Appendix CAnswers to Lab Exercises

Chapter 1: Today's Cybersecurity Analyst

Solution to Activity 1.4: Recognize Security Tools

Firewall Filters network connections based on source, destination, and port
Decompiler Attempts to recover source code from binary code
Antivirus Scans a system for malicious software
NAC Determines what clients may access a wired or wireless network
GPO Deploys configuration settings to multiple Windows systems
Hash Creates a unique fingerprint of a file
Honeypot System intentionally created to appear vulnerable
WAF Protects against SQL injection attacks

Chapter 2: Using Threat Intelligence

Solution to Activity 2.3: Intelligence Gathering Techniques

Requirements gathering Assess missing ...

Get CompTIA CySA+ Study Guide Exam CS0-002, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.