A+ Core 2 (220-1202) Objective 2.5: Compare and Contrast Common Social Engineering Attacks, Threats, and Vulnerabilities
A+ Core 2 Exam Focus: This objective covers comparing and contrasting common social engineering attacks, threats, and vulnerabilities including social engineering (phishing including vishing, smishing, QR code phishing, spear phishing, whaling, shoulder surfing, tailgating, impersonation, dumpster diving), threats (denial of service (DoS), distributed denial of service (DDoS), evil twin, zero-day attack, spoofing, on-path attack, brute-force attack, dictionary attack, insider threat, Structured Query Language (SQL) injection, cross-site scripting (XSS), business email compromise (BEC), supply chain/pipeline attack), and vulnerabilities (non-compliant systems, unpatched systems, unprotected systems (missing antivirus/missing firewall), EOL, bring your own device (BYOD)). You need to understand attack vectors, threat characteristics, and system vulnerabilities. This knowledge is essential for IT support professionals who need to identify, prevent, and respond to security threats in various computing environments.
The Human Element: Understanding Social Engineering
Social engineering represents one of the most effective attack vectors because it targets the human element of security, which is often the weakest link in any security system. Unlike technical attacks that exploit software vulnerabilities, social engineering attacks exploit human psychology and behavior to gain unauthorized access to systems, data, or physical locations. Understanding social engineering techniques is crucial for IT professionals who need to protect organizations from these sophisticated attacks.
Social engineering attacks have evolved significantly with the advancement of technology, incorporating new communication methods and psychological techniques to increase their effectiveness. These attacks can be highly targeted and personalized, making them particularly dangerous for organizations and individuals. The success of social engineering attacks often depends on the attacker's ability to manipulate human emotions such as fear, curiosity, greed, or helpfulness.
Social Engineering Attack Methods
Social engineering attacks encompass a wide range of techniques designed to manipulate people into revealing sensitive information, performing actions that compromise security, or providing access to restricted areas or systems. These attacks can be conducted through various channels including email, phone calls, text messages, social media, and in-person interactions. Understanding the different types of social engineering attacks is essential for developing effective countermeasures and user education programs.
Modern social engineering attacks often combine multiple techniques and leverage current events, technology trends, and social media information to increase their credibility and effectiveness. Attackers may spend considerable time researching their targets to create highly personalized and convincing attacks. The sophistication of these attacks continues to increase, making them more difficult to detect and prevent.
Phishing Attack Variants
Phishing attacks use deceptive communications to trick individuals into revealing sensitive information or performing actions that compromise security. These attacks have evolved into numerous variants, each targeting different communication channels and using specific techniques to increase their effectiveness. Understanding the different types of phishing attacks is important for implementing appropriate detection and prevention measures.
Phishing attacks can be broadly categorized into general phishing campaigns that target large numbers of people and targeted attacks that focus on specific individuals or organizations. Targeted attacks are often more sophisticated and may use detailed information about the target to increase their credibility. The success of phishing attacks often depends on the attacker's ability to create convincing communications that appear to come from legitimate sources.
Voice Phishing (Vishing)
Vishing attacks use voice communications, typically phone calls, to trick individuals into revealing sensitive information or performing actions that compromise security. These attacks often involve impersonating legitimate organizations such as banks, government agencies, or technical support services. Vishing attacks can be particularly effective because they create a sense of urgency and personal interaction that can override normal security precautions.
Vishing attackers may use various techniques including caller ID spoofing, automated voice systems, and social engineering scripts to increase their credibility and effectiveness. They often target individuals during times of stress or when they are distracted, making them more susceptible to manipulation. Understanding vishing techniques is important for educating users about voice-based social engineering attacks.
SMS Phishing (Smishing)
Smishing attacks use text messages to deliver phishing attempts, often including malicious links or requests for sensitive information. These attacks have become increasingly common as mobile device usage has grown, and they can be particularly effective because people often trust text messages more than email communications. Smishing attacks may use various techniques including urgent requests, fake notifications, and malicious links to trick recipients.
Smishing attacks often target mobile device users and may include links to malicious websites or requests to call specific phone numbers. They can be particularly dangerous because mobile devices may have different security controls than desktop computers, and users may be more likely to click on links in text messages. Understanding smishing techniques is important for implementing mobile security measures and user education.
QR Code Phishing
QR code phishing attacks use QR codes to direct users to malicious websites or applications. These attacks take advantage of the convenience and widespread use of QR codes, which can be easily generated and distributed through various channels. QR code phishing can be particularly effective because users cannot easily see the destination URL before scanning the code.
QR code phishing attacks may be distributed through various methods including physical posters, email attachments, social media posts, and malicious websites. They can be particularly dangerous because they can bypass traditional URL filtering and may be used in combination with other social engineering techniques. Understanding QR code phishing is important for implementing appropriate security measures and user education.
Spear Phishing
Spear phishing attacks are highly targeted phishing attempts that focus on specific individuals or organizations. These attacks use detailed information about the target to create highly personalized and convincing communications. Spear phishing attacks are often more sophisticated than general phishing campaigns and may require significant research and preparation by the attacker.
Spear phishing attacks may use information gathered from social media, company websites, public records, and other sources to create convincing communications. They often target high-value individuals such as executives, IT administrators, or employees with access to sensitive information. Understanding spear phishing techniques is important for implementing targeted security measures and user education programs.
Whaling Attacks
Whaling attacks are a specialized form of spear phishing that specifically targets high-level executives and other senior personnel within organizations. These attacks are often highly sophisticated and may involve extensive research and preparation. Whaling attacks can be particularly dangerous because they target individuals with significant authority and access to sensitive information.
Whaling attacks may use various techniques including executive impersonation, fake legal documents, and urgent business requests to trick targets into revealing sensitive information or performing actions that compromise security. They often involve significant financial losses and can damage organizational reputation. Understanding whaling attacks is important for implementing executive protection measures and security awareness programs.
Physical Social Engineering
Physical social engineering attacks involve direct interaction with individuals in physical environments to gain unauthorized access to facilities, systems, or information. These attacks can be particularly effective because they exploit human nature to be helpful and trusting, especially when dealing with people who appear to be legitimate employees or service providers. Understanding physical social engineering techniques is important for implementing appropriate physical security measures.
Physical social engineering attacks often involve impersonation, deception, and manipulation of human behavior to bypass security controls. They may target various locations including offices, data centers, and public spaces where sensitive information might be accessible. The success of these attacks often depends on the attacker's ability to appear legitimate and create plausible scenarios for their presence or requests.
Shoulder Surfing
Shoulder surfing involves observing individuals as they enter passwords, PINs, or other sensitive information on computers, mobile devices, or ATMs. This technique can be particularly effective in public places where people may be less cautious about their surroundings. Shoulder surfing attacks can be conducted by individuals in close proximity or through the use of cameras or other surveillance equipment.
Shoulder surfing attacks can be prevented through various measures including privacy screens, awareness training, and the use of secure input methods. They are particularly common in public spaces such as coffee shops, airports, and public transportation where people may be distracted or less security-conscious. Understanding shoulder surfing techniques is important for implementing appropriate physical security measures and user education.
Tailgating
Tailgating involves following authorized personnel through secured entrances to gain unauthorized access to restricted areas. This technique exploits human nature to be helpful and polite, especially when dealing with people who appear to be legitimate employees or visitors. Tailgating attacks can be particularly effective in environments where security procedures are not strictly enforced.
Tailgating attacks may involve various techniques including carrying items that make it difficult to use access cards, creating distractions, or using social pressure to convince authorized personnel to allow unauthorized access. They can be prevented through various measures including security awareness training, strict access control procedures, and physical security barriers. Understanding tailgating techniques is important for implementing appropriate physical security measures.
Impersonation
Impersonation attacks involve pretending to be someone else to gain access to information, systems, or physical locations. These attacks can be conducted through various methods including phone calls, email, in-person interactions, and online communications. Impersonation attacks often involve extensive research and preparation to create convincing personas and scenarios.
Impersonation attacks may target various roles including IT support personnel, law enforcement officers, government officials, and company executives. They often involve creating fake credentials, using social media information, and leveraging current events to increase their credibility. Understanding impersonation techniques is important for implementing appropriate verification procedures and security awareness training.
Dumpster Diving
Dumpster diving involves searching through trash and discarded materials to find sensitive information that can be used for social engineering attacks or other malicious purposes. This technique can be particularly effective because many organizations do not properly dispose of sensitive documents and may discard information that could be valuable to attackers. Dumpster diving attacks can provide attackers with detailed information about organizations and individuals.
Dumpster diving attacks may yield various types of sensitive information including passwords, account numbers, personal information, and internal documents. This information can be used to create more convincing social engineering attacks or to gain unauthorized access to systems and accounts. Understanding dumpster diving techniques is important for implementing proper document disposal procedures and security awareness training.
Network and System Threats
Network and system threats encompass a wide range of attacks that target computer systems, networks, and applications to cause damage, steal information, or disrupt operations. These threats can be technical in nature, exploiting vulnerabilities in software and hardware, or they can be more sophisticated attacks that combine technical and social engineering elements. Understanding these threats is essential for implementing appropriate security measures and incident response procedures.
Modern threats continue to evolve as attackers develop new techniques and exploit emerging technologies. Many threats are now automated and can be deployed on a large scale, making them particularly dangerous for organizations that may not have adequate security measures in place. The complexity and sophistication of these threats require comprehensive security strategies that address multiple attack vectors.
Denial of Service Attacks
Denial of Service (DoS) attacks are designed to make computer systems or network services unavailable to legitimate users by overwhelming them with traffic or requests. These attacks can cause significant disruption to business operations and may result in financial losses and damage to organizational reputation. DoS attacks can be particularly effective against systems that are not properly configured or protected.
Distributed Denial of Service (DDoS) attacks use multiple compromised systems to launch coordinated attacks against a single target, making them more powerful and difficult to defend against than traditional DoS attacks. DDoS attacks often use botnets, which are networks of compromised computers that can be controlled remotely by attackers. Understanding DoS and DDoS attacks is important for implementing appropriate network security measures and incident response procedures.
Wireless Network Threats
Wireless networks present unique security challenges because they can be accessed from outside the physical boundaries of an organization. Evil twin attacks involve creating fake wireless access points that mimic legitimate networks to trick users into connecting and revealing sensitive information. These attacks can be particularly effective in public places where people expect to find wireless networks.
Evil twin attacks may be used in combination with other techniques such as phishing or man-in-the-middle attacks to steal sensitive information or gain unauthorized access to systems. They can be particularly dangerous because they can intercept all network traffic from connected devices. Understanding evil twin attacks is important for implementing appropriate wireless security measures and user education.
Zero-Day and Advanced Threats
Zero-day attacks exploit previously unknown vulnerabilities in software or hardware before vendors have had the opportunity to develop and release patches. These attacks can be particularly dangerous because they can bypass traditional security measures and may not be detected by existing security tools. Zero-day attacks are often used in targeted attacks against high-value targets.
Zero-day attacks require significant resources and expertise to develop, making them typically used by advanced persistent threat (APT) groups and nation-state actors. They can be particularly effective against organizations that do not have adequate security monitoring and incident response capabilities. Understanding zero-day attacks is important for implementing advanced security measures and threat detection capabilities.
Network Spoofing and On-Path Attacks
Spoofing attacks involve impersonating legitimate systems or users to gain unauthorized access or intercept communications. These attacks can be conducted at various network layers and may involve IP address spoofing, MAC address spoofing, or DNS spoofing. Spoofing attacks can be particularly effective when combined with other attack techniques.
On-path attacks, also known as man-in-the-middle attacks, involve intercepting and potentially modifying communications between two parties without their knowledge. These attacks can be used to steal sensitive information, inject malicious content, or gain unauthorized access to systems. Understanding spoofing and on-path attacks is important for implementing appropriate network security measures and encryption protocols.
Password and Authentication Attacks
Brute-force attacks attempt to gain unauthorized access to systems by systematically trying all possible password combinations. These attacks can be time-consuming but may be successful against systems with weak passwords or inadequate account lockout policies. Brute-force attacks can be automated and may use distributed computing resources to increase their effectiveness.
Dictionary attacks use lists of common passwords and variations to attempt to gain unauthorized access to systems. These attacks are often more efficient than brute-force attacks because they focus on passwords that are commonly used by users. Dictionary attacks can be particularly effective against systems where users choose weak or common passwords. Understanding password attacks is important for implementing appropriate password policies and authentication controls.
Insider Threats
Insider threats involve individuals within an organization who use their legitimate access to systems and information for malicious purposes. These threats can be particularly dangerous because insiders already have access to systems and may be familiar with security procedures and controls. Insider threats can be motivated by various factors including financial gain, revenge, or espionage.
