You are on page 1of 18

Domain 2 Lesson 1

35 | Domain 2 Lesson 1: Protocols Using Encryption Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Fill-in-the-Blanks
Instructions: While watching Domain 2 Lesson 1, fill in the missing words according to the information presented by the
instructor. [References are found in the brackets.]

1. Computers and devices connected to a network are often referred to as nodes . [TCP, UDP, and
HTTP]

2. TCP, UDP, and HTTP often need security protocols to add security to network communication.
[TCP, UDP, and HTTP]

3. While executing a three-way handshake, the ACK flag is used to acknowledge a request. [TCP, UDP,
and HTTP]

4. An Address Resolution Protocol (ARP) request translates an IP address into a physical address, or
Media Access Control (MAC) address. [ARP, ICMP, DHCP, and DNS]

5. The most widely recognized ICMP packet is the ping packet. [ARP, ICMP, DHCP, and DNS]

6. After sending a DHCP request and receiving a proper response from a router, a new host will use that response to
set up a LAN connection. [ARP, ICMP, DHCP, and DNS]

7. DNS translates a domain name into an IP address. [ARP, ICMP, DHCP, and DNS]

36 | Domain 2 Lesson 1: Fill-in-the-Blanks Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
TCP, UDP, and HTTP Project Details
Project file
Network protocols are rules that computers and devices use to exchange N/A
messages across a network. A protocol defines the format and content of a
Estimated completion time
message. Transmission Control Protocol (TCP) and User Datagram Protocol
5-10 minutes
(UDP) provide the transport mechanism for most traffic across local area
networks (LANs) and the internet. At the same time, Hypertext Transfer Protocol Video reference
(HTTP) is the most common protocol used by web browsers and web servers. Domain 2
Topic: TCP/IP Protocol Vulnerabilities
Many protocols were designed before the emergence of the field of
Subtopic: TCP, UDP, and HTTP
cybersecurity. Therefore, these three protocols frequently require helper
protocols to ensure secure communication. Objectives covered
2 Basic Network Security Concepts
Purpose 2.1 Describe TCP/IP protocol
vulnerabilities
Upon completing this project, you will better understand the three most 2.1.1 TCP
common protocols used in today’s networks. 2.1.2 UDP
2.1.3 HTTP
Steps for Completion Notes for the teacher
If time permits, students should review
1. What step must occur before any two nodes can communicate over a
the following documentation from
network? Ionos further detailing TCP.
a TCP handshake https://www.ionos.com/digitalguide/ser
ver/know-how/introduction-to-tcp/

2. What does each of the following acronyms stand for?

a. TCP: Transmission Control Protocol

b. UDP: User Datagram Protocol

c. HTTP: Hypertext Transfer Protocol

3. Label the following statement as true or false.


false TCP, UDP, and HTTP communication consist of plaintext, making these three protocols
convenient and secure.

4. Before a TCP session, two nodes must negotiate the session. This process is known as a: C

A. TCP agreement

B. TCP contract

C. TCP handshake

D. TCP layout

5. UDP is often used to send packets to all nodes in a network, a process referred to as broadcasting a
message.

6. Briefly explain why the UDP protocol is not susceptible to the same half-open connection attack that threatens
TCP.
UDP is a connectionless protocol that doesn't store any active connections.

37 | Domain 2 Lesson 1: TCP, UDP, and HTTP Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
ARP, ICMP, DHCP, and DNS Project Details
Project file
In addition to TCP, UDP, and HTTP, several popular protocols support network N/A
operations. These protocols include Address Resolution Protocol (ARP), Internet
Estimated completion time
Control Message Protocol (ICMP), Dynamic Host Configuration Protocol (DHCP),
5-10 minutes
and Domain Name System (DNS). A security professional must have a solid
working understanding of each of these protocols to secure modern networks Video reference
and devices properly. Domain 2
Topic: TCP/IP Protocol Vulnerabilities
Purpose Subtopic: ARP, ICMP, DHCP, and
DNS
Upon completing this project, you will better understand how ARP, ICMP, DHCP,
Objectives covered
and DNS support everyday network operations. 2 Basic Network Security Concepts
2.1 Describe TCP/IP protocol
Steps for Completion vulnerabilities
2.1.4 ARP
1. LAN network switches keep internal tables which store 2.1.5 ICMP
the IP address and MAC (Media Access Control) address for each 2.1.6 DHCP
connected device. 2.1.7 DNS

2. A switch has just broadcasted an ARP request to find the MAC address Notes for the teacher
for an unknown node. Which event most likely triggered this If time permits, students should run the
nslookup command on at least five
action? D
domains and record the results. The
A. The switch has been unplugged. nslookup command should function
inside both Windows and Mac
B. The MAC address for the switch has been altered. terminals.

C. The internal MAC address table for the switch is misconfigured.

D. The switch received a packet from an unknown IP address.

3. Which command from the video reference can be used to retrieve an entire ARP table?
arp -a .

4. Why does a failed ping command not necessarily represent a host that is down?
Some servers block or ignore ICMP requests

5. DHCP allows nodes to perform what action?


Allow nodes to move between different networks

6. Once a router accepts a DHCP request, that router is responsible for selecting an IP address for that
device that falls within the appropriate range.

7. The nslookup command issues a DNS query and returns the IP address associated with a
hostname or domain.

38 | Domain 2 Lesson 1: ARP, ICMP, DHCP, and DNS Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Domain 2 Lesson 2

39 | Domain 2 Lesson 2: ARP, ICMP, DHCP, and DNS Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Fill-in-the-Blanks
Instructions: While watching Domain 2 Lesson 2, fill in the missing words according to the information presented by the
instructor. [References are found in the brackets.]

1. Internet Protocol (IP) defines how to determine a packet route from sender to receiver. [IPv4 and
IPv6 Addresses]

2. There are an estimated 46 billion devices connected to the internet today. [IPv4 and IPv6
Addresses]

3. The ipconfig command can be entered into a Windows command line to display the
configuration for all network adapters. [IPv4 and IPv6 Addresses]

4. Media Access Control (MAC) addresses provide a physical device address. [MAC Addresses and
Network Segmentation]

5. A network interface controller (NIC) is a networking device that connects a node to network media.
[MAC Addresses and Network Segmentation]

6. An IP address comprises two parts, the network address and the host address. [CIDR Notation]

7. The use of private IP addresses allows organizations to build large internal networks without
consuming any IP addresses from the public space. [NAT and Public vs. Private Networks]

8. Network Address Translation (NAT) allows nodes with private addresses to communicate
with external nodes. [NAT and Public vs. Private Networks]

40 | Domain 2 Lesson 2: Fill-in-the-Blanks Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
IPv4 and IPv6 Addresses Project Details
Project file
Internet Protocol (IP) is the most common network layer protocol. Like other N/A
protocols, IP can be considered a set of rules. This set of rules pertains to
Estimated completion time
routing and addressing packets, ensuring that packets arrive at the intended
5-10 minutes
destination. Two versions of IP are prevalent in modern networks, IPv4 and IPv6.
IPv4 cannot provide unique addresses to the estimated 46 billion devices Video reference
connected to the internet. IPv6 is a new version of IP with a much larger Domain 2
Topic: How Network Addresses
address, thus providing a massive number of potential addresses. Despite a
Impact Network Security
significant increase in the use of IPv6, IPv4 is likely to remain in use for the Subtopic: IPv4 and IPv6 Addresses
foreseeable future.
Objectives covered
Purpose 2 Basic Network Security Concepts
2.1 Describe TCP/IP protocol
Upon completing this project, you will better understand IPv4 and IPv6 vulnerabilities
addresses and the differences between each protocol. 2.2 Explain how network addresses
impact network security
Steps for Completion 2.2.1 IPv4 and IPv6 addresses

1. With an address space of 32 bits, IPv4 addresses can Notes for the teacher
If time permits, students should find
identify 4,294,967,296 unique devices. their own IPv4 and IPv6 addresses.
Students may need to use the ip -a
2. Which character is used to separate the four 8-bit numbers that make
command or ifconfig command on Mac
up an IPv4 address? and Linux machines.
period

3. Which character is used to separate different sections of an IPv6 address?


colon

4. Label the following statement as true or false.


true An IPv6 address is a 128-bit address. It is expressed as a series of 8-bit numbers, ranging from 0-
255.

5. Only about 20% of the address space for IPv6 addresses has been defined, which is enough to allocate
roughly 4000 addresses to each person on earth.

41 | Domain 2 Lesson 2: IPv4 and IPv6 Addresses Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
MAC Addresses and CIDR Project Details
Project file
Notation N/A

Estimated completion time


If networks exist, so too will the need correctly identify physical devices on those 5-10 minutes
networks. Domain names and IP addresses can identify a node; however, these Video reference
values are not permanently assigned to a physical device. Therefore, nodes Domain 2
require a unique identifier assigned to a physical device by the manufacturer. Topic: How Network Addresses
Networks use Media Access Control (MAC) addresses to provide physical device Impact Network Security
addresses. Subtopic: MAC Addresses and
Network Segmentation
IP addresses are commonly expressed in a notation that includes a slash
Objectives covered
followed by a number. This notation is called Classless Inter-Domain Routing
2 Basic Network Security Concepts
(CIDR) notation. CIDR is implemented to represent different sizes for public 2.1 Describe TCP/IP protocol
networks, and CIDR gives administrators the ability to assign IP addresses to vulnerabilities
organizations efficiently. 2.2 Explain how network addresses
impact network security
Purpose 2.2.2 MAC addresses
2.2.3 Network segmentation
Upon completing this project, you will better understand MAC addresses and
Notes for the teacher
CIDR notation.
If time permits, students should
experiment with a CIDR calculator like
Steps for Completion the one found at https://www.subnet-
calculator.com/cidr.php
1. How many bits are required to store a MAC address?
48

2. Briefly describe a network interface controller (NIC).


A hardware device that allows connection to a network, and provides a unique MAC address to the device

3. List two examples of how an administrator may choose to organize a network.

a. Physical Location

b. Category (Accounting)

4. The practice of separating a network into groups is known as network segmentation .

5. CIDR notation helps to express and interpret a network’s scope in a compact form.

6. The ipconfig command can be used to retrieve a device’s IP address and subnet mask which can
be used to determine the CIDR format for a device’s network.

7. What year was CIDR first introduced? (Hint: Use the webpage provided in the video reference.)
1993

42 | Domain 2 Lesson 2: MAC Addresses and CIDR Notation Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Public vs. Private Networks Project Details
Project file
For several years there have been far more devices connected to the internet N/A
than there are possible IPv4 addresses. Fortunately, the designers of IPv4 set
Estimated completion time
aside reserved address ranges that are not part of the public address pool. An
5-10 minutes
organization may only need a single public IP address, and all other IP addresses
will come from the range of private addresses. Packets that use a private Video reference
address never leave a network. Therefore, any number of organizations can use Domain 2
Topic: How Network Addresses
the same set of private addresses.
Impact Network Security
Private network packets can leave that network through Network Address Subtopic: NAT and Public vs.
Private Networks
Protocol (NAT). The NAT protocol is used to replace the private IPv4 address
with the organization's public IP address when a packet is sent outside of a Objectives covered
private network. The router also adds a note to its translation table for later use. 2 Basic Network Security Concepts
NAT enables nodes with private addresses to communicate with external nodes 2.1 Describe TCP/IP protocol
vulnerabilities
while also helping to hide actual IP addresses from the outside world.
2.2 Explain how network addresses
impact network security
Purpose 2.2.5 NAT
2.2.6 Public vs. private networks
Upon completing this project, you will better understand NAT, public networks,
and private networks. Notes for the teacher
If time permits, students should review
Steps for Completion the following webpage from Cisco
featuring FAQs regarding NAT.
1. Describe the purpose of public IP addresses. https://www.cisco.com/c/en/us/support
Allows a single public IP address to be used for an organization, so that all other
/docs/ip/network-address-translation-
nat/26704-nat-faq-00.html
devices connected use a private IP, as a bandage for the limit to how many
IPv4 addresses there are.

2. Describe the following statement in greater detail: Private IP addresses are non-routable.
Private IP addresses are only use for internal networks, as they cannot be routed on the internet due to IP duplication.

3. Fill in the ranges for the three most common private IPv4 networks.

a. Small: 192.168.0.0 to 192.168.255.255

b. Medium: 172.16.0.0 to 172.31.255.255

c. Large: 10.0.0.0 to 10.255.255.255

4. How many hosts can the largest private network address?


16,777,216

5. When a border router receives a response from a packet that it sent outside of a private network, it uses the note
in its translation table to replace the destination IPv4 address with the correct private address.

43 | Domain 2 Lesson 2: Public vs. Private Networks Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Domain 2 Lesson 3

44 | Domain 2 Lesson 3: Public vs. Private Networks Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Fill-in-the-Blanks
Instructions: While watching Domain 2 Lesson 3, fill in the missing words according to the information presented by the
instructor. [References are found in the brackets.]

1. Network security architecture refers to how a network is organized to operate efficiently and
resist interruptions . [Network Security Architecture and DMZ]

2. A demilitarized zone (DMZ) is a network segment with at least two firewalls . [Network Security
Architecture and DMZ]

3. Virtualization is the practice of running multiple operating systems simultaneously on a single


physical computer. [Virtualization and Cloud]

4. Oracle VM is free virtualization software that runs on many popular operating systems.
[Virtualization and Cloud]

5. A honeypot is a deliberately insecure computer that is connected to your network. [Honeypot,


Proxy Server, IDS, and IPS]

6. Proxy servers often use rules to determine the best action to take for a message. [Honeypot, Proxy
Server, IDS, and IPS]

7. An intrusion detection system (IDS) is a passive network device that examines packets and
compares each one to a database of malicious patterns. [Honeypot, Proxy Server, IDS, and IPS]

45 | Domain 2 Lesson 3: Fill-in-the-Blanks Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Network Security Architecture Project Details
Project file
Network security architecture refers to the overall structure of a network and its N/A
effect on operations and interruptions. A network with a robust architecture
Estimated completion time
should provide redundancy and resilience. It is important to note that the
5 minutes
primary goal of any network security architecture is to avoid interruption.
Video reference
One common extension to a basic network is the inclusion of a network Domain 2
segment called a demilitarized zone (DMZ). A DMZ is commonly made up of Topic: Network Infrastructure and
two or more firewalls separating public-facing services from internal resources. Technologies
The purpose of a DMZ is to provide internet access to services and data while Subtopic: Network Security
Architecture and DMZ
also protecting internal resources.
Objectives covered
Purpose 2 Basic Network Security Concepts
2.3 Describe network infrastructure
Upon completing this project, you will better understand network security and technologies
architecture, and you will also better understand the purpose of a DMZ. 2.3.1 Network security architecture
2.3.2 DMZ
Steps for Completion
Notes for the teacher
1. A network with a robust architecture should include devices If time permits, students should review
and protocols that prevent, detect, and resist attacks. several examples of network diagrams
at the webpage below. Example 10
2. What two elements make up a basic network? features an example of a DMZ.
https://www.edrawmax.com/article/net
a. nodes work-diagram-examples.html

b. media

3. Networks that include security components will also contain network security devices, segmented
networks, and redundant media.

4. An administrator is implementing a DMZ to protect sensitive internal network resources from bad actors on the
internet. Which element of a website should exist between two firewalls?
Web server

46 | Domain 2 Lesson 3: Network Security Architecture Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Virtualization and Cloud Project Details
Project file
Virtualization is a term used to describe the practice of running multiple N/A
operating systems on a single computer. In the past, an operating system
Estimated completion time
primarily served as an intermediary between a user and computer hardware.
5 minutes
Virtualization allows organizations to extract significant amounts of value from
their equipment, allowing them to run several different operating systems on Video reference
one set of physical hardware. Virtualization technology also makes it easy to Domain 2
Topic: Network Infrastructure and
suspend a virtual machine and restart it later. Suspended virtual machines can
Technologies
also be migrated to different physical computers. Subtopic: Virtualization and Cloud
Cloud computing describes the delivery of computing services over the internet. Objectives covered
These services include servers, databases, networking infrastructure, software, 2 Basic Network Security Concepts
and more. Some popular cloud computing providers are Amazon (Amazon Web 2.3 Describe network infrastructure
Services or AWS), Microsoft (Azure), and Google (Google Cloud). and technologies
2.3.3 Virtualization
Purpose 2.3.4 Cloud

Notes for the teacher


Upon completing this project, you will better understand virtualization and
If time permits, students should
cloud computing. experiment creating a virtual machine. If
students are using Windows
Steps for Completion Professional, they may use a program
called Hyper-V. Otherwise, students
1. In virtual systems, a hypervisor simulates the physical may use either VMWare or Oracle
hardware and allows operating systems to run. VirtualBox. In most cases default
settings will suffice.
2. Cloud computing is a broad term that refers to easily-
accessed services and media that
clients can easily consume.

3. The ease of creating, moving, and managing images on running systems are also convenient for
building standardized virtual machines.

4. Public clouds are virtual machines and virtual environments that can be leased .

5. Ubuntu is a popular linux distribution.

47 | Domain 2 Lesson 3: Virtualization and Cloud Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Honeypots, Proxy Servers, IDS, Project Details
Project file
and IPS N/A

Estimated completion time


Several network devices are designed to address certain aspects of an attack 5-10 minutes
surface. Honeypots, proxy servers, intrusion detection systems (IDS), and Video reference
intrusion prevention systems (IPS) provide a variety of layers of control to Domain 2
networks. Security professionals should have a solid understanding of each of Topic: Network Infrastructure and
these as each device uses a different strategy to avoid and detect cyberthreats. Technologies
Subtopic: Honeypot, Proxy Server,
A honeypot is a computer on a network that is deliberately configured in an IDS, and IPS
unsecure manner to mislead attackers. A proxy server receives messages from
Objectives covered
one entity and then forwards them to its destination. Based on incoming and
2 Basic Network Security Concepts
outgoing packets, an intrusion detection system (IDS) and intrusion prevention 2.3 Describe network infrastructure
system (IPS) can take steps to mitigate a potential attack. An IDS can help detect and technologies
potential malicious network activity and alert administrators. However, an IDS 2.3.5 Honeypot
does not take active steps against a threat. An IPS operates similarly to an IDS. 2.3.6 Proxy server
2.3.7 IDS
However, an IPS can change a network to aid in the defense of protected assets.
2.3.8 IPS
The security professional must layer different controls and configure each
Notes for the teacher
control properly, keeping in mind the specific details about the devices and If time permits, students should review
networks they seek to secure. the following article from Okta further
detailing the differences between and
Purpose IDS and IPS.
https://www.okta.com/identity-101/ids-
Upon completing this project, you will better understand standard network vs-ips/
devices designed to provide layers of control to a network.

Steps for Completion


1. Describe the primary purpose of configuring a honeypot.
It is used to attract an attack with an easy target, in order to collect information on their origination location and other details.

2. Honeypots should never be considered substitutes for controls to protect other valuable resources.

3. What is a proxy server?


A server that works between two devices, and monitors traffic based on rules to determine on whether to reject or accept
sending the traffic

4. Which network device separates approved traffic from unapproved traffic?


firewall

5. Which two examples are given in the video reference for steps an IPS may take against a potential attack?
Blocking of an IP address or closing a certain port

48 | Domain 2 Lesson 3: Honeypots, Proxy Servers, IDS, and IPS Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Domain 2 Lesson 4

49 | Domain 2 Lesson 4: Honeypots, Proxy Servers, IDS, and IPS Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Fill-in-the-Blanks
Instructions: While watching Domain 2 Lesson 4, fill in the missing words according to the information presented by the
instructor. [References are found in the brackets.]

1. A little effort invested in securing your wireless networks can significantly reduce your attack
surface. [MAC Address Filtering]

2. Anyone who connects to an open wireless network can view what other wireless users send
and receive. [Encryption Standards, Protocols, and SSID]

3. Security professionals may harden a wireless network by disabling the Service Set Identifier (SSID)
broadcast. [Encryption Standards, Protocols, and SSID]

4. While in personal mode, WPA and WPA2 use a private key that clients must know. [Encryption
Standards, Protocols, and SSID]

5. A packet inspection firewall is the most basic firewall. [ACL and Firewall]

6. A VPN creates an end-to-end connection between a client and a server inside a business’s internal
network. [VPN]

7. In most cases, using a VPN helps to avoid blocked website usage. [VPN]

8. Network access control (NAC) implements controlled remote access through policies and
setting minimum device requirements. [NAC]

50 | Domain 2 Lesson 4: Fill-in-the-Blanks Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Setting up a Secure Wireless Project Details
Project file
SOHO Network N/A

Estimated completion time


Attackers frequently seek unsecured wireless networks as a means of launching 5-10 minutes
attacks. An administrator or home user can take simple steps to harden their Video reference
network and reduce their attack surface. One of the most effective ways of Domain 2
securing a wireless network is MAC address filtering, which can be configured Topic: Set Up a Secure Wireless
on most SOHO routers. SOHO Network
Subtopic: MAC Address Filtering;
Wireless security protocols are essential for protecting data that travels through Encryption Standards, Protocols,
a wireless network. Without wireless security protocols, any user on a network and SSID
can view all transmissions in plaintext. This project will cover several wireless
Objectives covered
security protocols and the effectiveness of each. Wireless security protocols 2 Basic Network Security Concepts
covered in this project include Wired Equivalent Privacy (WEP) and several 2.4 Set up a secure wireless SOHO
variations of Wi-Fi Protected Access (WPA). network
2.4.1 MAC address filtering
Security professionals may also choose to harden a wireless network by 2.4.2 Encryption standards and
disabling the Service Set Identifier (SSID) broadcast. However, this technique protocols
does little to secure a network if an attacker can identify a network by any other 2.4.3 SSID
method. Notes for the teacher
If time permits, students should review
Purpose the RADIUS protocol from Objective
1.3.2.
Upon completing this project, you will better understand MAC address filtering,
and you will also better understand encryption standards and protocols.

Steps for Completion


1. Describe the most secure approach when configuring known MAC addresses on a wireless network.

2. Match the wireless security options to their descriptions.

A. WEP B. WPA C. WPA2

a. C The first wireless security protocol to use the AES algorithm.

b. B Introduced to address the weaknesses of WEP.

c. A Not secure at all. Possible to crack in a matter of minutes.

3. In your own words, describe an SSID broadcast.


Brodcasts the SSID to all devices nearby, for easier connection to a network without entering the SSID name.

4. While in enterprise mode, the WPA and WPA2 wireless security protocols use which type of server to manage
connections?
RADIUS server

51 | Domain 2 Lesson 4: Setting up a Secure Wireless SOHO Network Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition
Implement Secure Access Project Details
Project file
Technologies N/A

Estimated completion time


In a network architecture, a firewall inspects packets and determines whether to 5-10 minutes
allow those packets to reach their destination based on ports and protocols. Video reference
Firewalls can be hardware-based or software-based. In some cases, firewalls can Domain 2
be embedded in other devices, like routers and switches. Firewalls are widely Topic: Implement Secure Access
used and trusted in managing traffic in and out of a network. An administrator Technologies
may configure multiple firewalls for a particular architecture in certain situations. Subtopic: ACL and Firewall; VPN;
NAC
A firewall uses an access control list (ACL) to determine what action to take on a
packet. Objectives covered
2 Basic Network Security Concepts
Due to increased remote computing, virtual private networks (VPNs) have 2.5 Implement secure access
become increasingly vital to business operations. A VPN ensures that all traffic technologies
traveling through a VPN tunnel is encrypted. With an increase in remote 2.5.1 ACL
computing, the need for remote authentication has also increased. Network 2.5.2 Firewall
2.5.3 VPN
access control (NAC) manages remote access to internal resources through
2.5.4 NAC
authentication and enforcement of minimum device requirements.
Notes for the teacher
Purpose If time permits, students should explore
the Windows Defender Firewall with
Upon completing this project, you will better understand how to implement Advanced Security window on their
secure access technologies. Windows OS for a better understanding
of firewalls and ACLs.
Steps for Completion
1. A packet inspection firewall will inspect which four attributes of a packet
to determine whether traffic is authorized or not?

a.

b.

c.

d.

2. What three actions can an ACL decide to take on network traffic?

a.

b.

c.

3. List four popular VPN protocols.

a.

b.

c.

d.

52 | Domain 2 Lesson 4: Implement Secure Access Technologies Cisco Certified Support Technician: Cybersecurity Project Workbook, First Edition

You might also like