Hardening Flashcards
Objectives: ● 2.5 - Explain the purpose of mitigation techniques used to secure the enterprise ● 4.1 - Given a scenario, you must be able to apply common security techniques to computing resources ● 4.5 - Given a scenario, you must be able to modify enterprise capabilities to enhance security
Question 1: Scenario-Based (Default Passwords)
A small business owner purchases a new wireless router for their office. Upon setting it up, they notice that the login credentials to access the router’s configuration page are admin for both the username and password. What is the BEST action they should take next?
A) Leave the credentials as they are since they work fine.
B) Change the default password to a strong, unique password.
C) Disable Wi-Fi to prevent unauthorized access.
D) Share the credentials with all employees for easy access.
Answer: B) Change the default password to a strong, unique password.
Explanation:
(A) Incorrect: Leaving default credentials is a major security risk because attackers can find them in manuals and online.
(B) Correct: Default passwords should be changed immediately to prevent unauthorized access.
(C) Incorrect: Disabling Wi-Fi may reduce unauthorized access but does not address the real issue of weak credentials.
(D) Incorrect: Sharing credentials increases the risk of compromise, especially if an employee’s device is breached.
Question 2: Explained-Based (Password Management)
Which of the following is the BEST practice for managing administrative passwords for critical systems?
A) Using the same strong password for all devices.
B) Rotating passwords every 30 days and writing them down.
C) Storing passwords in a password manager and rotating them every 90 days.
D) Using short passwords to make them easier to remember.
Answer: C) Storing passwords in a password manager and rotating them every 90 days.
Explanation:
(A) Incorrect: Reusing passwords increases security risks; if one device is compromised, all others are vulnerable.
(B) Incorrect: While rotating passwords is good, writing them down physically increases the risk of theft.
(C) Correct: Using a password manager ensures security and convenience while keeping passwords long, strong, and unique.
(D) Incorrect: Short passwords are easy to crack using brute-force attacks.
Question 3: Scenario-Based (Unneeded Ports and Protocols)
An IT administrator is setting up a web server. They notice that both port 80 (HTTP) and port 443 (HTTPS) are open. The company requires secure web communication. What should the administrator do?
A) Close port 80 and allow only HTTPS over port 443.
B) Keep both ports open to ensure compatibility.
C) Close both ports since they pose a security risk.
D) Disable HTTPS and allow only HTTP to reduce encryption overhead.
Answer: A) Close port 80 and allow only HTTPS over port 443.
Explanation:
(A) Correct: HTTPS (port 443) provides encrypted and secure communication. Keeping HTTP (port 80) open allows insecure traffic.
(B) Incorrect: Leaving port 80 open increases the risk of unencrypted data transmission.
(C) Incorrect: Closing both ports would prevent web access entirely, which is not practical.
(D) Incorrect: HTTP is insecure because it does not encrypt traffic, making it vulnerable to attacks.
Question 4: Explained-Based (Auditing Open Ports)
Why is it important to audit and disable unneeded ports on a system?
A) To prevent unauthorized access and reduce the attack surface.
B) To make it easier for employees to access the system remotely.
C) To increase network traffic for performance testing.
D) To allow all possible connections and ensure compatibility.
Answer: A) To prevent unauthorized access and reduce the attack surface.
Explanation:
(A) Correct: Disabling unneeded ports reduces the number of potential entry points for attackers.
(B) Incorrect: Keeping unnecessary ports open increases security risks.
(C) Incorrect: More open ports do not help with performance testing; they increase the risk of exploitation.
(D) Incorrect: Security should always be prioritized over excessive compatibility.
Question 5: Scenario-Based (Default Open Ports)
A network security analyst performs a scan on a newly installed device and finds port 23 (Telnet) and port 22 (SSH) open. What is the best course of action?
A) Leave both ports open for compatibility.
B) Close port 23 and use SSH over port 22 for secure remote access.
C) Close both ports to prevent any remote access.
D) Use Telnet (port 23) instead of SSH since it is easier to configure.
Answer: B) Close port 23 and use SSH over port 22 for secure remote access.
Explanation:
(A) Incorrect: Leaving Telnet (port 23) open is a security risk since it transmits data in plain text.
(B) Correct: SSH (port 22) is a secure protocol for remote access, while Telnet is insecure.
(C) Incorrect: Closing both ports would prevent all remote management, which may not be practical.
(D) Incorrect: Telnet lacks encryption and is vulnerable to eavesdropping.
Question 6: Explained-Based (Secure vs. Insecure Protocols)
Which of the following protocol pairs correctly identifies the insecure and secure version?
A) HTTP (secure) / HTTPS (insecure)
B) Telnet (insecure) / SSH (secure)
C) SMTP (secure) / SMTPS (insecure)
D) FTP (secure) / FTPS (insecure)
Answer: B) Telnet (insecure) / SSH (secure).
Explanation:
(A) Incorrect: HTTPS is the secure version of HTTP, not the other way around.
(B) Correct: Telnet sends unencrypted data, while SSH provides secure remote access.
(C) Incorrect: SMTP is not encrypted, while SMTPS provides encryption.
(D) Incorrect: FTPS (FTP Secure) is the secure version of FTP.
Question 7: Scenario-Based (Factory Settings)
A company sets up a new file server and leaves the factory settings unchanged. Which of the following is the most likely consequence?
A) Increased security due to manufacturer configurations.
B) A higher risk of exploitation due to known default settings.
C) Faster performance because factory settings are optimized.
D) Better user experience due to default permissions.
Answer: B) A higher risk of exploitation due to known default settings.
Explanation:
(A) Incorrect: Default settings prioritize usability over security.
(B) Correct: Attackers can easily find default configurations in manuals and exploit them.
(C) Incorrect: Default settings do not guarantee better performance.
(D) Incorrect: Security risks outweigh user experience benefits in this case.
Question 1: Scenario-Based (Least Functionality)
A system administrator is setting up a new employee workstation. To follow the principle of least functionality, which of the following should the administrator do?
A) Install all possible applications the employee may need in the future.
B) Only install essential applications and services required for the employee’s role.
C) Allow employees to install any software they find useful.
D) Keep default applications installed on the system without modification.
Answer: B) Only install essential applications and services required for the employee’s role.
Explanation:
(A) Incorrect: Installing unnecessary applications increases vulnerabilities and does not follow the least functionality principle.
(B) Correct: The least functionality principle ensures only essential applications and services are installed, reducing security risks.
(C) Incorrect: Allowing unrestricted installations increases the chance of vulnerabilities.
(D) Incorrect: Default applications may include unnecessary or insecure programs.
Question 2: Explained-Based (Managing Software)
Why is keeping software up-to-date an essential security practice?
A) Updates often include security patches that fix vulnerabilities.
B) Older versions of software are always more secure than newer ones.
C) Software updates help increase disk space.
D) Newer software versions always include more features, making security a lesser concern.
Answer: A) Updates often include security patches that fix vulnerabilities.
Explanation:
(A) Correct: Updates frequently contain patches for newly discovered security vulnerabilities.
(B) Incorrect: Older versions may have unpatched vulnerabilities, making them less secure.
(C) Incorrect: Updating software does not necessarily increase disk space.
(D) Incorrect: Security is always a concern, regardless of new features.
Question 3: Scenario-Based (Secure Baseline Images)
A company wants to ensure that all new computers deployed in the organization have the same security settings and applications. What is the best approach to achieve this?
A) Allow each employee to install necessary applications manually.
B) Create a secure baseline image that includes the OS, required applications, and strict security settings.
C) Install only the operating system and let users customize everything else.
D) Use an outdated image that has been used for years without updates.
Answer: B) Create a secure baseline image that includes the OS, required applications, and strict security settings.
Explanation:
(A) Incorrect: Allowing employees to install applications can lead to inconsistencies and security risks.
(B) Correct: A secure baseline image ensures consistency and security across all workstations.
(C) Incorrect: Minimal installations without security configurations can leave vulnerabilities.
(D) Incorrect: Outdated images may not include recent security updates.
Question 4: Explained-Based (Preventing Unauthorized Software)
Which of the following is the best way to prevent unauthorized software installation on company computers?
A) Allow all employees full administrative rights.
B) Use application allowlisting to restrict which applications can run.
C) Let employees decide which software they need for productivity.
D) Use a firewall to block software installations.
Answer: B) Use application allowlisting to restrict which applications can run.
Explanation:
(A) Incorrect: Full administrative rights allow unrestricted software installations, increasing security risks.
(B) Correct: Application allowlisting ensures only approved software can run, preventing unauthorized installations.
(C) Incorrect: Employees may install unverified or insecure software, increasing vulnerabilities.
(D) Incorrect: A firewall does not prevent software installations on local machines.
Question 5: Scenario-Based (Application Allowlisting)
A company is concerned about employees installing unapproved applications. The security team decides to implement application allowlisting. How will this affect software execution?
A) Only applications on the allowlist will be permitted to run.
B) All applications will be allowed unless flagged as malware.
C) Only applications on the blocklist will be prevented from running.
D) Any new application installed by an employee will automatically be allowed.
Answer: A) Only applications on the allowlist will be permitted to run.
