Sample
Sample
Cybersecurity Analyst
(CySA+) CS0-002
Cert Guide
Troy McMillan
CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide Editor-in-Chief
Copyright © 2021 by Pearson Education, Inc. Mark Taub
For information about buying this title in bulk quantities, or for special Compositor
sales opportunities (which may include electronic versions; custom cover codeMantra
designs; and content particular to your business, training goals, marketing
focus, or branding interests), please contact our corporate sales department
at corpsales@pearsoned.com or (800) 382-3419.
For government sales inquiries, please contact
governmentsales@pearsoned.com.
For questions about sales outside the U.S., please contact
intlcs@pearson.com.
Contents at a Glance iii
Contents at a Glance
Introduction xxxvii
Online Elements:
APPENDIX C Memory Tables
APPENDIX D Memory Tables Answer Key
APPENDIX E Study Planner
Glossary of Key Terms
Table of Contents v
Table of Contents
Introduction xxxvii
Vulnerability Identification 41
Asset Criticality 42
Active vs. Passive Scanning 43
Mapping/Enumeration 44
Validation 44
Remediation/Mitigation 45
Configuration Baseline 45
Patching 46
Hardening 46
Compensating Controls 47
Risk Acceptance 47
Verification of Mitigation 47
Scanning Parameters and Criteria 49
Risks Associated with Scanning Activities 49
Vulnerability Feed 49
Scope 49
Credentialed vs. Non-credentialed 51
Server-based vs. Agent-based 52
Internal vs. External 53
Special Considerations 53
Types of Data 53
Technical Constraints 53
Workflow 53
Sensitivity Levels 54
Regulatory Requirements 55
Segmentation 56
Intrusion Prevention System (IPS), Intrusion Detection System (IDS), and
Firewall Settings 57
Firewall 59
Inhibitors to Remediation 62
Exam Preparation Tasks 63
Review All Key Topics 63
Define Key Terms 64
Review Questions 64
viii CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
Chapter 5
Threats and Vulnerabilities Associated with Specialized
Technology 93
“Do I Know This Already?” Quiz 93
Foundation Topics 97
Mobile 97
Unsigned Apps/System Apps 98
Security Implications/Privacy Concerns 99
Data Storage 99
Nonremovable Storage 99
Removable Storage 99
Transfer/Back Up Data to Uncontrolled Storage 99
USB OTG 99
Device Loss/Theft 100
Rooting/Jailbreaking 100
Push Notification Services 100
Geotagging 100
OEM/Carrier Android Fragmentation 101
Mobile Payment 101
NFC Enabled 101
Inductance Enabled 102
Mobile Wallet 102
Peripheral-Enabled Payments (Credit Card Reader) 102
USB 102
Malware 102
Unauthorized Domain Bridging 103
SMS/MMS/Messaging 103
Internet of Things (IoT) 103
IoT Examples 104
Methods of Securing IoT Devices 104
Embedded Systems 105
Real-Time Operating System (RTOS) 105
System-on-Chip (SoC) 105
Field Programmable Gate Array (FPGA) 105
x CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
HTTP/HTTPS/SHTTP 241
SSH 242
IPsec 242
Certificate Management 242
Certificate Authority and Registration Authority 243
Certificates 243
Certificate Revocation List 244
OCSP 244
PKI Steps 245
Cross-Certification 245
Digital Signatures 245
Active Defense 246
Hunt Teaming 247
Exam Preparation Tasks 247
Review All Key Topics 247
Define Key Terms 250
Review Questions 250
Chapter 9 Software Assurance Best Practices 253
“Do I Know This Already?” Quiz 253
Foundation Topics 256
Platforms 256
Mobile 256
Containerization 256
Configuration Profiles and Payloads 256
Personally Owned, Corporate Enabled 256
Corporate-Owned, Personally Enabled 257
Application Wrapping 257
Application, Content, and Data Management 257
Remote Wiping 257
SCEP 258
NIST SP 800-163 Rev 1 258
Web Application 260
Maintenance Hooks 260
Time-of-Check/Time-of-Use Attacks 260
xvi CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
Anti-Tamper 308
Self-Encrypting Drives 308
Trusted Firmware Updates 308
Measured Boot and Attestation 310
Measured Launch 311
Integrity Measurement Architecture 311
Bus Encryption 311
Exam Preparation Tasks 312
Review All Key Topics 312
Define Key Terms 312
Review Questions 313
Chapter 11 Analyzing Data as Part of Security Monitoring Activities 317
“Do I Know This Already?” Quiz 317
Foundation Topics 320
Heuristics 320
Trend Analysis 320
Endpoint 321
Malware 323
Virus 323
Worm 324
Trojan Horse 325
Logic Bomb 325
Spyware/Adware 325
Botnet 325
Rootkit 326
Ransomware 326
Reverse Engineering 327
Memory 329
Memory Protection 329
Secured Memory 330
Runtime Data Integrity Check 330
Memory Dumping, Runtime Debugging 332
System and Application Behavior 333
Known-good Behavior 333
Table of Contents xix
Firewall 383
NextGen Firewalls 383
Host-Based Firewalls 384
Intrusion Prevention System (IPS) Rules 386
Data Loss Prevention (DLP) 386
Endpoint Detection and Response (EDR) 387
Network Access Control (NAC) 387
Quarantine/Remediation 389
Agent-Based vs. Agentless NAC 389
802.1X 389
Sinkholing 391
Malware Signatures 391
Development/Rule Writing 392
Sandboxing 392
Port Security 394
Limiting MAC Addresses 395
Implementing Sticky MAC 395
Exam Preparation Tasks 396
Review All Key Topics 396
Define Key Terms 396
Review Questions 397
Chapter 13 The Importance of Proactive Threat Hunting 401
“Do I Know This Already?” Quiz 401
Foundation Topics 404
Establishing a Hypothesis 404
Profiling Threat Actors and Activities 405
Threat Hunting Tactics 406
Hunt Teaming 406
Threat Model 406
Executable Process Analysis 407
Memory Consumption 409
Reducing the Attack Surface Area 409
System Hardening 410
Configuration Lockdown 410
xxii CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
Preparation 452
Training 452
Testing 453
Documentation of Procedures 453
Detection and Analysis 454
Characteristics Contributing to Severity Level Classification 455
Downtime and Recovery Time 455
Data Integrity 456
Economic 456
System Process Criticality 457
Reverse Engineering 457
Data Correlation 458
Containment 458
Segmentation 458
Isolation 459
Eradication and Recovery 459
Vulnerability Mitigation 459
Sanitization 460
Reconstruction/Reimaging 460
Secure Disposal 460
Patching 461
Restoration of Permissions 461
Reconstitution of Resources 462
Restoration of Capabilities and Services 462
Verification of Logging/Communication to Security Monitoring 462
Post-Incident Activities 463
Evidence Retention 463
Lessons Learned Report 463
Change Control Process 464
Incident Response Plan Update 464
Incident Summary Report 464
Indicator of Compromise (IoC) Generation 465
Monitoring 465
Exam Preparation Tasks 465
Table of Contents xxv
Troy McMillan is a product developer and technical editor for Kaplan IT as well
as a full-time trainer. He became a professional trainer 20 years ago, teaching Cisco,
Microsoft, CompTIA, and wireless classes. He has written or contributed to more
than a dozen projects, including the following recent ones:
■■ Contributing subject matter expert for CCNA Cisco Certified Network Associate
Certification Exam Preparation Guide (Kaplan)
■■ Author of CISSP Cert Guide (Pearson)
■■ Prep test question writer for CCNA Wireless 640-722 Official Cert Guide
(Cisco Press)
■■ Author of CompTIA Advanced Security Practitioner (CASP) Cert Guide (Pearson)
Troy has also appeared in the following training videos for OnCourse Learning:
Security+; Network+; Microsoft 70-410, 411, and 412 exam prep; ICND1; and
ICND2.
He delivers CISSP training classes for CyberVista, and is an authorized online
training provider for (ISC)2.
Troy also creates certification practice tests and study guides for CyberVista. He
lives in Asheville, North Carolina, with his wife, Heike.
Dedication xxxiii
Dedication
I dedicate this book to my wife, Heike, who has supported me when I needed it most.
xxxiv CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
Acknowledgments
I must thank everyone on the Pearson team for all of their help in making this book
better than it would have been without their help. That includes Chris Cleveland,
Nancy Davis, Chris Crayton, Tonya Simpson, and Mudita Sonar.
About the Technical Reviewer xxxv
As the reader of this book, you are our most important critic and commentator. We
value your opinion and want to know what we’re doing right, what we could do
better, what areas you’d like to see us publish in, and any other words of wisdom
you’re willing to pass our way.
We welcome your comments. You can email to let us know what you did or didn’t
like about this book—as well as what we can do to make our books better.
Please note that we cannot help you with technical problems related to the topic of this book.
When you write, please be sure to include this book’s title and author as well as your
name and email address. We will carefully review your comments and share them
with the author and editors who worked on the book.
Email: community@informit.com
Introduction xxxvii
Introduction
CompTIA CySA+ bridges the skills gap between CompTIA Security+ and
CompTIA Advanced Security Practitioner (CASP+). Building on CySA+, IT pro-
fessionals can pursue CASP+ to prove their mastery of the hands-on cybersecurity
skills required at the 5- to 10-year experience level. Earn the CySA+ certification to
grow your career within the CompTIA recommended cybersecurity career pathway.
CompTIA CySA+ certification is designed to be a “vendor-neutral” exam that
measures your knowledge of industry-standard technology.
The CompTIA CySA+ certification credential for those passing the certification
exams is now valid for three years. To renew your certification without retaking
the exam, you need to participate in continuing education (CE) activities and
pay an annual maintenance fee of $50 (that is, $150 for three years). See
https://www.comptia.org/continuing-education/learn/ce-program-fees for fee
details. To learn more about the certification renewal policy, see https://
certification.comptia.org/continuing-education.
Book Features
To help you customize your study time using this book, the core chapters have
several features that help you make the best use of your time:
■■ Foundation Topics: These are the core sections of each chapter. They explain
the concepts for the topics in that chapter.
■■ Exam Preparation Tasks: After the “Foundation Topics” section of each
chapter, the “Exam Preparation Tasks” section provides the following study
activities that you should do to prepare for the exam:
■■ Review All Key Topics: As previously mentioned, the Key Topic icon
appears next to the most important items in the “Foundation Topics”
section of the chapter. The Review All Key Topics activity lists the key
topics from the chapter, along with their page numbers. Although the
contents of the entire chapter could be on the exam, you should defi-
nitely know the information listed in each key topic, so you should
review these.
Introduction xli
■■ Define Key Terms: Although the CySA+ exam might be unlikely to ask
a question such as “Define this term,” the exam does require that you
learn and know a lot of cybersecurity-related terminology. This section
lists the most important terms from the chapter, asking you to write a
short definition of each and compare your answer to the glossary entry at
the end of the book.
■■ Review Questions: Confirm that you understand the content that you just
covered by answering these questions and reading the answer explanations.
■■ Web-based practice exam: The companion website includes the Pearson Test
Prep practice test software that enables you to take practice exam questions.
Use it to prepare with a sample exam and to pinpoint topics where you need
more study.
What’s New?
With every exam update, changes in the relative emphasis on certain topics can
change. Here is an overview of some of the most important changes:
■■ Increased content on the importance of threat data and intelligence
■■ Increased emphasis on regulatory compliance
■■ Increased emphasis on the options and combinations available for any given
command
■■ Increased emphasis on identifying attacks through log analysis
■■ Increased coverage of cloud security
■■ Increased coverage of forming and using queries
Note that if you buy the Premium Edition eBook and Practice Test version of this book
from Pearson, your book will automatically be registered on your account page.
Simply go to your account page, click the Registered Products tab, and select
Access Bonus Content to access the book’s companion website.
Please note that many of our companion content files can be very large, especially
image and video files.
If you are unable to locate the files for this title by following the steps at left, please
visit www.pearsonITcertification.com/contact and select the Site Problems/
Comments option. Our customer service representatives will assist you.
NOTE Do not lose the activation code because it is the only means with which you
can access the QA content with the book.
Once you have the access code, to find instructions about both the PTP web app
and the desktop app, follow these steps:
Step 1. Open this book’s companion website.
Step 2. Click the Practice Exams button.
Step 3. Follow the instructions listed there both for installing the desktop app
and for using the web app.
Introduction xliii
Note that if you want to use the web app only at this point, just navigate to
www.pearsontestprep.com, establish a free login if you do not already have one, and
register this book’s practice tests using the registration code you just found. The
process should take only a couple of minutes.
NOTE Amazon eBook (Kindle) customers: It is easy to miss Amazon’s e-mail that
lists your PTP access code. Soon after you purchase the Kindle eBook, Amazon
should send an e-mail. However, the e-mail uses very generic text, and makes no spe-
cific mention of PTP or practice exams. To find your code, read every e-mail from
Amazon after you purchase the book. Also do the usual checks for ensuring your
e-mail arrives, like checking your spam folder.
NOTE Other eBook customers: As of the time of publication, only the publisher
and Amazon supply PTP access codes when you purchase their eBook editions of this
book.
In addition to these three modes, you will be able to select the source of your ques-
tions. You can choose to take exams that cover all of the chapters or you can narrow
your selection to just a single chapter or the chapters that make up specific parts in
the book. All chapters are selected by default. If you want to narrow your focus to
individual chapters, simply deselect all the chapters and then select only those on
which you wish to focus in the Objectives area.
xliv CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
You can also select the exam banks on which to focus. Each exam bank comes com-
plete with a full exam of questions that cover topics in every chapter. You can have
the test engine serve up exams from all test banks or just from one individual bank
by selecting the desired banks in the exam bank area.
There are several other customizations you can make to your exam from the exam
settings screen, such as the time of the exam, the number of questions served up,
whether to randomize questions and answers, whether to show the number of
correct answers for multiple-answer questions, and whether to serve up only specific
types of questions. You can also create custom test banks by selecting only questions
that you have marked or questions on which you have added notes.
Credits
Table 6-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping
Foundation Topics Section Question
Cloud Deployment Models 1
Cloud Service Models 2
Function as a Service (FaaS)/Serverless Architecture 3
Infrastructure as Code (IaC) 4
Insecure Application Programming Interface (API) 5
Improper Key Management 6
Unprotected Storage 7
Logging and Monitoring 8
124 CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
CAUTION The goal of self-assessment is to gauge your mastery of the topics in this
chapter. If you do not know the answer to a question or are only partially sure of the
answer, you should mark that question as wrong for purposes of the self-assessment.
Giving yourself credit for an answer you correctly guess skews your self-assessment
results and might provide you with a false sense of security.
8. Which of the following is lost with improper auditing? (Choose the best answer.)
a. Cryptographic security
b. Accountability
c. Data security
d. Visibility
126 CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
Foundation Topics
Client Device
Interconnecting Network
Hosted IT Department
Application
Application
Software-aaS*
Software/
Software
Microsoft
Java
Infrastructure ASP.net MySQL
Platform-aaS*
Google App
Software SQL Server
Platform
Windows ORACLE
Microsoft
Operating Systems Linux
Windows
Virtualization Xen
+ =
Layer VMware
IBM Infrastructure-aaS
Infrastructure
Physical Servers HP
DELL
Networking
and Firewalling
Data Center
Mechanical and
Electrical
Notes:
Brand names for illustrative/example purposes only,
and examples are not exhaustive.
Although FaaS is not perfect for every workload, for transactions that happen hun-
dreds of times per second, there is a lot of value in isolating that logic to a function
that can be scaled. Additional advantages include the following:
■■ Ideal for dynamic or burstable workloads: If you run something only once a
day or month, there’s no need to pay for a server 24/7/365.
■■ Ideal for scheduled tasks: FaaS is a perfect way to run a certain piece of code
on a schedule.
Figure 6-2 shows a useful car analogy for comparing traditional computing (own a
car), cloud computing (rent a car), and FaaS/serverless computing (car sharing). VPS
in the rent-a-car analogy stands for virtual private server and refers to provisioning a
virtual server from a cloud service provider.
Car Analogy
Figure 6-3 illustrates an example of how some code might be capable of making
changes on its own without manual intervention. As you can see in Figure 6-3, these
code changes can be made to the actual state of the configurations in the cloud with-
out manual intervention.
