Course #3 Module 4 Flashcards

(11 cards)

1
Q

Updating software, performing port filtering, and keeping network devices functioning properly are all examples of what type of hardening?

A

Security hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the relationship between security hardening and an attack surface?

A

Security hardening diminishes the attack surface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Installing security cameras is an example of a _____ security hardening practice.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To help improve the security of a business, its in-house security team is approved to simulate an attack that will identify vulnerabilities in business processes. What does this scenario describe?

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To help improve the security of a business, its in-house security team is approved to simulate an attack that will identify vulnerabilities in business processes. What does this scenario describe?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are OS hardening tasks?

A

Regularly installing updates, Implementing multifactor authentication Using secure encryption standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which OS hardening practice involves a security analyst comparing the current configuration to existing documentation about the OS?

A

Checking baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multi-factor authentication (MFA) is an example of which type of hardening practice?

A

Checking baseline configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following statements accurately describes port filtering?

A

OS hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security analysts use ____ to create isolated subnets for different departments in an organization.

A

network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can a security professional confirm that no unverified changes have occurred within a cloud server?

A

Compare the server baseline image to the data in cloud servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly