Protocol are frequent protocols (FTP).DNS utilises the second portion of the URL, www.cisco.com in this case. DNS converts the domain name (www.cisco.com) to an IP address so that the source host may communicate with the target server. In this lab, you will witness DNS in operation and utilise nslookup (name server lookup) to get further DNS information. Required Assets 1 PC (Windows with internet and command prompt acce...

13.3.2 Lab – Use Ping and Traceroute to Test Network Connectivity Answers

Image
Objectives Part 1: Network Design and Configuration Part 2: Use the Ping command for basic network testing  Part 3: Using Tracert and Traceroute for Fundamental Network Testing Part 4: Diagnose the Topology Context / Scenario Ping and traceroute are vital tools for evaluating TCP/IP network connections. Ping is a network management tool used to test the connectivity of an IP network device. This application also monitors the round-trip time for messages delivered from the sending host to the receiving machine. Ping is supported by Windows, Unix-like operating systems (OS), and the Cisco Internetwork Operating System (IOS). The traceroute programme is a network diagnostic tool that displays the path or route of IP packets and measures their transit delays. The tracert programme is accessible on Windows, while the traceroute utility is available on Unix-like operating systems and Cisco IOS. In this lab, the ping and traceroute commands are reviewed, and command parameters to alter co...