Hardening Technique 2.5 Flashcards

1
Q

Hardening

A
  • Reducing the attack surface area associated with a system reduces the vulnerabilities now and in the future.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Updates

A
  • Always apply updates to the operating system
  • Includes operating system update/service packs, security patches.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Securing User Accounts

A
  • A form of system hardening
  • Ensure proper password management
  • Give limited access or specific access for certain user accounts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Access and Security

A
  • An area of system hardening.
  • Limit who has access to the system when logging on.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Monitor and Secure

A
  • Another method for system hardening.
  • Using some form of end point detection to secure the system.
  • Done through anti-virus and anti-malware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption

A
  • A hardening technique.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encrypted File System (EFS)

A
  • Security feature of Windows, from Windows 2000 onward.
  • Enables the transparent encryption/decryption of the files on the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Full Disk Encryption (FDE)

A
  • Application of encryption to an entire disk.
  • Protects all contents in one container.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual Private Network (VPN)

A
  • Encrypted network connection across another network.
  • Offers a private communication channel across a public medium.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Endpoint Detection and Response (EDR)

A
  • A method of threat point detection
  • Scales to meet the increasing number of threats.
  • Can perform a root cost analysis of a threat.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EDR Response to a Threat

A
  • Isolate the system, quarantine the threat, then roll back to a previous config.
  • This process can be automated using an API.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Host-Based Firewalls

A
  • Also known as Personal Firewalls.
  • Host-Based protective mechanisms.
  • Monitor and control traffic passed in to and out of a single system.
  • Stops malware before it can start
  • Can be managed by a central system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Host-Based Intrusion Prevention System (HIPS)

A
  • Recognizes and blocks known attacks.
  • Secures OS and application configs, validate incoming service requests.
  • Often built into endpoint protection software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HIPS Identification

A
  • Detects malicious actions being performed on the system which can include signatures, heuristics, behavioral.
  • Can also monitor how the operating system is working
  • Detects buffer overflows, registry updates, or if there are written files to the Windows folder.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Open Ports and Services

A
  • When installing an outward facing software, ports will be open.
  • Attackers will attempt to find these open ports and exploit them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Securing Open Ports and Services

A
  • Close as many ports as possible.
  • Using firewalls to block an open port.
17
Q

Removing Unnecessary Software

A
  • Different applications will have their own specific patches to stay up to date.
  • Best practice is to remove any unused applications or software.