Chapter 1
Answer 1: Router
Answer 2: CHAP
Answer 3: Spoofing
Answer 4: OCTAVE-S
Answer 5: Scripting
Answer 6: Build
Answer 7: Mobile user interface
Chapter 2
Answer 1: To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying
Answer 2: KMIP
Answer 3: Regulatory compliance
Answer 4: SAS70
Answer 5: Data privacy
Answer 6: PaaS
Answer 7: Public
Answer 8: WPA3
Answer 9: Access point
Answer 10: Wireless traffic sniffing
Chapter 3
Answer 1: Vishing
Answer 2: Every 30-90 days
Answer 3: Botnet
Answer 4: Botnet
Answer 5: Peer-to-peer
Answer 6: Self-replicate
Answer 7: Spear phishing
Chapter 4
Answer 1: John the Ripper
Answer 2: Redirect
Answer 3: Determine the scope of the test
Answer 4: SQL injection
Answer 5: Nikto
Answer 6: /etc/shadow
Answer 7: Respond to telnet connection requests
Chapter 5
Answer 1: SS7
Answer 2: Support for unified communications (UC) to email, voicemail, instant messaging, video chat, and more
Answer 3: AES
Answer 4: Reverse engineering
Answer 5: Determining the vulnerabilities in the product
Answer 6: TLS
Answer 7: UART is a simple full-duplex, asynchronous, serial protocol
Chapter 6
Answer 1: Network forensics
Answer 2: Helix
Answer 3: Tcpdump
Answer 4: PsTools
Answer 5: Snort
Answer 6: 3
Answer 7: PCAP
Answer 8: HDHOST
Answer 9: Active acquisition
Answer 10: Intercepting traffic in wireless media
Chapter 7
Answer 1: Nmap
Answer 2: What type of antivirus is in use
Answer 3: Network protocol analysis
Answer 4: LC4
Answer 5: Outline the overall authority, scope, and responsibilities of the audit function
Answer 6: Built-in substitute routing
Answer 7: Training on organizational policies and standards
Chapter 8
Answer 1: Environmental technical architecture
Answer 2: Accountability
Answer 3: Situational intelligence
Answer 4: Nation-state actor
Answer 5: Signature analysis
Answer 6: Senior management
Answer 7: Record the trace of advanced persistent threats
Chapter 9
Answer 1: STIX
Answer 2: Machine learning
Answer 3: Packet inspection
Answer 4: Automation
Answer 5: MTTD
Answer 6: SOAR and UEBA
Answer 7: All of the above
Answer 8: 20%
Answer 9: Deterministic
Answer 10: Shifting left