Of ccna security Lab Researching Network Attacks and Security Audit Tools Objectives Part 1: Researching Network Attacks



Download 101.38 Kb.
View original pdf
Page4/4
Date25.03.2021
Size101.38 Kb.
#56183
1   2   3   4
1.5.1.1 Lab - Researching Network Attacks and Security Audit Tools
Name of tool
Developer:
Type of tool (character-based or GUI
Used on (network device or computer host
Cost:
Description of key features and capabilities of product or tool
References and info links


Lab - Researching Network Attacks and Security Audit Tools
© 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Reflection
1. What is the prevalence of network attacks and what is their impact on the operation of an organization What are some key steps organizations can take to help protect their networks and resources
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2. Have you actually worked for an organization or know of one where the network was compromised If so, what was the impact to the organization and what did it do about it
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
3. What steps can you take to protect your own PC or laptop computer
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

Download 101.38 Kb.

Share with your friends:
1   2   3   4




The database is protected by copyright ©ininet.org 2024
send message

    Main page