文档介绍:CCNA Security
Student Lab Manual
This document is exclusive property of Cisco Systems, Inc. Permission is granted
to print and copy this document for mercial distribution and exclusive
use by instructors in NA Security course as part of an official Cisco
Networking Academy Program.
CCNA Security
Chapter 1 Lab A: work Attacks and Security Audit
Tools
Objectives
Part 1: work Attacks
• work attacks that have occurred.
• Select work attack and develop a report for presentation to the class.
Part 2: Researching Security Audit Tools
• work security audit tools.
• Select a tool and develop a report for presentation to the class.
Background/Scenario
Network attacks have resulted in the loss of sensitive data and work downtime. When work
or the resources in it are essible, worker productivity can suffer, and business e may be lost.
Attackers have developed many tools over the years to attack promise works anizations.
These attacks take many forms, but in most cases, they seek to obtain sensitive information, destroy
resources, or deny legitimate users access to resources.
To understand how to defend work against attacks, an administrator must first work
vulnerabilities. Specialized security audit software developed by equipment and software manufacturers can
be used to help identify potential weaknesses. In addition, the same tools used by attackers can be used to
test the ability of work to mitigate an attack. After the vulnerabilities are known, steps can be taken to
help mitigate work attacks.
This lab provides a structured research project that is divided into two parts: work Attacks
and Researching Security Audit Tools. You can elect to perform Part 1, Part 2, or both. Let your instructor
know what you plan to do so to ensure that a variety work attacks and vulnerability tools are reported on
by the members of the class.
In Part 1, you research work attacks