Explanation:
(A) Correct: Allowlisting ensures that only explicitly approved applications can execute.
(B) Incorrect: This describes a blocklisting approach, which is less secure.
(C) Incorrect: Blocklisting only prevents specific applications, allowing unlisted ones to run.
(D) Incorrect: Allowlisting denies all applications by default unless they are explicitly allowed.
Question 6: Explained-Based (Application Blocklisting)
Which statement best describes application blocklisting?
A) All applications are denied by default unless they are explicitly allowed.
B) Only applications on the blocklist are prevented from running, while all others are allowed.
C) Blocklisting is more secure than allowlisting because it prevents all threats.
D) Blocklisting requires less management effort than allowlisting and is always preferred.
Answer: B) Only applications on the blocklist are prevented from running, while all others are allowed.
Explanation:
(A) Incorrect: This describes allowlisting, not blocklisting.
(B) Correct: Blocklisting prevents only specific applications from running while allowing all others.
(C) Incorrect: Blocklisting is generally less secure because it allows unknown applications until they are explicitly blocked.
(D) Incorrect: Blocklisting is easier to manage but does not provide the highest level of security.
Question 7: Scenario-Based (Choosing Between Allowlisting and Blocklisting)
A company is debating whether to use allowlisting or blocklisting. If security is the top priority, which method should they choose?
A) Blocklisting, because it prevents the most dangerous applications from running.
B) Allowlisting, because it denies everything except explicitly approved applications.
C) Blocklisting, because it is easier to implement and requires fewer updates.
D) Neither method is useful for enterprise security.
Answer: B) Allowlisting, because it denies everything except explicitly approved applications.
Explanation:
(A) Incorrect: Blocklisting allows all applications except those explicitly blocked, making it less secure.
(B) Correct: Allowlisting is more secure because only approved applications can run.
(C) Incorrect: Ease of implementation does not equate to better security.
(D) Incorrect: Both allowlisting and blocklisting are critical security methods.
Question 8: Explained-Based (Centralized Management with Active Directory)
How does Microsoft Active Directory help organizations manage application security?
A) It provides a central way to enforce group policies, including application allowlisting and blocklisting.
B) It automatically updates all installed applications to the latest version.
C) It prevents employees from using any software on their computers.
D) It scans the network for malware and removes it automatically.
Answer: A) It provides a central way to enforce group policies, including application allowlisting and blocklisting.
Explanation:
(A) Correct: Active Directory allows centralized policy enforcement across all company workstations.
(B) Incorrect: Active Directory does not handle software updates.
(C) Incorrect: It restricts unauthorized software but does not completely prevent all software use.
(D) Incorrect: Active Directory is not an antivirus solution.
A military contractor is developing a new fighter jet control system that requires highly secure computing to prevent cyber threats. Which type of operating system should they use?
A) Windows 11 Enterprise
B) macOS Ventura
C) Integrity-178B
D) Ubuntu Desktop
Answer: C) Integrity-178B
Explanation:
(A) Incorrect: Windows 11 Enterprise is secure but not designed for mission-critical military systems.
(B) Incorrect: macOS Ventura is a commercial OS, not an embedded real-time system.
(C) Correct: Integrity-178B is a POSIX-based real-time OS with an EAL6 rating, used in fighter jets, spacecraft, and commercial aircraft.
(D) Incorrect: Ubuntu Desktop is a general-purpose OS, not optimized for military-grade security.
Which of the following statements is true about Evaluation Assurance Levels (EALs)?
A) EAL 1 is the highest level of security certification.
B) Only operating systems used in finance and healthcare can obtain EAL certification.
C) An operating system with EAL6 certification has undergone rigorous security evaluation for high-risk environments.
D) Every operating system must be evaluated for an EAL rating.
Answer: C) An operating system with EAL6 certification has undergone rigorous security evaluation for high-risk environments.
Explanation:
(A) Incorrect: EAL1 is the lowest, while EAL7 is the highest security level.
(B) Incorrect: EAL certification is not limited to finance and healthcare; it applies to military, aerospace, medical devices, etc.
(C) Correct: EAL6 OS (e.g., Integrity-178B) undergoes strict testing for critical applications like aerospace and defense.
(D) Incorrect: EAL certification is optional, and many general-purpose OS (Windows, macOS) are not rated at high levels.
A government agency needs an OS that ensures even administrators cannot modify access permissions to sensitive files. Which security model should they implement?
A) Discretionary Access Control (DAC)
B) Mandatory Access Control (MAC)
C) Role-Based Access Control (RBAC)
D) Attribute-Based Access Control (ABAC)
Answer: B) Mandatory Access Control (MAC)
Explanation:
(A) Incorrect: DAC allows users some control over their own files, which is less secure.
(B) Correct: MAC enforces strict access policies defined by system administrators—users cannot override them.
(C) Incorrect: RBAC assigns permissions based on roles, but does not enforce absolute control like MAC.
(D) Incorrect: ABAC considers multiple attributes (e.g., location, device), but MAC strictly follows predefined rules.
Which statement best describes the Trusted Computing Base (TCB) in an operating system?
A) The TCB includes all system components responsible for security enforcement.
B) The TCB is only found in trusted operating systems.
C) A larger TCB makes an OS more secure.
D) TCB refers to the memory allocated for security applications.
Answer: A) The TCB includes all system components responsible for security enforcement.
Explanation:
(A) Correct: The TCB consists of all critical security components, including the OS kernel, security controls, and authentication mechanisms.
(B) Incorrect: Every OS has a TCB, but trusted OS minimize it for security.
(C) Incorrect: A larger TCB increases attack surface, making security harder to maintain.
(D) Incorrect: TCB is not just memory—it includes all security-relevant components.
A company deploys SELinux on its servers to enforce strict security policies. How does SELinux improve security?
A) It allows users to define their own access rules.
B) It prevents unauthorized applications and users from accessing system resources, even if they have root privileges.
C) It replaces the Linux kernel with a more secure version.
D) It removes all unnecessary services and applications automatically.
Answer: B) It prevents unauthorized applications and users from accessing system resources, even if they have root privileges.
Explanation:
(A) Incorrect: SELinux follows Mandatory Access Control (MAC) policies, not user-defined access.
(B) Correct: SELinux restricts access based on policies, ensuring that even root users cannot bypass security settings.
(C) Incorrect: SELinux enhances security within the Linux kernel, but does not replace it.
(D) Incorrect: SELinux controls access, but does not automatically remove applications.
Why do trusted operating systems often use microkernels?
A) Microkernels minimize the Trusted Computing Base (TCB), reducing security vulnerabilities.
B) Microkernels include all system components inside the kernel for improved security.
C) Microkernels are faster than monolithic kernels.
D) Microkernels are only used in general-purpose operating systems like Windows and macOS.
Answer: A) Microkernels minimize the Trusted Computing Base (TCB), reducing security vulnerabilities.
Explanation:
(A) Correct: Microkernels reduce the size of the TCB, making the system less vulnerable to attacks.
(B) Incorrect: Microkernels move system functions outside the kernel, limiting its complexity.
(C) Incorrect: Microkernels are not necessarily faster, but they improve security and reliability.
(D) Incorrect: Microkernels are used in embedded systems (e.g., Integrity-178B), not traditional OS like Windows/macOS.
A user downloads an application from an unknown source. To prevent the app from accessing sensitive system files, what security mechanism should they use?
A) Role-Based Access Control (RBAC)
B) Application Sandboxing
C) Mandatory Access Control (MAC)
D) File Encryption
Answer: B) Application Sandboxing
Explanation:
(A) Incorrect: RBAC controls user roles, not application behavior.
(B) Correct: Sandboxing isolates applications, preventing them from affecting other files or programs.
(C) Incorrect: MAC enforces access control system-wide, but does not specifically sandbox applications.
(D) Incorrect: File encryption protects stored data, but does not restrict application execution.
A system administrator wants to ensure patches are applied consistently across all company workstations. What is the best approach to achieve this?
A) Manually check each system and install patches as needed.
B) Use automated patch management software to scan, download, and install patches.
C) Disable automatic patching and apply updates only during annual security audits.
D) Rely on employees to manually update their computers.
Answer: B) Use automated patch management software to scan, download, and install patches.
Explanation:
(A) Incorrect: Manually checking each system is inefficient and impractical in large networks.
(B) Correct: Automated patch management ensures timely updates and reduces human error.
(C) Incorrect: Delaying patching to annual audits leaves systems vulnerable for long periods.
(D) Incorrect: Employees may ignore updates, increasing security risks.
Why is patching a critical security practice for IT systems?
A) Patches help fix known vulnerabilities that hackers could exploit.
B) Patching prevents unauthorized software installation.
C) Patching is optional because firewalls provide sufficient protection.
D) Patches are only necessary for operating systems, not applications.
Answer: A) Patches help fix known vulnerabilities that hackers could exploit.
Explanation:
(A) Correct: Patches fix security holes, reducing the risk of attacks.
(B) Incorrect: Patching does not directly control software installation; it fixes bugs and vulnerabilities.
(C) Incorrect: Firewalls help, but patching is essential to protect against exploits.
(D) Incorrect: Applications also require patching to address security flaws.