Lab #2: Defending the Network from a Simulated Attack. Capture #1 Section 1 Capture #2 Section 1 Capture #3 Section 1 Capture #4 Section 1 Capture #1 Section 2 Capture #2 Section 2 Capture #3 Section 2 Capture #4 Section 2 Capture #5 Section 2 Capture #1 Section 3 Capture #2 Section 3