202310_CRS180_VU21991_AT2of2_EM_V9_Aminda Wimalagunaratna (3)
docx
keyboard_arrow_up
School
National Business Institute Inc. *
*We aren’t endorsed by this school
Course
MISC
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
26
Uploaded by MinisterGoldfish177
CRS180
Revision 101
May 2018
Page 1
OFFICI
AL
Assessment Task 2: Skills Assessment Student Version
Section A – Program/Course details
Qualification code:
22334VIC
Qualification title:
Certificate IV in Cyber Security
Unit code:
VU21991
Unit title:
Implement network security infrastructure for an organisation
Department name:
12517
Section B – Assessment task details
Assessment number: 2 of 2
Semester/Year:
1 & 2 /2023
Due date:
Ongoing
Duration of assessment:
Ongoing
Assessment method
Assessment task results
☒
Ungraded result
☐
Other: Click here to enter text.
Section C – Instructions to students
Task instructions:
This assessment is a portfolio of evidence and has 4 parts. You need to provide answers to knowledge questions, in
your own words and screenshots of your configuration of the network devices (Routers/switches/PC and Server as shown in project).
Part 1: Identifying the project requirements
Each response in your own words should be 50-100 words long.
Part 2: Configure Basic Device Settings
Implement and demonstrate your configuration to the scenario (brief) given in the supporting document section of this assessment. You are required to take screenshots of your work as you successfully configure and secure the network. Part 3: Control Administrative Access of Routers and securing the devices
Implement and demonstrate your solution to the scenario (brief) given in the supporting document section of this assessment. You are required to take screenshots of your work as you successfully configured and secured the network. Part 4: Implementing firewall technologies
Implement and demonstrate your solution to the scenario (brief) given in the supporting document section of this assessment. You will be required to take screenshots of your work as you successfully configured and secured the network
Once learners have completed all the questions, the assessment must be uploaded and submitted along with the signed assessment coversheet via Brightspace.
If a supplied answer is incorrect or requires further information, the learner will be requested to correct the issues and resubmit the assessment via Brightspace.
If not successful within the enrolment period as per Holmesglen assessment procedure, you will be requested to resubmit within seven days of receiving feedback. You are permitted two resubmissions per assessment task.
Section D – Conditions for assessment Conditions: FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 2
OFFICI
AL
Assessment Task 2: Skills Assessment Section D – Conditions for assessment Student to complete and attach Assessment Submission Cover Sheet to the completed Assessment Task.
• This assessment is to be completed individually.
• You must successfully complete all criteria listed in the marking guide to be satisfactory in this task.
• You may resubmit this task if not successful within the enrolment period. You will have 7 days from receiving feedback to resubmit this task. You are permitted two resubmissions per assessment task.
• You are expected to dedicate time to developing this assessment task both in and out of the classroom.
• This assessment task must be uploaded to Brightspace along with a complete and signed coversheet. • It is expected all documents will be completed and submitted electronically but if this is not possible, make an alternative arrangements for submitting the documents with your teacher prior to the due date.
• You can appeal an assessment decision according to the Holmesglen Assessment Complaints and Appeals Procedure.
• If you feel you require special allowance or adjustment to this task, please discuss with your assessor within one week prior to the due date of this task.
