Appendix BAnswers to the Lab Exercises

Chapter 1: Defending Against Cybersecurity Threats

Solution to Activity 1.4: Security Tools

Firewall Filters network connections based upon source, destination, and port
Decompiler Attempts to recover source code from binary code
Antivirus Scans a system for malicious software
NAC Determines what clients may access a wired or wireless network
GPO Deploys configuration settings to multiple Windows systems
Hash Creates a unique fingerprint of a file
Honeypot System intentionally created to appear vulnerable
WAF Protects against SQL injection attacks

Chapter 2: Reconnaissance and Intelligence Gathering

Solution to Activity 2.3: Intelligence Gathering Tools

Route to a system ...

Get CompTIA Cybersecurity Analyst (CSA+) Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.