1.3.4 Lab - Visualizing The Black Hats
1.3.4 Lab - Visualizing The Black Hats
1.3.4 Lab - Visualizing The Black Hats
Scenario 1: Objectives
Research and analyze cyber security incidents.
Scenario 4: Instructions
Scenario 1:
a. Who is the attacker?
Type your answers here.
e. What was the target and vulnerability used against the business?
Type your answers here.
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 3 www.netacad.com
Lab - Visualizing the Black Hats
Scenario 2:
a. Who is the attacker?
Type your answers here.
e. What was the target and vulnerability used against the business?
Type your answers here.
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 3 www.netacad.com
Lab - Visualizing the Black Hats
Scenario 3:
a. Who is the attacker?
Type your answers here.
e. What was the target and vulnerability used against the business?
Type your answers here.
End of document
2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 3 www.netacad.com