Testout Security Plus Labsim 1-4

¡Supera tus tareas y exámenes ahora con Quizwiz!

1.2.2 Configure a Security Appliance You are an IT security administrator for a small corporate network. You just purchased a new network security appliance (NSA) to increase the corporate network's security. Now you need to configure the device. In this lab, your task is to perform the following: • Connect the NSA as follows: o Plug the NSA into the surge protector o Power on the NSA o Use Cat5e cable to connect a LAN port on the NSA to the laptop • Configure the WAN networking settings on the NSA as follows: o Access the NSA using the following parameters: URL: 192.168.75.1 Username: cisco Password: cisco o Configure WAN settings as follows: IP address: 65.86.24.136 IP subnet mask: 255.255.0.0 Gateway IP address: 65.86.1.1 Primary DNS server: 163.128.78.93 Secondary DNS server: 163.128.80.93 • Configure the LAN IPv4 networking settings on the NSA as follows: o IP Address: 198.28.56.18 o Subnet Mask: 255.255.255.0 o DHCP Mode: None • (Optional) When you're finished, you can reconfigure the IPv4 configuration on the laptop to communicate with the NSA. Watch the preceding demonstration to see how to complete these tasks. After you have completed all of the assigned tasks, feel free to explore the hardware and operating system interfaces within the lab. Select Done when you are finished. In order to score 100% on the lab, make sure that all components are still connected and turned on before you select Done.

Task Summary Connect the NSA Hide Details Turn the NSA on by toggling the device's power switch Provide power to the NSA through an open outlet on the power strip Use Cat5e cable to connect to one of the NSA's LAN portsto the laptop's network port Configure the WAN networking settings on the NSA Hide Details Set the IP address to 65.86.24.136 Set the subnet mask to 255.255.0.0 Set the gateway IP address to 65.86.1.1 Set the primary DNS server IP address to 163.128.78.93 Set the secondary DNS server IP address to 163.128.80.93 Configure the LAN IPv4 networking settings on the NSA Hide Details Set the IP address to 198.28.56.18 Set the subnet mask to 255.255.255.0 Set the DHCP mode to None Explanation Complete this lab as follows: 1. Under Workspace, select Back to switch to the Back view of the NSA. 2. Under Workspace, select Back to switch to the Back view of the laptop. 3. Provide power to the NSA as follows: a. Expand Cables on the shelf. b. Drag the power cable from the shelf to the power port on the NSA. c. Select AC Power connector (Female). d. In the Selected Component window, select the AC power connector (Male). e. Drag the AC power connector (Male) to an unused power port on the power strip. f. Drag the Cat5e cable from the shelf to the network port on the laptop to connect the laptop to the NSA. g. In the Selected Component window, drag the unconnected connector to a LAN port on the NSA. h. Under Workspace, select the Front of the NSA. i. Click the power button to turn on the NSA. 4. Configure the WAN networking settings on the NSA as follows: a. Under Workspace, select Front to switch to the Front view of the laptop. b. Select Click to view Windows 10. c. From the taskbar, select Internet Explorer. d. Maximize Internet Explorer. e. In the URL field, enter 192.168.75.1 and press Enter to open the Security Appliance Configuration utility. f. In the Username field, enter cisco. g. In the Password field, enter cisco. h. Select Log In. i. Under WAN & LAN Connectivity, select WAN settings. j. Under Internet (IP) Address, select Use Static IP Address from the IP Address Source drop-down list. k. Enter the IP address. l. Enter the IP subnet mask. m. Enter the gateway IP address. n. Enter the primary DNS server address. o. Enter the secondary DNS server address. p. Select Apply. 5. Configure the LAN IPv4 networking settings as follows: a. From the left menu, expand LAN. b. Select IPv4 Config. c. Under LAN TCP/IP Setup, enter the IP address in the IP address field. d. In the Subnet Mask field, verify the subnet mask. e. From the DHCP mode drop-down lists, select None. f. Click Apply. g. Click OK. Configuring a new IP address for the LAN ports also changes the address of the NSA management console. This results in a lost connection when the change is applied. You can reconnect to the management console by adjusting the IPv4 configuration on the laptop to communicate on the same network as the NSA LAN ports.

