Strayer CIS 534 CIS/534 CIS534 Lab 9 with Answers


Category: Tags: ,


CIS 534 Lab 9 Attacking a Virtual Private Network Solution


A properly configured virtual private network that uses IPSec and adheres very closely to best practices, such as strong authentication, network segmentation, device validation, and posture assessment, is formidable. It protects all types of information in transit from one location to the other. In this lab, you learned how to use social engineering techniques to unlock the secrets of a targeted individual or organization by attacking its virtual private network. You also researched e-mail scams and used social engineering to create a believable spam e-mail to solicit funds for a fictitious fundraising opportunity.