Insider threats can be difficult to detect and prevent because they involve individuals who have legitimate access to systems and may be familiar with security procedures. They can cause significant damage to organizations and may result in the theft of sensitive information or the disruption of business operations. Understanding insider threats is important for implementing appropriate access controls and monitoring procedures.
Web Application Attacks
SQL injection attacks exploit vulnerabilities in web applications that allow attackers to execute malicious SQL commands against databases. These attacks can be used to steal sensitive information, modify data, or gain unauthorized access to systems. SQL injection attacks are particularly common and can be highly effective against poorly secured web applications.
Cross-site scripting (XSS) attacks involve injecting malicious scripts into web applications that are then executed by other users' browsers. These attacks can be used to steal sensitive information, hijack user sessions, or perform actions on behalf of users. XSS attacks can be particularly dangerous because they can affect multiple users and may be difficult to detect. Understanding web application attacks is important for implementing appropriate application security measures.
Business Email Compromise
Business Email Compromise (BEC) attacks involve compromising business email accounts to conduct fraudulent activities such as wire transfers, invoice fraud, or data theft. These attacks often target employees with access to financial systems or sensitive information. BEC attacks can be particularly effective because they exploit the trust and authority associated with business email communications.
BEC attacks may involve various techniques including email account compromise, domain spoofing, and social engineering to convince victims to perform actions that benefit the attacker. They often result in significant financial losses and can damage business relationships and reputation. Understanding BEC attacks is important for implementing appropriate email security measures and user education programs.
Supply Chain Attacks
Supply chain attacks target the software, hardware, or services that organizations use to conduct business. These attacks can be particularly effective because they can affect multiple organizations and may be difficult to detect until significant damage has been done. Supply chain attacks often involve compromising trusted vendors or service providers to gain access to their customers' systems.
Supply chain attacks may involve various techniques including compromising software development processes, inserting malicious code into legitimate software, or compromising hardware during manufacturing or distribution. They can be particularly dangerous because they can affect multiple organizations and may be difficult to detect and prevent. Understanding supply chain attacks is important for implementing appropriate vendor management and security assessment procedures.
System Vulnerabilities
System vulnerabilities represent weaknesses in computer systems, networks, and applications that can be exploited by attackers to gain unauthorized access or cause damage. These vulnerabilities can result from various factors including poor configuration, outdated software, missing security controls, and human error. Understanding system vulnerabilities is essential for implementing appropriate security measures and risk management strategies.
Vulnerabilities can be categorized in various ways including by their severity, exploitability, and impact. Some vulnerabilities may be easily exploitable and have significant impact, while others may be more difficult to exploit or have limited impact. The identification and remediation of vulnerabilities is an ongoing process that requires regular assessment and monitoring.
Non-Compliant Systems
Non-compliant systems are those that do not meet established security standards, policies, or regulatory requirements. These systems may have various security weaknesses including inadequate access controls, missing security patches, or improper configuration. Non-compliant systems can pose significant security risks and may result in regulatory violations or security incidents.
Non-compliance can result from various factors including lack of awareness, resource constraints, or resistance to change. It can be particularly problematic in environments where systems are managed by different teams or departments with varying levels of security expertise. Understanding non-compliance issues is important for implementing appropriate governance and risk management procedures.
Unpatched Systems
Unpatched systems are those that have not been updated with the latest security patches and updates. These systems may contain known vulnerabilities that can be exploited by attackers. Unpatched systems are a common target for attackers because they often contain well-documented vulnerabilities that are easy to exploit.
Patch management can be challenging in complex environments with multiple systems, applications, and dependencies. It requires careful planning and testing to ensure that patches do not cause system instability or compatibility issues. Understanding patch management challenges is important for implementing effective vulnerability management programs.
Unprotected Systems
Unprotected systems lack basic security controls such as antivirus software, firewalls, or other security measures. These systems are particularly vulnerable to various types of attacks and may be easily compromised by attackers. Unprotected systems can serve as entry points for attackers to gain access to other systems in the network.
The lack of basic security controls can result from various factors including budget constraints, lack of awareness, or resistance to implementing security measures. It can be particularly problematic in environments where security is not considered a priority or where there is insufficient security expertise. Understanding the importance of basic security controls is essential for implementing effective security programs.
