Hardening the os - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Hardening the os? On this page you'll find 170 study documents about Hardening the os.
Page 4 out of 170 results
Sort by
-
CISA Practice Questions and Answers 100% Correct
- Exam (elaborations) • 126 pages • 2024
-
Available in package deal
-
- $15.49
- + learn more
CISA Practice Questions and Answers 100% Correct 
In a public key infrastructure (PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer? 
 
Correct A. Nonrepudiation 
 
B. Encryption 
 
C. Authentication 
 
D. Integrity 
 
. 
You are correct, the answer is A. 
 
 
A. Nonrepudiation, achieved through the use of digital signatures, prevents the senders from later denying that they generated and sent the message. 
 
B. Encryption m...
-
SANS SEC401 Question and answer latest update
- Exam (elaborations) • 53 pages • 2024
-
Available in package deal
-
- $12.39
- + learn more
SANS SEC401 Question and answer latest update 
Conceptual Design (network architecture) 
Includes the core components of a network architecture 
 
Will consider OS platforms, server services, critical core operational functions, etc. 
 
Helps to understand the overall purpose the network ('WHY' we have it and the "WHAT' it helps us to achieve) 
 
May utilize the concept of "closed-box" diagramming 
 
 
TTP 
Tactics 
Techniques 
Procedures 
 
 
Logical design (network architecture) 
Represe...
-
SANS GISCP and GIAC Exam Questions With 100% Correct Answers
- Exam (elaborations) • 50 pages • 2024
-
- $14.49
- + learn more
SANS GISCP and GIAC Exam Questions 
With 100% Correct Answers 
Ack Piggybacking - answerThe Practice of sending an ACK inside another packet going to 
the same destination 
Address resolution protocol - answerProtocol for mapping an IP address to a physical 
machine address that is recognized on the local network. 
A table, usually called the ARP cache, is used to maintain a correlation between each MAC and 
its corresponding IP address 
What are the five threat vectors? - answerOutside attack f...
-
CMSC 426 Final (100% Verified)
- Exam (elaborations) • 8 pages • 2023
-
Available in package deal
-
- $10.50
- + learn more
Hardening correct answers Securing a system against attack, often using things that are built-in or already available on the system 
 
Hardening examples correct answers Reducing avenues of attack, patching known vulnerabilities, using encryption, installing security measures (firewalls, anti-virus software), user-end (strong passwords) 
 
Windows "Defender" Firewall correct answers Sets policy for inbound and outbound network traffic 
Every network connection has this enabled by default 
The ...
-
CYSE 101 Final Exam Jones
- Exam (elaborations) • 5 pages • 2023
-
- $10.99
- + learn more
How does the principle of least privilege apply to operating system hardening? - Answer- prevents attack actions that require administrator or root privilege 
 
What is the difference between a port scanner and a vulnerability assessment tool? - Answer- port scanners discover listening ports; vulnerability assessment tools report known vulnerabilities on listening ports 
 
What does applying a vendor OS update (patch) usually do? - Answer- 
 
What does executable space protection do for us and ...
As you read this, a fellow student has made another $4.70
-
C836 WGU COMPLETE Exam And Answers.
- Exam (elaborations) • 24 pages • 2024
-
- $13.49
- + learn more
bounds checking - correct answer to set a limit on the amount of data we expect to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
 
race conditions - correct answer A type of software development vulnerability that occurs when multiple processes or multiple threads within a process control or share access to a particular resource, and the correct handling of that resource depends on the proper ordering or timing of transactions...
-
Network Security Chapter 4 with 100% correct answers
- Exam (elaborations) • 6 pages • 2024
-
- $14.99
- + learn more
While going through the network log, Sarah, a network security administrator, noticed substantial outbound network traffic. Which activity did Sarah perform? 
Indicator of compromise (IOC) 
 
 
 
A company monitors the network activity of the organization and stores the logs in a database. You have been asked to identify whether there are any malicious activities in the network. Which of the following can denote the upper and lower bounds of their various network activities? 
key risk indicator ...
-
CERTIFIED CLOUD SECURITY SPECIALIST - C838 |342 QUESTIONS AND ANSWERS
- Exam (elaborations) • 55 pages • 2023
- Available in package deal
-
- $14.99
- + learn more
NIST 800-145 Cloud Computing Definition 
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
 
 
Business Impact Analysis (BIA) 
An assessment of the priorities given to each asset and process within the organization. A proper analysis should consider the effect any harm or loss of each asset might mean to the organi...
-
WGU C836 CHAPTER 11 Questions and Answers (Graded A+)
- Exam (elaborations) • 2 pages • 2023
-
- $8.99
- + learn more
OS hardening - ANSWER-the process of reducing the number of available avenues through which our OS might be attacked 
 
attack surface - ANSWER-The total of the areas through which our operating system might be attacked 
 
6 main hardening categories - ANSWER-1. Removing unnecessary software 
2. Removing or turning off unessential services 
3. Making alterations to common accounts 
4. Applying the principle of least privilege 
5. Applying software updates in a timely manner 
6. Making use of log...
-
CYSE 101 Final Exam 2023 with 100% correct answers
- Exam (elaborations) • 6 pages • 2023
-
Available in package deal
-
- $16.49
- + learn more
How does the principle of least privilege apply to operating system hardening? 
prevents attack actions that require administrator or root privilege 
 
 
 
What is the difference between a port scanner and a vulnerability assessment tool? 
port scanners discover listening ports; vulnerability assessment tools report known vulnerabilities on listening ports 
 
 
 
What does applying a vendor OS update (patch) usually do? 
... 
 
 
 
What does executable space protection do for us and how? 
preven...
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia