Section 6 - Hardening Flashcards

1
Q

What is “hardening”?

A

The act of configuring an operating system securely by updating it, creating rules and policies to govern it, and remove unnecessary applications and services.

*** Essentially, you are attempting to mitigate the risks by minimizing the vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the concept of “least functionality”?

A

This is the process of configuring a work station or a server to only provide essential applications and services that are required by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In large networks, what is the best solution for protecting computers from having unused programs on their computers?

A

Preventing excessive installations

*** In corporate networks, it’s common to create a secure baseline image that is used at all work stations across the company. This has an OS, minimum applications and strict configuration policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is “application allowlisting”?

A

Only applications that are on the approved list are allowed to be run by the OS

*** With this, everything is denied by default unless its on that list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is “application blocklisting”?

A

Any application that’s placed on a list will be prevented from running

*** With this, everything is allowed except what’s explicitly denied, every new variation of malware or new program would be allowed until you create a blocklist rule for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is “Microsoft Active Directory domain controller”?

A

This allows you to centrally manage your lists (blocklist and allowlist) and deploy them through your group policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a “service” on a computer?

A

A type of application that runs in the background of the operating system, and it performs various functions like the print spooler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where can you go on a Windows machine to see the services installed on your machine?

A

Type in “service” in the windows key. You can also go into command prompt, and type in sc or net command.

For Mac computers, you would go into Activity Monitor or your command line (Linux uses command line too)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a “Trusted Operating System”?

A

Any operating system that meets the requirements set forth by the government and it contains multilevel security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some examples of Trusted Operating Systems?

A
  1. Every version of Windows since Windows 7
  2. Every version of MAC OS since 10.6
  3. Red Hat Enterprise Server
  4. TrustedBSD extensions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a software manufacturer remain as a Trusted Operating System?

A

They must routinely provide patches and updates to the software in order to maintain its security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a patch?

A

A single problem-fixing piece of software for an operation system or application

*** When a bug is found in the code a patch is created to correct this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Hotfix?

A

A single problem-fixing piece of software for an operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between a patch and a hotfix?

A

A hotfix can be installed without requiring a reboot of your system. A patch requires a system reboot.

These are often used interchangeably.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the five different categories of updates?

A
  1. Security Updates
  2. Critical Update
  3. Service Pack
  4. Windows Update
  5. Drivers Update
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Security Update?

A

Software code that is issued for a product-specific security-related vulnerability

** If a hacker finds a bug in the code for Microsoft Word that might be a breach of security. So Microsoft would release a security update that contains a patch to correct the bug for that code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Critical Update?

A

A piece of software that’s designed for a specific problem that addresses a critical, non-security bug in a piece of software.

** For example, if Google Chrome kept crashing every time you tried to load Facebook then Google would release a Critical Update that patches this non-security focused bug.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a Service Pack?

A

A grouping of other patches. It contains hot fixes, security updates, critical updates, and possibly even some feature or design changes.

These are commonly seen with OS updates released once a year.

Now Service Packs are nice because they provide a single installation file that contains hundreds of individual updates that can be installed as opposed to doing individual patches and updates.

19
Q

What is a Windows Update?

A

This is a recommended update to fix a non-critical problem that certain users have found and it may also provide some additional features or capabilities.

*** For example, if Windows wanted to add a new way to display animated background images on your desktop, this would be a Windows update.

20
Q

What is a Drivers Update?

A

These provide either a security fix or additional features for a supported piece of hardware.

** For example, you might receive a driver update for your network card. This would help increase the efficiency of how it sends/receives data.

21
Q

In Windows 10, the ___ ___ ___ is used to manage all of the different types of updates directly from Microsoft.

A

windows update program

*** This can be configured to allow automated updates to occur as well

22
Q

What is Patch Management?

A

The planning, testing, implementing, and auditing of software patches.

*** Part of patch management is keeping track of all of the various updates and ensuring that they get installed

23
Q

What are the four steps to patch management?

A
  1. Planning
  2. Testing
  3. Implementing
  4. Auditing
24
Q

What happens during the “Planning” step of Patch Management?

A

Consists of creating policies, procedures, and systems to track available patches and updates, and a method to verify that they are compatible with your systems.

This also determines how you’re going to test and deploy each patch.

25
Q

Microsoft provides a useful tool that can help us in determining the status of our system, and whether or not a patch needs to be applied. This is known as…?

A

Microsoft Baseline Security Analyzer

MBSA

This tool can help identify security misconfiguration within your network’s workstations

26
Q

What happens during the “testing” step of patch management?

A

This is when testing of any patch your receive prior to automating its deployment throughout the network

27
Q

What happens during the “deploy” step of patch management?

A

The patch is deployed to all workstations that might require it. This can be done manually or automatically by deploying that patch to your clients’ workstations to implement it

28
Q

What is an example of a deployment tool used for patch management?

A

Microsoft System Center Configuration Manager

There are also other third-party management tools

29
Q

Why is it recommended that you disable the “Windows Update” tool?

A

This allows you to test the patch prior to deploying it in your environment

Otherwise, Windows update will automatically update patches across your network

30
Q

What happens during the “auditing” step of patch management?

A

Audit the client status after conducting patch deployment. This ensure the patch was installed properly and that there’s no unexpected failures that have occurred.

31
Q

What is an auditing tool that can be used in patch management?

A

System Center Configuration Manager

This conducts scanning and verification of your workstations to help ensure those patches were installed properly

32
Q

What is a “Group Policy”?

A

A set of rules or policies that can be applied to a set of users or computer accounts within an operating system.

This is done in the Group Policy Editor

33
Q

What kind of rules can you manage in a group policy?

A

Password complexity requirements

Account lockout policies

Software restrictions

Application restrictions

34
Q

Each policy that you set in the Group Policy Editor acts as a ___ ___ that can apply a set of rules to different users.

A

security template

35
Q

A large part of hardening the operating system occurs through loading different ___ against the workstation or against the server.

A

GPOs

Group Policy Objectives

36
Q

What is “baselining”?

A

A process of measuring changes in the network, hardware, or software environment.

*** This helps establish what normal is for your organization.

37
Q

The level of security of your system is affected by its ___ ___ ___.

A

file system type

38
Q

What are some examples of file systems?

A

NTFS

FAT32

ext4

Hierarchical File System Plus

Apple File System

39
Q

What file system does Windows use?

A

NTFS or FAT32

*** It is highly recommended that you use NTFS.

40
Q

What is NTFS?

A

New Technology File System

The default file system format for Windows as it is more secure than FAT32.

It supports logging, encryption, larger partition sizes and larger file sizes than FAT32 does.

41
Q

What file system does Linux use?

A

ext4

42
Q

What file system does MAC OS X use?

A

Apple File System

43
Q

In addition to using the right type of file system, it’s also important to use…?

A

Whole disc encryption

44
Q

What are five things you can do to help postpone the inevitable failure of your hard drive?

A
  1. Remove any temporary files from your system by using a disc cleanup utility
  2. Conduct periodic file system checks
  3. Perform a disc drive de-fragmentation periodically
  4. Ensure you have a good backup of your data
  5. Ensure you understand how to use different restoration techniques and actually practice them.