Module 4 Flashcards

1
Q

Security Hardening

A

The process of strengthening a system to reduce its vulnerability and attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack Surface

A

All the potential vulnerabilities that a threat actor could exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Hardening is Conducted on

A

Hardware

Operating systems

Applications

Computer networks

Databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Penetration Test

A

A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Operating System (OS)

A

The interface between computer hardware and the user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Patch Update

A

A software and operating system update that addresses security vulnerabilities within a program or product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Baseline Configuration (Baseline Image)

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multi-factor Authentication (MFA)

A

A security measure which requires a user to verify their identity in two or more ways to access a system or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Categories of Multi-Factor Identification

A

Something you know

Something you have

Something unique about you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Security Hardening

A

Port filtering

Network access privilege

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tasks performed

A

Firewall rules maintenance

Network log analysis

Patch updates

Server backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Log Analysis

A

The process of examining network logs to identify events of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Information and Event Management tool (SIEMENS)

A

An application that collects and analyzes log data to monitor critical activities in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port Filtering

A

A firewall function that blocks or allows certain port numbers to limit unwanted communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Network

A

A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly