Security Hardening Flashcards

1
Q

Security Hardening

A

The process of strengthening a system to reduce its vulnerability and attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

attack surface

A

all the vulnerabilities that a threat actor could exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OS

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Patch update

A

addresses security vulnerabilities within a program or product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baseline Configuration

A

A documented set of specifications within a system that is used as a basis for future builds, releases, and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SPP

A

Strong password policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MFA

A

Multifactor Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dictionary Attack

A

using common dictionary words to try to guess a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hashing

A

converting a password to a hash that can be used to verify the autenticity of the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Salting

A

adding random characters to a hashed password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAPTCHA

A

Complete automated public turing test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Log Analysis

A

The process of examining network logs to identify events of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SEIM Tool

A

An application that collects and analyzes data to monitor critical activities in an organization. Ranks vulnerabilities from high to low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port filtering

A

A firewall principle that blocks certain ports from being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption Standards

A

Rules/policies for how encryption is done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

defense in depth

A

adding multiple layers of security to networks, devices, and software

17
Q

Intrusion Detection system (IDS)

A

monitors system activity and alerts on possible intrusions. Does this by packet sniffing and analyzing for common intrusion methods.

Doesn’t stop traffic

18
Q

Intrusion Prevention System

A

Proactively searches for signatures of known attacks and data anomalies in packets, and blocks the sender if it seems suspicious

19
Q

Full packet captures

A

records and analyzes all the data transmitted over your network

20
Q

IAM

A

Identity access management (processes and technologies that help orgs manage digital identities in their env.

Important idea: user role management

21
Q

Configuration

A

Setting up the cloud systems

22
Q

Zero Day Attack

A

An exploit that was previously unkown

23
Q
A