701 - Section 4 Flashcards
(216 cards)
What makes up a secure baseline?
The specific device or applications foundational security policy
In my working experience, what is a secure baseline that I have used?
STIG checklists
What is it called to apply these foundational secure configurations to the associated system?
Hardening
What are three general ways to harden a mobile device?
Always apply updates when ready, segment the company and user data, control with an MDM, which is a mobile device manager
What are three ways to harden a workstation?
Apply and automate monthly patches, connect to a policy management system, such as active directory group policy, remove unnecessary software to limit the threats
How do you harden network infrastructure devices?
Always check with the manufacturer because when they do put out security updates, while not frequent, they are usually very important.
What are three ways to harden cloud infrastructure?
Apply least privilege to services, network settings, etc… configure endpoint detection and response (EDR), always have an offsite back up
What are four general ways to harden a server?
Always apply all updates service packs, and patches… apply best practices to user accounts, limit network access, monitor and secure with antivirus anti-malware software
How do you harden an embedded system because they can be difficult to upgrade?
Apply security patches when available, prevent access from unauthorized users
How do you harden an RTOS?
Isolate the system, run with the minimum services needed, protect with a host-based firewall
How do you harden IOT devices?
Change the default passwords, deploy updates quickly, segment these devices by putting them on their own VLAN
What is another name for a map of an organizations wireless network?
A site survey
What are some of the benefits of a site survey?
They identify existing access points, they allow you to lay out and plan for interference, they identify wireless signal strengths
What is an especially helpful wireless survey tool?
Spectrum analyzer
What are three Features that an MDM provides?
Centralize management of the mobile devices, sets policies on apps, data, camera… Manages access control for things like screen locks and PINs
What does BYOD stand for?
Bring your own device
What does COPE stand for? And what is it?
Corporate owned personally enabled… When the company buys and controls the device but allows you to use it as a personal device as well
What are three security concerns with a cellular network?
Traffic monitoring, location tracking, worldwide access to any mobile device
What are three securities concerns with the Wi-Fi network?
Data capture so encrypt your data, on path attacks, denial of service
What is another name for Bluetooth?
PAN or personal area network
How do we ensure that all wireless communication is confidential?
By encrypting the wireless data
What is MIC? And what is it used for?
Message integrity check, and it is used to confirm that the received data is identical to the original #DATA sent
What is the problem with WPA2?
It is vulnerable to a pre-shared key (PK) brute force attack
What is a pre-shared key?
It is the wireless key that everyone uses when they connect