• The learner may use the internet to research answers for this assessment. All answers must be in your own words
and resources used to answer the question must be cited (e.g., APA or IEEE style)
Equipment/resources students must supply:
Equipment/resources to be provided by the RTO:
Students intending to learn remotely will require access to:
A PC/laptop with the following minimum specification: Quad Core CPU • 16GB of RAM • CPU with minimum 2ghz processor or faster
• 250GB of Storage
• Windows 10 OS, or virtual machine installed with Windows
10 OS (available free from https://developer.microsoft.com/en-us/windows/downloads/v
irtual-machines/ or https://www.microsoft.com/en-us/evalcenter/evaluate-
windows-10-enterprise)
• Monitor 24" (PC only, dual monitor optional but preferred)
• Headset with microphone & webcam • Access to internet connection (ADSL or cable connection desirable)
• Access to Netlab
• LinkedIn Learning (free access via Holmesglen’s Brightspace, or log in through LinkedIn.com)
Applications:
• Microsoft Word - access through Holmesglen MyHorizon
• WebEx (free to download)
• Cisco Packet Tracer
• 7Zip or an equivalent compression utility - free to download
• Google Chrome – recommended web browser
• Onedrive or google drive/dropbox account for storage (free via Holmesglen OneDrive, or google drive, or dropbox, alternatively, student can purchase an external SSD hard disk with minimum of 250gb, prices will vary)
• Login access to Cisco NetAcad
• Login access to Brightspace
• Installed VMware workstation Pro (available free through Holmesglen OnTheHub
• Installed Kali Linux (free to download)
This is an online learning course and as such the learner will access their own computer equipment as per the specification provided. The Institute will provide the following:
• Access to My Horizon
• Access to Cisco Academy
• Access to Brightspace
• Access to NetLab
• Access to Holmesglen OnTheHub
• Access to LinkedIn Learning
Applications:
• Microsoft 365
• WebEx • Cisco Packet Tracer
• 7Zip • Google Chrome • Onedrive • Cisco NetAcad
• Brightspace
• VMware workstation Pro • Kali Linux
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 3
OFFICI
AL
Assessment Task 2: Skills Assessment Section E – Marking Sheet - Student Answer Sheet Unit code:
VU21991
Unit title:
Implement network security infrastructure for an organisation
Project/Report/Portfolio task
Criteria for assessment
Satisfactory
Comment
Yes
No
The following has been submitted for assessment:
Part 1 - Identifying the project requirements
☒
☐
Part 2 – Configure Basic Device Settings ☒
☐
Part 3 - Control Administrative Access for Routers ☒
☐
Part 4 – Implemented firewall technologies ☐
☒
Marking criteria:
Part 1 - Identifying the project requirements: Criteria below relate to the project requirements in Assessment Documentation
1.
The client network security architecture requirements have been identified as per client brief Part 1 by the learner.
☒
☐
2.
The learner has identified three (3) core needs for the client ☒
☐
3.
The learner has identified three (3) current cyber security threats
and attacks experienced by the client.
☒
☐
4.
The learner has described two (2) network security testing methodologies that could be used to test for vulnerabilities based on the brief.
☒
☐
Part 1 - Identifying the project requirements
Based on the information you have gathered from the brief complete the following:
1.
Identify the network security architecture required by the client.
Given the security challenges faced by Impossible Triangle, it is essential to design a comprehensive security architecture to protect the company's systems and networks. Here are some key components that could
be part of the security architecture:
Deploying firewalls at network perimeters and between different network segments can help filter and block unauthorized access attempts, including intrusion attempts and denial-of-service attacks. Implementing an IDPS can monitor network traffic and systems for suspicious activities and potential security breaches. It can detect and respond to attacks such as Trojans, DoS, DDoS, and man-in-the-middle attacks. Separating the network into segments with different security levels can help contain security incidents. By isolating critical systems and limiting access between FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 4
OFFICI
AL
Assessment Task 2: Skills Assessment network segments, the impact of a security breach can be minimised. What does this business do? What services to they offer? What are the requirements?
2.
After reading and interpreting the brief, list three (3) of the client’s core needs.
1)Improved Web Security: Impossible Triangle requires a
robust security solution to protect their website from unauthorized access, attacks, and vulnerabilities. This includes addressing issues such as Trojans, DoS, DDoS,
Spoofing, Phishing, Spear phishing, Man-in-the-middle attacks, and password attacks.
2)Secure Network Infrastructure: The client needs to ensure that their network devices are properly configured
with best practice security settings. This includes addressing default passwords and implementing correct network device configurations to mitigate potential security risks.
3)Reliable and Efficient Order Fulfillment: As the leading 3D printing service, Impossible Triangle's core need is to provide reliable and efficient order fulfillment to their clients. This involves securely processing and printing clients' 3D designs, ensuring timely shipping within the specified business days, and maintaining the confidentiality and integrity of clients' data throughout the process.
3.
Identify at least three (3) modern cyber security threats and attacks the client has been experiencing.
Based on the provided information, the client, Impossible Triangle, has been experiencing the following modern cybersecurity threats and attacks:
i)Distributed Denial of Service (DDoS) Attacks: DDoS attacks involve overwhelming a target's network or website with a flood of traffic, rendering it unavailable to legitimate users. Impossible Triangle's strong web presence and high web traffic have made it a target for DDoS attacks, resulting in service disruption and potential financial losses.
ii)Phishing and Spear Phishing Attacks: Phishing attacks involve sending deceptive emails or messages to trick individuals into revealing sensitive information, such as login credentials or financial details. Spear phishing attacks are more targeted and personalized, aiming to trick specific individuals within the organization. Impossible Triangle has experienced both types of attacks, potentially compromising employee and customer data.
iii)Man-in-the-Middle (MitM) Attacks: In a MitM attack, an attacker intercepts and alters communication between two parties without their knowledge. These modern cybersecurity threats and attacks pose significant risks to Impossible Triangle's operations, data security, and customer trust. It is essential for the company to address these vulnerabilities and implement robust security measures to prevent and mitigate such FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 5
OFFICI
AL
Assessment Task 2: Skills Assessment attacks in the future.
4.
Describe two (2) network security testing methodologies that could be used to test for vulnerabilities based on the brief.
Based on the brief, two network security testing methodologies that could be used to test for vulnerabilities in Impossible Triangle's network are:
Penetration Testing: Penetration testing, also known as ethical hacking, involves simulating real-world attacks to identify vulnerabilities in a network and its systems. A skilled cybersecurity professional or team, acting as an attacker, attempts to exploit weaknesses in the network's defences. They employ various techniques, such as vulnerability scanning, network mapping, and targeted exploitation, to gain unauthorized access to systems, expose security flaws, and provide recommendations for remediation.
Security Audits and Configuration Reviews: Conducting security audits and configuration reviews involves a thorough examination of the network devices and configurations to ensure they adhere to best practices and industry standards. This assessment aims to identify any misconfigurations, default or weak passwords, unnecessary services or open ports, and other security vulnerabilities that could be exploited. Part 2 - Configure Basic Device Settings
Based on the information you have gathered from the brief
configure network devices.
Skills to be observed during this task to the required standard
The following questions are to be answered in relation to the scenario outlined in the instruction 1. Date:
2. Date: 3. Date: Comment
01/08/23
Satisfactory
Satisfactory
Satisfactory
Yes
No
Yes
No
Yes
No
1.
The learner satisfactorily demonstrates the configuration of network devices
☒
☐
☐
☐
☐
☐
2.
The learner is able to verify the connectivity
☒
☐
☐
☐
☐
☐
Part 2: Questions Evidence of basic configure Basic Device Settings
Question 1:
Use the IP addressing table provided to configure basic IP
addressing for routers and PCs and allocate privileges.
Note. Please provide screenshots of configuration below
including your name and student id visible in a notepad
document.
(Use Cisco Packet Tracer)
Satisfactory response
Yes ☒
No ☐
Answer:
Comment:
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 6
OFFICI
AL
Assessment Task 2: Skills Assessment Screenshot of Topology
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 7
OFFICI
AL
Assessment Task 2: Skills Assessment Routing
R1
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 8
OFFICI
AL
Assessment Task 2: Skills Assessment R2
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 9
OFFICI
AL
Assessment Task 2: Skills Assessment FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 10
OFFICI
AL
Assessment Task 2: Skills Assessment FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 11
OFFICI
AL
Assessment Task 2: Skills Assessment R3
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 12
OFFICI
AL
Assessment Task 2: Skills Assessment Question 2:
Take a screenshot of
verifying the connectivity between hosts and
routers. (Use Ping and traceroute
commands)
Note. Please provide screenshots of configuration below
including your name and student id visible in a notepad
document.
(Use Cisco Packet Tracer)
Satisfactory response
Yes ☒
No ☐
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 13
OFFICI
AL
Assessment Task 2: Skills Assessment Answer:
Comment:
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 14
OFFICI
AL
Assessment Task 2: Skills Assessment FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 15
OFFICI
AL
Assessment Task 2: Skills Assessment Part 3 - Control Administrative Access for routers & apply security restrictions
Based on the information you have gathered from the brief
secure administrative access to network devices and apply apply Security restrictions
Skills to be observed during this task to the required standard
The following questions are to be answered in relation to the scenario outlined in the instruction 1. Date:
2. Date: 3. Date: Comment
01/08/23
Satisfactory
Satisfactory
Satisfactory
Yes
No
Yes
No
Yes
No
1.
The learner is able to secure and control administrative access for Routers.
☒
☐
☐
☐
☐
☐
2.
The learner is able to configure local authentication, authorization, and accounting (AAA).
☒
☐
☐
☐
☐
☐
3.
The learner is able to configure SSH, minimum password requirement, user account privileges, banners and encrypt passwords.
☒
☐
☐
☐
☐
☐
4.
The learner is able to verify the connectivity.
☒
☐
☐
☐
☐
☐
Part 3: Questions Refer to part 3 requirements of the Supporting document (Please provide screenshots of configuration below including your name and student id visible in a notepad document)
Question 1:
Secure and control administrative access for Routers.
Satisfactory response
Yes ☒
No ☐
Answer:
Comment:
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 16
OFFICI
AL
Assessment Task 2: Skills Assessment FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 17
OFFICI
AL
Assessment Task 2: Skills Assessment FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 18
OFFICI
AL
Assessment Task 2: Skills Assessment FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 19
OFFICI
AL
Assessment Task 2: Skills Assessment Question 2:
Configure local authentication, authorization, and accounting (AAA).
Satisfactory response
Yes ☒
No ☐
Answer:
Comment:
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 20
OFFICI
AL
Assessment Task 2: Skills Assessment Part 4 – Implemented firewall technologies Based on the information you have gathered from the brief
Configure, Apply and Verify an ACL
Skills to be observed during this task to the required standard
The following questions are to be answered in relation to the scenario outlined in the instruction 1. Date:
2. Date: 3. Date: Comment
01/08/23
Satisfactory
Satisfactory
Satisfactory
Yes
No
Yes
No
Yes
No
1.
The learner is able to configure an “Extended ACL” as per the required specifications.
☐
☒
☐
☐
☐
☐
2.
The learner is able to apply this ACL on the correct router interface
☒
☐
☐
☐
☐
☐
3.
The learner is able to verify ACL configuration
☐
☒
☐
☐
☐
☐
Part 4: Questions Refer to part 4 requirements of the Supporting document (Please provide screenshots of configuration below FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
CRS180
Revision 101
May 2018
Page 21
OFFICI
AL
Assessment Task 2: Skills Assessment including your name and student id visible in a notepad document)
Question 1:
Create an “Extended ACL” Satisfactory response
Yes ☐
No ☒
Answer:
Comment:
Question 2:
Apply this ACL on the correct router interface
Satisfactory response
Yes ☒
No ☐
Answer:
Comment:
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 22
OFFICI
AL
Assessment Task 2: Skills Assessment Question 3:
Verify ACL configuration using PING, HTTP and HTTPS protocols.
Satisfactory response
Yes ☐
No ☒
Answer:
Screenshots of Pinging PC-C to PC-A
Screenshot of HTTPS from PC-C to PC-A
Comment:
Aminda, ping and https should be permitted. HTTP should be denied. You need to fixed your ACL configurations.
Please watch my recording
in Brightspace to help you with this task.
-Eddie
This is your access-list Aminda. This is incorrect, you have to deny http from host 192.168.3.3 to destination 192.168.1.3.
Second to permit HTTPS from PC-C to PC-A. Third is to allow ping from PC-C to PC-A. The screenshots you are showing are all correct. But
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 23
OFFICI
AL
Assessment Task 2: Skills Assessment Screenshot of HTTP from PC-C to PC-A
Matches
when I checked your Packet Tracer, it is not showing the same output as your screenshots.
Please resubmit again on the 15
th
of August 23. If you
are not sure what to do message me in Webex chat or attend the Friday support session at 4PM.
Cheers,
Eddie
Assessment Submission Cover Sheet (VET)
Student Declaration – Must be signed before submission
By submitting this assessment task and signing the below, I acknowledge and agree that:
• This completed assessment task is my own work. • I understand the serious nature of plagiarism and I am aware of the penalties that exist for breaching this.
• I have kept a copy of this assessment task. • The assessor may provide a copy of this assessment task to another member of the Institute for validation and/or benchmarking purposes.
Student ID:
100640117
Student name:
Aminda Wimalagunaratna
Submission or observation date:
Student signature
For electronic submissions: By typing your name in the student signature field, you are accepting the above declaration.
Aminda Wimalagunaratna
Section F – Feedback to Student
Has the student successfully completed this assessment task?
Yes
No
☐
☑
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 24
OFFICI
AL
Assessment Task 2: Skills Assessment Section F – Feedback to Student
Additional Assessor comments (as appropriate): Aminda thank you for your submission of Assessment Task 2. Great work on answering most of the assigned task correctly. Please focus on my comments on the document and have another attempt at completing the task. Use the marked assessment attached and resubmit the updated assessment with your new answers within the next 7 days.
Resubmission date: 8 August 2023
Aminda unfortunately your resubmission is still not satisfactory. Please read my newest feedback on the document. Please resubmit again on the 15th of August 23
. If you are not sure what to do message me in Webex chat or attend the Friday support session at 4PM.
Resubmission allowed:
Yes ☐
No ☐
Resubmission due date:
015/08/2023
Assessor name:
Edsel Morales
Assessor signature:
Edsel Morales
Date assessed:
08/08/23
Supporting document
Project Brief Read thought the brief below take note of the needs and requirements outlined in the brief. Introduction
Since its inauguration, Impossible Triangle (name of company) has been defining the 3D printing industry. Founded in
2011, Impossible Triangle is led by people who've spent most of their careers in startups, and combine serious
technical knowledge with an inspiring vision of what the world could be. They bring together a passionate, dynamic
team of game changers. Impossible Triangle is the worlds’ leading 3D Printing Service. Impossible Triangle enables everyone to bring his or
her ideas to life. Clients can login to a backend portal and upload their 3D designs to place instant order. Clients’
orders are printed and shipped within 30 business days. Problem
Impossible Triangle has a strong web presence and the recent update to the website has drawn much interest from
public and hence experiencing high web traffic. Unfortunately, their new website has been used as a gateway to
access servers and the local network of the company. Consequently, Impossible Triangle has been experiencing
many typical security attacks from Trojans, DoS, DDoS, Spoofing, Phishing, Spear phishing, Man in the middle and
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 25
OFFICI
AL
Assessment Task 2: Skills Assessment Password attacks in the past 6 months.
Project requirements
It is crucial that all network devices be configured with at least a minimum set of best practice security setting.
Unfortunately, this hasn’t been done. The network device topology shown below has the potential of offering a robust
security solution, but there is a problem due to default passwords and incorrect network device configuration.
(Aspects of this document has been taken from CCNA Security - Skills Assessment, which is Cisco Public
document)
Connect the devices as per topology shown below:
Use the following addressing table to give IP addressing.
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
Switch Port
R1
G0/1
192.168.1.1
255.255.255.0
N/A
S1 F0/5
S0/0/0 (DCE)
10.1.1.1
255.255.255.252
N/A
N/A
R2
S0/0/0
10.1.1.2
255.255.255.252
N/A
N/A
S0/0/1 (DCE)
10.2.2.2
255.255.255.252
N/A
N/A
R3
G0/1
192.168.3.1
255.255.255.0
N/A
S3 F0/5
S0/0/1
10.2.2.1
255.255.255.252
N/A
N/A
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
S1 F0/6
PC-C
NIC
192.168.3.3
255.255.255.0
192.168.3.1
S3 F0/18
Project objectives
Part 1: Identify client requirements
Part 2: Configure Basic Device Settings
Connect the devices as shown in the topology.
Configure basic IP addressing for routers and PCs as provided.
Configure OSPF routing on all three routers (R1, R2, R3). Use process ID 100, and OSPF area 0.
Configure PC hosts (PC1 & PC2).
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CRS180
Revision 101
May 2018
Page 26
OFFICI
AL
Assessment Task 2: Skills Assessment
Verify connectivity between PC and Server (end-to-end conductivity).
Once completed, provide screen shots with your name and Student ID.
Part 3: Control Administrative Access for Routers
Configure a console password and enable login for all routers. Set the exec-timeout command which causes
the line to log out after 7 minutes of inactivity.
Configure AUX port password and enable login for all routers. Set the exec-timeout command which causes
the line to log out after 4 minutes of inactivity.
Configure VTY lines password and enable login for all routers. Set the exec-timeout command causes the
line to log out after 4 minutes of inactivity.
Configure local authentication, authorization, and accounting (AAA) user authentication.
Configure R1 to accept SSH sessions for remote management only.
Encrypt clear text passwords in all routers.
Configure minimum password length on all routers to be 8 characters.
Create a new user account with a secret password (user ciscouser password myciscopass
) with maximum
privilege (level 15)
Configure a login warning banner on all routers
Configure the enable secret passwords on all routers (
ciscoenable)
Provide screen shots with your name and Student ID.
Part 4: Configure, Apply and Verify an ACL with the following specifications:
Extended Numbered ACL 150
on R3 accept and reject traffic from network 192.168.3.0 / 24 as per following
conditions:
Block HTTP traffic from PC to Server.
Permit HTTPS and all other traffic from PC to Server.
Apply this ACL on the correct interface on R3.
Verify ACL configuration by using HTTP, HTTPS from PC to IP address of Server, also verify if PC can PING
to Server.
Provide screen shots with your name and Student ID.
FOR OFFICIAL USE ONLY Holmesglen: CAIT_EM 2023 L:\CAIT\Teaching\T&L\202310\22334VIC_Online\Network_Security_Infrastructure \202310_CRS180_VU21991__AT2of2_EM_V9_Learner
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Documents
Recommended textbooks for you

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning

Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning

Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
