Hardening Flashcards

1
Q

What is Hardening?

A

Configuring an operating system and applications to reduce security vulnerabilities

*Relevant for servers, mobile devices and laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is physical security important in hardening?

A

Compromised devices are hard to detect, and encryption helps protect data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack Surface Reduction

A

Remove unnecessary components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sandboxing

A

Limits resources that applications/processes can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of sandboxing

A

Web browsers running processes in isolated environments

Virtual machines for running different services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between SELinux and AppArmor?

A

SELinux expressive but complex, AppArmor is easier to use and the default in Ubuntu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of SUID/SGID binaries?

A

Temporarily elevate privileges for specific tasks (e.g., password management).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a major risk of SUID binaries?

A

Vulnerable binaries can lead to privilege escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anti-Forensics Techniques

A

Encrypt storage to make data harder to recove after deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is full disk encryption, and what is a common problem?

A

Encrypts the entire disk. Without the key, the system cannot boot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Nmap, and what is it used for?

A

A network scanner to identify exposed attack surfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Snort, and how does it work?

A

A network-based intrusion detection system using rule-based signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are common steps for SSH hardening?

A

Disable password access, enforce public key authentication, and enable MFA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does rsyslogd do?

A

Centralizes log management with encrypted transport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly