Read chapter 5.
1.) Using the Checklists in the chapter come up with a plan to audit the network, the best way to do this is review the "How" of each checklist item and document exactly what you would do to audit that section. As before you don't need to be "super" detailed only write in enough words so that you can discuss what your plans are with the class. Below is an example.
Auditing Network Equipment
1.) Example : patches, backing up configs., change management
Having a strong configuration standard is critical to a secure network. Configuration guideline, patches are applied routinely, reviews of configuration routinely, reports.
Such as disable services such as turn off all unused interfaces, proxy arp disabled, passive interface on the routers connected only to the end hosts.
https://www.dropbox.com/s/3nbv319f7idsx2z/it_auditing_second_edition_-_davis.rar?dl=0