Module 4-03 Challenge Flashcards
Updating software, performing port filtering, and keeping network devices functioning properly are all examples of what type of hardening?
- Security hardening
- OS hardening
- Physical security
- Attack surface
Security hardening
What is the term for all the potential system vulnerabilities that a threat actor could exploit?
- Attack surface
- Risk
- Security architecture
- Security challenge
Attack surface
Hiring a security guard is an example of a _____ security hardening practice.
- software-based
- network-focused
- physical
- virtual
physical
An organization’s in-house security team has been authorized to simulate an attack on the organization’s website. The objective is to identify any vulnerabilities that are present. What does this scenario describe?
- Penetration testing
- The Ping of Death
- Packet sniffing
- A Distributed Denial of Service (DDoS) attack
Penetration testing
Which of the following statements accurately describe OS hardening tasks? Select all that apply.
- OS hardening is a set of procedures that maintain and improve OS security.
- When disposing of software, it is a best practice to delete any unused applications.
- Multi-factor authentication is a security measure requiring users to change passwords every month.
- Some OS hardening tasks are performed at regular intervals, while others are performed only once.
- Configuring a device setting to fit a secure encryption standard
- Keeping an up-to-date list of authorized users.
- Removing unused software to limit unnecessary vulnerabilities
- Implementing an intrusion detection system (IDS)
- OS hardening is a set of procedures that maintain and improve OS security.
- When disposing of software, it is a best practice to delete any unused applications.
- Some OS hardening tasks are performed at regular intervals, while others are performed only once.
- Configuring a device setting to fit a secure encryption standard
- Keeping an up-to-date list of authorized users.
- Removing unused software to limit unnecessary vulnerabilities
Which OS hardening practice involves a security analyst comparing the current configuration to existing documentation about the OS?
- Conducting a network log analysis
- Performing port filtering over network ports
- Checking baseline configuration
- Verifying user identity when accessing an OS
Checking baseline configuration
The security measure _____ requires a user to verify their identity in two or more ways to access a system or network.
- network log analysis
- password policy
- multifactor authentication (MFA)
- baseline configuration
multifactor authentication (MFA)
In what way might port filtering be used to protect a network from an attack?
- By increasing the attack surface within a business network
- By helping analysts inspect, analyze, and react to security events based on their priority
- By blocking or allowing certain port numbers in order to limit unwanted communication
- By creating isolated subnets for each of the various departments within an organization
By blocking or allowing certain port numbers in order to limit unwanted communication
Which network hardening practice is used to create isolated subnets for different departments in an organization?
- Cloud hardening
- Patch updating
- Network segmentation
- Penetration testing
Network segmentation
What is one key similarity between regular web servers and cloud servers?
- They both require proper maintenance and security hardening.
- They both use baseline images stored in the cloud to compare data.
- In both, all data and application are stored together, regardless of their service category.
- In both, all applications are stored together, regardless of their age.
They both require proper maintenance and security hardening.
____ is the process of strengthening a system to reduce its vulnerability and attack surface.
- Security hardening
- Network hardening
- Port filtering
- SIEM
Security hardening
Requiring employees to turn off their personal devices while in secure areas is an example of a _____ security hardening practice.
- network-focused
- virtual
- cloud-based
- physical
physical
A security analyst reviews documentation about a firewall rule that includes a list of allowed and disallowed network ports. They compare it to the current firewall to ensure no changes have been made. What does this scenario describe?
- Upgrading the interface between computer hardware and the user
- Checking baseline configuration
- Responsibly managing applications
- Verifying user identity when accessing an OS
Checking baseline configuration
Which OS hardening practice requires users to verify their identity in two or more ways to access a system or network?
- Port filtering
- Multi-factor authentication (MFA)
- SIEM
- Patch updates
Multi-factor authentication (MFA)
Security analysts use ____ to create isolated subnets for different departments in an organization.
- penetration testing
- network segmentation
- cloud hardening
- patch updating
network segmentation
A ____ is a collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet
- baseline configuration
- SIEM
- cloud network
- patch update
cloud network