Hardening Techniques 2.5 Flashcards

1
Q

To keep and OS hardened, all […] should be installed

  • Security patches
  • Service Packs
A

Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To harden user accounts, you should have a […] in place that enforces minimum length and complexity

A

Password Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To protect your data as it travels across the network, you should use a […] to encrypt traffic

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A new type of antivirus, called a […], doesn’t just use signatures as a detection tool, but also uses behavior analysis, machine learning, and process monitoring.

It can also respond to a threat without user intervention
- Isolate the system
- Quarantine threat
- Roll back to previous configuration

A

Endpoint Detection and Response (EDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A software based firewall that runs on a device is called a […] firewall

It allows or disallows incoming or outgoing application traffic

A

Host Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Often built into the EDR / Anti Malware, a […] recognizes and blocks known attacks as they happen.

A

Host Based Intrusion Prevention System (HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

[…] leave possible entry points into your network, and should be closed unless required.

Control access with a firewall

A

Open ports and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use the command […] to scan for any open ports on a system

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Any new equipment should have its […] when first logging into it.

A

Default password changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly