HARDENING Flashcards

(25 cards)

1
Q

A standardized workstation setup, including OS, essential applications, and strict policies in corporate networks

A

Secure Baseline Imaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security measure that permits only approved applications to run on an OS

A

Allowlisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Entails preventing listed applications from running, allowing all others to execute

A

Blocklisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Background applications that operate within the OS, executing a range of tasks

A

Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Designed to provide a secure computing environment by enforcing stringent security policies that usually rely on mandatory access controls

A

TOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Set of controls that are installed on top of another Linux distribution like CentOS or Red Hat Linux

A

SELinux
(Security-Enhanced Linux)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A software patch that solves a security issue and should be applied immediately after being tested in a lab environment

A

Hotfix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides a system with additional functionality, but it does not usually provide any patching of security related issues

A

Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Includes all the hotfixes and updates since the release of the OS

A

Service Pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Planning, testing, implementing, and auditing of software patches

A

Patch Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Creating policies, procedures, and systems to track and verify patch compatibility

A

Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Set of rules or policies that can be applies to a set of users or computer accounts within an OS

A

Group Olicies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Permission schemes that are designed by various properties for a given file or process

A

Context-based Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Default context-based permission scheme that’s included inside of CentOS and Red Hat Enterprise Linux

A

SELinux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Defines what users can access an object

A

User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defines what roles can access a given object

17
Q

Groups objects together that have similar security requirements or characteristics

18
Q

Used to describe the sensitivity level of a given file, directory, or process

19
Q

Process of converting data into a secrect code to prevent unauthorized access

A

Data Encryption

20
Q

Encrypts the entire hard drive to protect all of the data being stored on it

A

Full Disk Encryption

21
Q

Similar to full-disk encryption, but it is only applied to a specific partition on the storage device

A

Partition Encryption

22
Q

Used to encrypt a set space on the storage medium, creating an encrypted container that can house various files and folders

A

Volume Encryption

23
Q

Secure the entire database, extending to multiple storage devices or cloud storage, similar to full-disk encryption

A

Database Encryption

24
Q

Used to encrypt individual records or rows within a database

A

Record-level Encryption

25
Standard security configuration applied to guarantee minimum security for a system, network, or application
Secure Baseline