2. Check the
Current Status
Infrastructure
Infrastructure-as- Actual State on
Desired State
Code Tool Cloud
File 1. Read File when
3. Apply the
Triggered
Change (If Any)
Systems that process valuable information require controls in order to protect the
information from unauthorized disclosure and modification. Cryptographic systems
that contain keys and other cryptographic information are especially critical. Secu-
rity professionals should work to ensure that the protection of keying material pro-
vides accountability, audit, and survivability.
Accountability involves the identification of entities that have access to, or control
of, cryptographic keys throughout their life cycles. Accountability can be an effec-
tive tool to help prevent key compromises and to reduce the impact of compromises
when they are detected. Although it is preferred that no humans be able to view
keys, as a minimum, the key management system should account for all individuals
who are able to view plaintext cryptographic keys. In addition, more sophisticated
key management systems may account for all individuals authorized to access or
control any cryptographic keys, whether in plaintext or ciphertext form.
Two types of audits should be performed on key management systems:
■■ Security: The security plan and the procedures that are developed to support
the plan should be periodically audited to ensure that they continue to support
the key management policy.
■■ Protective: The protective mechanisms employed should be periodically
reassessed with respect to the level of security they currently provide and are
expected to provide in the future. They should also be assessed to determine
whether the mechanisms correctly and effectively support the appropriate
policies. New technology developments and attacks should be considered as
part of a protective audit.
Key Escrow
Key escrow is the process of storing keys with a third party to ensure that decryp-
tion can occur. This is most often used to collect evidence during investigations. Key
recovery is the process whereby a key is archived in a safe place by the administrator.
134 CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
Key Stretching
Key stretching, also referred to as key strengthening, is a cryptographic technique
that involves making a weak key stronger by increasing the time it takes to test each
possible key. In key stretching, the original key is fed into an algorithm to produce
an enhanced key, which should be at least 128 bits for effectiveness. If key stretch-
ing is used, an attacker would need to either try every possible combination of the
enhanced key or try likely combinations of the initial key. Key stretching slows down
the attacker because the attacker must compute the stretching function for every
guess in the attack. Systems that use key stretching include Pretty Good Privacy
(PGP), GNU Privacy Guard (GPG), Wi-Fi Protected Access (WPA), and WPA2.
Widely used password key-stretching algorithms include Password-Based Key
Derivation Function 2 (PBKDF2), bcrypt, and scrypt.
Unprotected Storage
While cloud storage may seem like a great idea, it presents many unique issues.
Among them are the following:
■■ Data breaches: Although cloud providers may include safeguards in service-
level agreements (SLAs), ultimately the organization is responsible for protect-
ing its own data, regardless of where it is located. When this data is not in your
hands—and you may not even know where it is physically located at any point
in time—protecting your data is difficult.
■■ Authentication system failures: These failures allow malicious individuals into
the cloud. This issue sometimes is made worse by the organization itself when
developers embed credentials and cryptographic keys in source code and leave
them in public-facing repositories.
■■ Weak interfaces and APIs: Interfaces and APIs tend to be the most exposed
parts of a system because they’re usually accessible from the open Internet.
However, public clouds can grant access to any location, and data is transmitted over
the Internet. Also, the organization depends on the vendor for all services provided.
End users must be educated about cloud usage and limitations as part of their secu-
rity awareness training. In addition, security policies should clearly state where data
can be stored, and ACLs should be configured properly to ensure that only autho-
rized personnel can access data. The policies should also spell out consequences for
storing organizational data in cloud locations that are not authorized.
Big Data
Big data is a term for sets of data so large or complex that they cannot be analyzed
by using traditional data processing applications. These data sets are often stored in
the cloud to take advantage of the immense processing power available there. Spe-
cialized applications have been designed to help organizations with their big data.
The big data challenges that may be encountered include data analysis, data capture,
data search, data sharing, data storage, and data privacy.
While big data is used to determine the causes of failures, generate coupons at
checkout, recalculate risk portfolios, and find fraudulent activity before it ever has a
chance to affect the organization, its existence creates security issues. The first issue
is its unstructured nature. Traditional data warehouses process structured data and
can store large amounts of it, but there is still a requirement for structure.