End-of-Life Systems
End-of-life (EOL) systems are those that are no longer supported by vendors and do not receive security updates or patches. These systems may contain unpatched vulnerabilities that can be exploited by attackers. EOL systems can pose significant security risks and may be difficult to secure or replace.
EOL systems may continue to be used for various reasons including cost constraints, compatibility requirements, or lack of awareness about the security risks. They can be particularly problematic in environments where they are connected to other systems or networks. Understanding EOL risks is important for implementing appropriate system lifecycle management procedures.
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD) policies allow employees to use their personal devices for work purposes, which can introduce various security risks and vulnerabilities. Personal devices may not have the same security controls as corporate devices and may be used for both personal and business purposes. BYOD environments can be particularly challenging to secure and manage.
BYOD security risks include the potential for data loss, malware infections, and unauthorized access to corporate systems and data. Personal devices may not be regularly updated, may contain malicious software, or may be lost or stolen. Understanding BYOD risks is important for implementing appropriate mobile device management and security policies.
Real-World Application Scenarios
Comprehensive Social Engineering Defense
Situation: Implementing comprehensive defense against social engineering attacks for a mid-size company with 200 employees across multiple locations.
Solution: Implement comprehensive security awareness training covering all types of phishing attacks (vishing, smishing, QR code phishing, spear phishing, whaling), physical security training for shoulder surfing, tailgating, and impersonation prevention, establish proper document disposal procedures to prevent dumpster diving, implement email security gateways to detect and block phishing attempts, configure multifactor authentication to prevent credential theft, establish incident response procedures for social engineering attacks, implement regular security assessments and penetration testing, and provide ongoing security awareness training and testing. Establish clear policies for handling suspicious communications and physical security incidents.
Advanced Threat Protection
Situation: Protecting against advanced threats including zero-day attacks, supply chain attacks, and sophisticated social engineering campaigns targeting a financial services organization.
Solution: Implement advanced threat detection systems including EDR and XDR solutions, deploy network monitoring and anomaly detection systems, implement comprehensive vulnerability management including regular security assessments, establish supply chain security assessment procedures, implement business email compromise protection including email authentication and user training, deploy DDoS protection and network security measures, implement insider threat detection and monitoring, establish incident response procedures for advanced threats, implement regular security training and awareness programs, and establish threat intelligence and information sharing programs. Ensure all systems are properly patched and configured with appropriate security controls.
Vulnerability Management Program
Situation: Addressing system vulnerabilities including non-compliant systems, unpatched systems, and BYOD security risks in a healthcare organization with strict compliance requirements.
Solution: Implement comprehensive vulnerability management program including regular security assessments, establish patch management procedures with testing and deployment processes, implement system compliance monitoring and enforcement, develop BYOD security policies and mobile device management, establish end-of-life system management procedures, implement comprehensive security controls including antivirus, firewalls, and endpoint protection, establish regular security training and awareness programs, implement incident response procedures for security vulnerabilities, and establish regular security audits and compliance assessments. Ensure all systems meet regulatory compliance requirements and implement appropriate security controls.
Best Practices for Threat Prevention
Comprehensive Security Strategy
- Layered defense: Implement multiple layers of security controls to protect against various attack vectors
- User education: Provide regular security awareness training covering all types of threats and attacks
- Incident response: Establish comprehensive incident response procedures for different types of security incidents
- Regular assessments: Conduct regular security assessments and vulnerability testing
- Threat monitoring: Implement continuous monitoring and threat detection capabilities
Vulnerability Management
- Patch management: Implement effective patch management procedures for all systems and applications
- System hardening: Implement system hardening procedures and security configurations
- Compliance monitoring: Establish compliance monitoring and enforcement procedures
- Risk assessment: Conduct regular risk assessments and vulnerability evaluations
- Security controls: Implement appropriate security controls for all systems and environments
Exam Preparation Tips
Key Concepts to Remember
- Social engineering: Understand all types of phishing attacks, physical social engineering, and manipulation techniques
- Network threats: Know DoS/DDoS attacks, evil twin, zero-day attacks, spoofing, and on-path attacks
- Authentication attacks: Understand brute-force and dictionary attacks, insider threats
- Web attacks: Know SQL injection, XSS, business email compromise, and supply chain attacks
- System vulnerabilities: Understand non-compliant systems, unpatched systems, unprotected systems, EOL, and BYOD risks
- Attack characteristics: Know the differences between various attack types and their methods
- Prevention strategies: Understand appropriate countermeasures for different types of attacks
- Risk management: Know how to assess and manage security risks and vulnerabilities
Practice Questions
Sample Exam Questions:
- What are the differences between vishing, smishing, and QR code phishing attacks?
- How do spear phishing and whaling attacks differ from general phishing campaigns?
- What are the characteristics of shoulder surfing and tailgating attacks?
- How do DoS and DDoS attacks differ in their implementation and impact?
- What is the difference between a zero-day attack and a known vulnerability exploit?
- How do SQL injection and XSS attacks target web applications differently?
- What are the security risks associated with BYOD policies?
- How can unpatched systems create security vulnerabilities?
- What are the characteristics of business email compromise attacks?
- How do supply chain attacks differ from direct system attacks?
A+ Core 2 Success Tip: Understanding social engineering attacks, threats, and vulnerabilities is essential for IT support professionals who need to identify, prevent, and respond to security incidents. Focus on learning the characteristics of different attack types, understanding system vulnerabilities, and knowing appropriate prevention and response strategies. This knowledge is essential for implementing comprehensive security programs and protecting organizations from various types of security threats.
Practice Lab: Security Threat Analysis and Response
Lab Objective
This hands-on lab is designed for A+ Core 2 exam candidates to gain practical experience with identifying, analyzing, and responding to various types of security threats and vulnerabilities. You'll work with social engineering scenarios, network threats, system vulnerabilities, and incident response procedures to develop comprehensive security analysis and response skills.
Lab Setup and Prerequisites
For this lab, you'll need access to isolated test environments, security tools, simulated attack scenarios, and incident response tools for testing different threat detection and response techniques. The lab is designed to be completed in approximately 20-22 hours and provides hands-on experience with the key security threat concepts covered in the A+ Core 2 exam.
Lab Activities
Activity 1: Social Engineering Analysis and Prevention
- Phishing analysis: Analyze different types of phishing attacks including vishing, smishing, and spear phishing. Practice identifying phishing indicators and developing prevention strategies.
- Physical security: Practice identifying and preventing physical social engineering attacks including shoulder surfing, tailgating, and impersonation. Practice implementing physical security measures.
- User training: Develop and deliver security awareness training covering social engineering threats. Practice creating effective training materials and programs.
Activity 2: Network and System Threat Analysis
- Threat identification: Analyze different types of network and system threats including DoS attacks, zero-day exploits, and web application attacks. Practice identifying threat characteristics and indicators.
- Vulnerability assessment: Conduct vulnerability assessments to identify system weaknesses including unpatched systems and configuration issues. Practice using vulnerability scanning tools.
- Incident response: Practice incident response procedures for different types of security threats. Practice documenting incidents and implementing response measures.
Activity 3: Security Implementation and Management
- Security controls: Implement and configure security controls to prevent various types of attacks. Practice configuring firewalls, antivirus, and other security tools.
- Vulnerability management: Implement vulnerability management procedures including patch management and system hardening. Practice managing system vulnerabilities.
- Security monitoring: Implement security monitoring and threat detection systems. Practice configuring and managing security monitoring tools.
Lab Outcomes and Learning Objectives
Upon completing this lab, you should be able to identify and analyze different types of social engineering attacks including phishing variants and physical attacks, understand the characteristics of various network and system threats including DoS attacks, zero-day exploits, and web application attacks, conduct vulnerability assessments to identify system weaknesses and security risks, implement appropriate security controls and countermeasures for different types of threats, develop and deliver security awareness training programs, implement incident response procedures for various types of security incidents, understand the security risks associated with system vulnerabilities including unpatched systems and BYOD policies, and implement comprehensive security programs to protect against various types of threats and vulnerabilities. You'll have hands-on experience with security threat analysis and response techniques. This practical experience will help you understand the real-world applications of security threat concepts covered in the A+ Core 2 exam.
Lab Cleanup and Documentation
After completing the lab activities, document your procedures and findings. Properly restore system configurations and ensure that all systems are returned to working condition. Document any issues encountered and solutions implemented during the lab activities.