Appendix BAnswers to the Lab Exercises
Chapter 1: Defending Against Cybersecurity Threats
Solution to Activity 1.4: Security Tools
||Filters network connections based upon source, destination, and port
||Attempts to recover source code from binary code
||Scans a system for malicious software
||Determines what clients may access a wired or wireless network
||Deploys configuration settings to multiple Windows systems
||Creates a unique fingerprint of a file
||System intentionally created to appear vulnerable
||Protects against SQL injection attacks
Chapter 2: Reconnaissance and Intelligence Gathering
Solution to Activity 2.3: Intelligence Gathering Tools
Get CompTIA Cybersecurity Analyst (CSA+) Study Guide now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.