O'Reilly logo

CompTIA Cybersecurity Analyst (CSA+) Cert Guide by Troy McMillan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Recommending and Implementing the Appropriate Response and Countermeasure

This chapter covers the following topics:

1.0 Threat Management

1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.

Image Network Segmentation: Includes topics such as segmentation and jump boxes.

Image Honeypots: Discusses the role of honeypots in a layered approach to security.

Image Endpoint Security: Describes the securing of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required