136 CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide
Big data typically uses Hadoop, which requires no structure. Hadoop is an open
source framework used for running applications and storing data. With the Hadoop
Distributed File System, individual servers that are working in a cluster can fail
without aborting the entire computation process. There are no restrictions on the
data that this system can store. While big data is enticing because of the advantages
it offers, it presents a number of issues when deployed in the cloud.
■■ Organizations still do not understand it very well, and unexpected vulnerabili-
ties can easily be introduced.
■■ Open source codes are typically found in big data, which can result in unrec-
ognized backdoors. It can contain default credentials.
■■ Attack surfaces of the nodes may not have been reviewed, and servers may not
have been hardened sufficiently.
Inability to Access
One of the issue with utilizing standard logging and monitoring tools in a cloud
environment is the inability to access the environment in a way that renders visibil-
ity into the environment. In some cases, the vendor will resist allowing access to its
environment. The time to demand such access is when the SLA is in the process of
being negotiated.
Chapter 6: Threats and Vulnerabilities Associated with Operating in the Cloud 137
Review Questions
1. With ______________, the vendor provides the entire solution, including the
operating system, the infrastructure software, and the application.
2. Match the terms on the left with their definitions on the right.
Terms Definitions
FaaS Manages and provisions computer data centers through machine-readable
definition files.
IaC The vendor provides the hardware platform or data center, and the
customer installs and manages its own operating systems and application
systems.
PaaS The vendor provides the hardware platform or data center and the
software running on the platform, including the operating systems and
infrastructure software.
IaaS Completely abstracts the virtual server from the developers.
8. In the _______________ phase of a key, the keying material is not yet available
for normal cryptographic operations.
9. List at least one security issue with cloud storage.
10. ________________ is a term for sets of data so large or complex that they
cannot be analyzed by using traditional data processing applications.
Index
Q reconstruction/reimaging, 460
QRadar, 364 resource reconstitution, 462
qualitative risk analysis, 534, 676 sanitization, 460, 679
Qualys, 496, 676 secure disposal, 460–461
quantitative risk analysis, 534, 676 time requirements, 455–456
queries, 366–367 recovery point objective (RPO), 455, 676
parameterized, 285, 673 recovery time objective (RTO), 455, 677
writing, 676 red teams, 542, 677
piping, 367, 674 reflective XSS (cross-site scripting), 161,
scripts, 366, 679 677
Sigma, 366 registration authority (RA), 243, 677
string searches, 366, 682 Registry/configuration tools, 393
regulatory audits/assessments, 573–574
R regulatory bodies, response coordination
by, 438
RA (registration authority), 243, 677
relationships, identification of, 210–211
race conditions, 164, 260, 676
release, software, 269
radio frequency identification (RFID),
remediation/mitigation, 45, 459–462, 538
180, 521, 676
capability and service restoration, 462
RADIUS (Remote Authentication Dial-in
cloud computing, 177–178
User Service), 281–282, 389–391
compensating controls, 47, 658
RAM (random-access memory), 329
configuration baseline, 45–46, 659
ransomware, 326, 676
hardening, 46–47, 665, 683
RBAC (role-based access control), 224–
inhibitors to, 62–63
225, 678
log verification, 462
RC4, 235
patching, 46, 48, 461, 673
RC5, 235
permissions restoration, 461
RC6, 235
reconstruction/reimaging, 460
read-only memory (ROM), 309, 329
resource reconstitution, 462
real user monitoring (RUM), 69, 74, 286,
risk acceptance, 47, 677
676
sanitization, 460, 679
real-time operating systems (RTOSs),
secure disposal, 460–461
105, 676
verification of, 47
Reaver, 84–86, 676
Remote Authentication Dial-in User
reconstruction/reimaging, 460
Service (RADIUS), 281–282,
recoverability, 532, 676
389–391
recovery, 459–462
remote code execution, 150, 677
capability and service restoration, 462
remote terminal units (RTUs), 115, 677
log verification, 462
remote virtual desktops model, 207
patching, 461
remote wiping, 257, 677
permissions restoration, 461
remote-access VPNs (virtual private
priorities, identification of, 531–532
networks), 196
724 removable storage