O'Reilly logo

CompTIA Cybersecurity Analyst (CSA+) Cert Guide by Troy McMillan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Answers to the “Do I Know This Already?” Quizzes and Review Questions

Chapter 1

“Do I Know This Already?” Quiz

1. C. Available services on a device are discovered by identifying the open ports on the device.

2. B. By determining the operating system, the hacker may be able to take advantage of weaknesses derived from missing security patches.

3. A. Attackers may attempt a process called e-mail harvesting, and the security analyst should attempt it as well. Typically e-mail harvesting bots (automated processes) are used for this.

4. B. Phishing is a social engineering attack that involves sending a mass e-mail that to the recipients appear to come from a trusted party, such as their bank. It includes a link that purports to connect ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required