Vulnerability Management & System Hardening Flashcards

1
Q

What are the steps of managing vulnerabilities?

A

Scanning, analysis, prioritization, and mitigation/remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of scanning in vulnerability management?

A

Identify vulnerabilities and what is scanned includes ports and services running on those ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What tool is commonly used for scanning?

A

NMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Cyber Kill Chain?

A

A model that outlines the stages of a cyber attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is the Cyber Kill Chain useful?

A

It helps in understanding and preventing cyber attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the goals of hardening?

A

Shrink attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can hardening be achieved?

A

Close ports, turn off file sharing, uninstall software not in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is patch management?

A

Automation for updates, setting when to update and waiting to verify that it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of firewalls?

A

Manage incoming and outgoing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

At what level does a stateful firewall operate?

A

Level 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What role do anti-virus/anti-malware programs serve?

A

Close off your machine and sometimes are impossible to remove

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is sandboxing?

A

Downloading content into virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of encryption technologies?

A
  • BitLocker
  • FileVault
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a key practice regarding passwords in hardening?

A

Remove default passwords and built-in accounts (routers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two aspects of mobile hardening?

A
  • App permissions
  • Limit app installation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly