NWC204
NWC204
Question:
List three available resources.
Tools
Newletters
Podcasts
@RISK provides a reliable weekly summary of (1) newly discovered attack vectors, (2)
vulnerabilities with active new exploits, (3) insightful explanations of how recent attacks worked,
and other valuable data
OUCH! is the world’s leading, free security awareness newsletter designed for the common
computer user. Published every month and in multiple languages, each edition is carefully
researched and developed by the SANS Securing The Human team, SANS instructor subject matter
experts, and team members of the community. Each issue focuses on and explains a specific topic
and actionable steps people can take to protect themselves, their family and their organization.
Question:
List some recent vulnerabilities. Browse multiple recent newsletters, if necessary.
https://www.infosecinstitute.com/resource-center/
List some of the recent security threats detailed on these websites. Ransomware,DDOS,Trojan
DDOS
Type of attack:
2020
Dates of attacks:
Amazon Web Services
Computers / Organizations
affected:
Mitigation options:
Immediate and automated updates as new forms of attack arise. Autoscaling of bandwidth and other
resources to absorb even massive volumetric attacks. Full visibility into incoming traffic (showing all details for
all requests)
Reflection Questions
1. What steps can you take to protect your own computer?
Answers will vary but could include keeping the operating system and applications up to date with
patches and service packs, using a personal firewall, configuring passwords to access the system and
bios, configuring screensavers to timeout and requiring a password, protecting important files by
making them read-only, and encrypting confidential files and backup files for safe keeping
2. What are some important steps that organizations can take to protect their resources?
Answers will vary but could include the use of firewalls, intrusion detection and prevention, hardening
of network devices, endpoint protection, network vulnerability tools, user education, and security policy
development.
What versions of SSH are supported from the CLI? Protocal v1; Protocal v2
Reflection Question
How would you provide multiple users, each with their own username, access to a network
device?
You would add each user’s username and password to the local database using
the username command. It is also possible to use a RADIUS or TACACS server, but this has not been
covered yet.
16.5.2 Lab - Secure Network Devices
Part1: Configure Basic Device Settings
Intentionally mistype the user and password information to see if login access is blocked after two
attempts.
What happened after you failed to login the second time?
The connection to R1 was disconnected. If you attempt to reconnect within 30 seconds, the connection
will be refused.
If you mistype this password, are you disconnected from your SSH session after three failed
attempts within 60 seconds? Explain.
No. The login block-for 120 attempts 3 within 60 command only monitors session login
attempts on VTY lines.
Show running config
After the 30 seconds has expired, SSH to S1 again and log in using the SSHadmin username and
55HAdm!n2020 for the password.
Question:
Did the banner appear after you successfully logged in?