(1) Secure Endpoint Management Flashcards

1
Q

What is a very important way that a system admin can protect endpoints against attacks?

A

One of the best ways that system admins can protect endpoints is by hardening configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When a system admin hardens a configuration, what does that entail?

A

Hardening configurations can include (but is not limited to):

-Disabling unnecessary services
-Disable unnecessary ports
-Keep software and firmware up to date
-Use security standards and guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is patch management?

A

Patch management is about determining what security patches to apply to endpoints based on a bunch of factors, such as:

-If the patch fixes a vulnerability that the company actually needs to worry about

-If the patch won’t break something that the company really needs to use

-If the company is going to update the vulnerable system to something where the issue doesn’t exist anyway.h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two points of emphasis when it comes to patch management?

A

When it comes to patch management, 2 points to consider are:

-If an organization waits too long to apply a patch, then the patch may be exploited by an attacker

-An org should always test a patch on a sandbox system before deploying it to a production system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Group Policies?

What is Microsoft’s Group Policy Object (GPO)

A

Group policies let system admins manage security and other sys config settings for a huge number of devices.

Microsoft’s Group Policy Object (GPO) lets admins break corporate machines into groups and then either apply settings to them all or specific groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Endpoint Security Software?

What should Endpoint Security Software report to?

A

Endpoint Security Software encompasses a wide variety of services meant to protect endpoint systems. This could include:

-Antivirus
-Firewalls
-Other protective means

Endpoint Security Software should report its status to a centralized management system that lets security admins keep an eye on the enterprise from a centralized point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Mandatory Access Controls (MAC)? Are they used very much?

A

MAC are very useful in highly secure systems. Admins set security parameters and they are very hard set, they cannot be changed.

The problem with this setup is that it can cause a lot of roadblocks to productivity so it is only commonly used in very high risk (government, military, etc.) style systems and no where else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly