Operating Systems Flashcards

1
Q

How can the risk of attacks on remotely accessed services, such as the web or file transfer services, be reduced?

A

Ensuring that most of the files can only be read, but not written, by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the goal for penetration testing an operating system and when should it be performed?

A

Ensure previous security configuration steps are correctly implemented, identify any possible vulnerabilities, and close all unneeded ports.

Testing should be done after initial hardening of the system and repeated periodically as part of the security maintenance process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why shouldn’t supplied default software packages be used when performing the initial installation?

A

Default configuration is set to maximise ease of use and functionality rather than security.
If fewer software packages are available to run, the risk is reduced. If additional packages are needed later, they can be installed when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four basic steps to secure the base operating system?

A
  1. Install and patch the operating system.
  2. Harden and configure operating system by:
    - removing unnecessary services, applications and protocols
    - configuring users, groups and permissions
    - configuring resource controls.
  3. Install and configure additional security controls such as antivirus, host-based firewalls and IDS.
  4. Test the security of the basic operating system to ensure that the steps taken adequately address its security needs.

All installations need to come from trusted sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four strategies to secure an operating system?

A
  1. White-list approves applications
  2. Patch third party applications and operating system vulnerabilities.
  3. Restrict administrative privileges.
  4. Create a Defense-in-depth system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How should an operating system be installed?

A

Installed by an expert, in an isolated environment then immediately updated for databases that are publicly available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly