Of ccna security Lab Researching Network Attacks and Security Audit Tools Objectives Part 1: Researching Network Attacks


Part 2: Researching Security Audit Tools



Download 101.38 Kb.
View original pdf
Page3/4
Date25.03.2021
Size101.38 Kb.
#56183
1   2   3   4
1.5.1.1 Lab - Researching Network Attacks and Security Audit Tools
Part 2: Researching Security Audit Tools
In Part 2 of this lab, research network security audit and attacker tools. Investigate one that can be used to identify host or network device vulnerabilities. Fill in the report below based on your findings.
Step 1: Research various security audit and network attack tools.
List some of the tools that you identified in your search.
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Step 2: Fill in the following form for the security auditor network attack tool selected.

Download 101.38 Kb.

Share with your friends:
1   2   3   4




The database is protected by copyright ©ininet.org 2024
send message

    Main page