Appendix CAnswers to Lab Exercises
Chapter 1: Today's Cybersecurity Analyst
Solution to Activity 1.4: Recognize Security Tools
Firewall | Filters network connections based on source, destination, and port |
Decompiler | Attempts to recover source code from binary code |
Antivirus | Scans a system for malicious software |
NAC | Determines what clients may access a wired or wireless network |
GPO | Deploys configuration settings to multiple Windows systems |
Hash | Creates a unique fingerprint of a file |
Honeypot | System intentionally created to appear vulnerable |
WAF | Protects against SQL injection attacks |
Chapter 2: Using Threat Intelligence
Solution to Activity 2.3: Intelligence Gathering Techniques
Requirements gathering | Assess missing ... |
Get CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.