3.5.5 Respond to Social Engineering You work as the IT security administrator for a small corporate network. The company president has received several emails that he is wary of. He has asked you to determine whether they are hazardous and handle them accordingly. In this lab, your task is to perform the following: • Read each email and determine if it is legitimate. • Delete any emails that are attempts at social engineering. • Keep any emails that are safe. Hold your mouse over the embedded links to see the actual URL in the status bar at the bottom of the screen.

Task Summary Delete the Microsoft Windows Update Center phishing email Delete the Online Banking phishing email Delete the Grandma Jacklin forwarded email hoax Delete the Emily Smith spear phishing email Delete the Sara Goodwin malicious attachment email Delete the Grandma Jacklin forwarded email hoax Delete the Joe Davis malicious attachment email Delete the Executive Recruiting whaling email Explanation In this lab, you delete each malicious email. E-mail Diagnosis Action Description Microsoft Windows Update Center New Service Pack Phishing Delete Notice the various spelling errors and that the link does not direct you to a Microsoft website. Human Resources Ethics Video Safe Keep While this email has an embedded link, it is digitally signed, so you know it actually comes from your Human Resources department. In addition, if you hover over the link, you see that it is a secure link to the corporate web server. Online Banking Department Payment Pending Phishing Delete This is a carefully crafted attempt to get your bank account information. Hover over the link and notice that it does not direct you to your credit union website, but to an unknown IP address instead. Grandma Jacklin FW: FW: FW: Virus Attack Warning Hoax Delete Any email that asks you to forward it to everyone you know is probably a hoax. Emily Smith Website Update Spear Phishing Delete While this email appears to come from a colleague, notice that the link points to an executable file from a Russian domain name. This is probably not something a real colleague would send. This file will likely infect the computer with malware. Sara Goodwin Wow!! Malicious Attachment Delete Emails with attachments from random people who address you as "Dear Friend" are probably not safe. Grandma Jacklin Free Airline Tickets Hoax Delete Any email that asks you to forward it to everyone you know is probably a hoax, even if the contents promise you a prize. In addition, there is no way to know how many people the email has been forwarded to. Joe Davis Re: Lunch Today? Malicious Attachment Delete This email appears to be from a colleague. However, why would he fail to respond to your lunch question and send you a random attachment in return? Human Resources IMPORTANT NOTICE-Action Required Safe Keep While this email appears very urgent, it doesn't ask you to click on anything or run any attachments. It does inform you that you need to go a website that you should already know and make sure your courses are complete. Executive Recruiting Executive Jobs Whaling Delete Whaling attacks executives using information tailored specifically to them. Clicking on the link could install malware that would capture sensitive company information. Activities Committee Pumpkin Contest Safe Keep This email doesn't ask you to click on anything or run any attachments. Robert Williams Presentation Safe Keep This email doesn't ask you to click on anything or run any attachments.

1.2.3 Install a Security Appliance You are the IT security administrator for a small corporate network. You have already configured a network security appliance (NSA) with the settings necessary to connect to the Internet. Today, you will install the NSA. The router has been disconnected and configured to connect to the NSA. In this lab, your task is to perform the following: • Install the NSA into the rack's top slot and make the following connections: o Connect the power cable to the NSA through a critical bank outlet on the UPS. o Use a Cat5e cable to connect the NSA's WAN port to the left Ethernet port on the wall plate. The left Ethernet port connects to the internet through a shared building connection. o Use a Cat5e cable to connect one of the NSA's LAN ports to the existing router in the rack. • Turn on the power to the NSA. • Verify that the power and activity lights for all rack-mounted networking devices are still on and flickering. • Confirm that CorpServer in the first floor networking closet is properly connected to the internet through the NSA.

Task Summary Install the NSA into the rack's top slot Provide power to the NSA through an outlet on the UPS Use a Cat5e cable to connect the NSA's LAN port to the router Use a Cat5e cable to connect the NSA's WAN port to the left-hand Ethernet port on the wall plate Turn the NSA Confirm that CorpServer in the first floor Networking Closet is properly connected to the internet through the NSA Explanation Complete this lab as follows: 1. On the shelf, expand Security Appliances. 2. Drag the Network Security Appliance (NSA) from the shelf to the open slot at the top of the rack. 3. Under Workspace, select Back to switch to the back view of the rack. 4. On the shelf, expand Cables. 5. Supply power to the NSA as follows: a. Select the AC Power Cable from the shelf. b. Under Selected Component, at the bottom of the screen, drag the female AC power connector to the power port on the NSA. c. Drag the male AC power connector to an available plug in the critical load bank on the UPS. 6. Connect the NSA to the wall plate as follows: a. Select a Cat5e cable from the shelf. b. Under Selected Component at the bottom of the screen, drag the Cat5e cable to the WAN port on the NSA. c. Drag the Cat5e cable from the rack's Partial Connections list to the left Ethernet port on the wall plate. 7. Connect the NSA to the existing router as follows: a. Select a Cat5e cable from the shelf. b. Under the Selected Component window, drag one end of the cable to a LAN port on the NSA. c. Under Workspace, select Front to switch to the Front view of the rack. d. Drag the Cat5e cable from the rack's Partial Connections list to the WAN port on the router. 8. Click Power on the NSA to turn the power on. 9. Confirm that the link and activity lights on the NSA and the router are still on and blinking. 10. Verify that CorpServer is properly connected to the internet through the NSA as follows: a. From the top menu, select Floor 1. b. Select CorpServer. c. From the notification area, right-click the networking icon and select Open Network and Sharing Center. d. Under View your active networks, CorpNet.com, vEthernet (External), and vEthernet (Internal) should be listed.

4.1.4 Implement Physical Security You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices and assets in the building, and now you need to implement your plan. You plan to install smart card readers. Smart cards have the ability to encrypt access information. Smart cards can require contact or be contactless. Proximity cards, also known as RFID (radio frequency identification) cards, are a subset of smart cards that use the 125 kHz frequency to communicate with proximity readers. Proximity cards differ from smart cards because they are designed to only communicate the card's ID, but the smart card can communicate more information. You also plan to use IP security cameras because they operate over the TCP/IP network. In this lab, your task is to perform the following: • Install the smart card key readers. Install one reader at the building entrance and the other reader at the networking closet entrance. The key card readers should be contactless and record more than the card's ID. • Install the IP security cameras. Record which employees enter and exit the networking closet with security cameras. The security cameras should operate over the TCP/IP network. • Install the Restricted Access sign on the networking closet door. • Install the visitor log on the lobby desk. Create your physical security by dragging the correct items from the shelf into the various locations in the building. As you drag the items from the shelf, the possible drop locations are highlighted. Not all items on the shelf will be used.

Task Summary Install the smart card key readers Hide Details Install the card reader outside the building's front door Install the card reader outside the Networking Closet door Install the IP security cameras Hide Details Install the IP security camera inside the networking closet Install the IP security camera outside the networking closet Install the Restricted Access sign on the networking closet door Install the visitor log on the lobby desk Explanation In this lab, your task is to perform the following: • Install the smart card key readers • Install the IP security cameras • Install the Restricted Access sign on the networking closet door • Install the visitor log on the Lobby desk Complete this lab as follows: 1. Install the key card readers as follows: a. Expand the Door Lock category on the shelf. b. Drag a key card reader from the shelf to a highlighted wall just outside the building's front door. c. Drag a key card reader from the shelf to the highlighted wall just outside the networking closet. 2. Install the security cameras as follows: a. Expand the CCTV Cameras category on the shelf. b. Drag the correct camera from the shelf to the highlighted circle inside the networking closet. c. Drag the correct camera from the shelf to the highlighted circle just outside the networking closet. 3. Install the warning sign as follows: a. Expand the Restricted Access Signs category on the shelf. b. Drag the sign from the shelf to the networking closet door. 4. Install the visitor log as follows: a. Expand the Visitor Logs category on the shelf. b. Drag the log from the shelf to the lobby desk.


Conjuntos de estudio relacionados

Organic Chemistry- Chapter 15: Benzene and Aromaticity

View Set

Psychology Test 2 (chapters 3 & 6)

View Set

Maternity & Peds Unit 4 ch 12-14

View Set

Questions personnelles, faire du shopping

View Set

Chapter 49. Mythical Impressions: Program Music at the End of the Nineteenth Century

View Set

Supply Chain Management Ch. 6 MBA 6040

View Set

Marketing - Chapter 14: Direct, Online, Social Media, and Mobile Marketing

View Set