Module 4-03 Challenge Flashcards

1
Q

Updating software, performing port filtering, and keeping network devices functioning properly are all examples of what type of hardening?

  • Security hardening
  • OS hardening
  • Physical security
  • Attack surface
A

Security hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the term for all the potential system vulnerabilities that a threat actor could exploit?

  • Attack surface
  • Risk
  • Security architecture
  • Security challenge
A

Attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hiring a security guard is an example of a _____ security hardening practice.

  • software-based
  • network-focused
  • physical
  • virtual
A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization’s in-house security team has been authorized to simulate an attack on the organization’s website. The objective is to identify any vulnerabilities that are present. What does this scenario describe?

  • Penetration testing
  • The Ping of Death
  • Packet sniffing
  • A Distributed Denial of Service (DDoS) attack
A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statements accurately describe OS hardening tasks? Select all that apply.

  • OS hardening is a set of procedures that maintain and improve OS security.
  • When disposing of software, it is a best practice to delete any unused applications.
  • Multi-factor authentication is a security measure requiring users to change passwords every month.
  • Some OS hardening tasks are performed at regular intervals, while others are performed only once.
  • Configuring a device setting to fit a secure encryption standard
  • Keeping an up-to-date list of authorized users.
  • Removing unused software to limit unnecessary vulnerabilities
  • Implementing an intrusion detection system (IDS)
A
  • OS hardening is a set of procedures that maintain and improve OS security.
  • When disposing of software, it is a best practice to delete any unused applications.
  • Some OS hardening tasks are performed at regular intervals, while others are performed only once.
  • Configuring a device setting to fit a secure encryption standard
  • Keeping an up-to-date list of authorized users.
  • Removing unused software to limit unnecessary vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which OS hardening practice involves a security analyst comparing the current configuration to existing documentation about the OS?

  • Conducting a network log analysis
  • Performing port filtering over network ports
  • Checking baseline configuration
  • Verifying user identity when accessing an OS
A

Checking baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The security measure _____ requires a user to verify their identity in two or more ways to access a system or network.

  • network log analysis
  • password policy
  • multifactor authentication (MFA)
  • baseline configuration
A

multifactor authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In what way might port filtering be used to protect a network from an attack?

  • By increasing the attack surface within a business network
  • By helping analysts inspect, analyze, and react to security events based on their priority
  • By blocking or allowing certain port numbers in order to limit unwanted communication
  • By creating isolated subnets for each of the various departments within an organization
A

By blocking or allowing certain port numbers in order to limit unwanted communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which network hardening practice is used to create isolated subnets for different departments in an organization?

  • Cloud hardening
  • Patch updating
  • Network segmentation
  • Penetration testing
A

Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is one key similarity between regular web servers and cloud servers?

  • They both require proper maintenance and security hardening.
  • They both use baseline images stored in the cloud to compare data.
  • In both, all data and application are stored together, regardless of their service category.
  • In both, all applications are stored together, regardless of their age.
A

They both require proper maintenance and security hardening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ is the process of strengthening a system to reduce its vulnerability and attack surface.

  • Security hardening
  • Network hardening
  • Port filtering
  • SIEM
A

Security hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Requiring employees to turn off their personal devices while in secure areas is an example of a _____ security hardening practice.

  • network-focused
  • virtual
  • cloud-based
  • physical
A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A security analyst reviews documentation about a firewall rule that includes a list of allowed and disallowed network ports. They compare it to the current firewall to ensure no changes have been made. What does this scenario describe?

  • Upgrading the interface between computer hardware and the user
  • Checking baseline configuration
  • Responsibly managing applications
  • Verifying user identity when accessing an OS
A

Checking baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which OS hardening practice requires users to verify their identity in two or more ways to access a system or network?

  • Port filtering
  • Multi-factor authentication (MFA)
  • SIEM
  • Patch updates
A

Multi-factor authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security analysts use ____ to create isolated subnets for different departments in an organization.

  • penetration testing
  • network segmentation
  • cloud hardening
  • patch updating
A

network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is a collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet

  • baseline configuration
  • SIEM
  • cloud network
  • patch update
A

cloud network