Podcast
Questions and Answers
The ASD top four measures for prevention are: ______ approved applications, Patch third-party applications and OS vulnerabilities, Restrict admin privileges to users who need them, Create a defense-in-depth system
The ASD top four measures for prevention are: ______ approved applications, Patch third-party applications and OS vulnerabilities, Restrict admin privileges to users who need them, Create a defense-in-depth system
White-list
The first step in deploying a new system is ______ planning
The first step in deploying a new system is ______ planning
System Security
The planning process needs to determine ______ requirements for the system, applications, data, and users
The planning process needs to determine ______ requirements for the system, applications, data, and users
security
Default configurations for many operating systems often maximizes ______ of use and functionality, rather than security
Default configurations for many operating systems often maximizes ______ of use and functionality, rather than security
Signup and view all the answers
Second step is a very critical step in securing a system is to secure the ______ OS
Second step is a very critical step in securing a system is to secure the ______ OS
Signup and view all the answers
Devices ______ enabled, servers ______ enabled, ……..
Devices ______ enabled, servers ______ enabled, ……..
Signup and view all the answers
An operating system is a set of programs designed to run other programs on a ______.
An operating system is a set of programs designed to run other programs on a ______.
Signup and view all the answers
The security of an OS depends on how the system is being ______ and maintained.
The security of an OS depends on how the system is being ______ and maintained.
Signup and view all the answers
Each layer is vulnerable to attack from below if the lower layers are not ______ properly.
Each layer is vulnerable to attack from below if the lower layers are not ______ properly.
Signup and view all the answers
OS Hardening is the process of adding extra security measures to your operating system in order to ______ it against the risk of cyber attacks.
OS Hardening is the process of adding extra security measures to your operating system in order to ______ it against the risk of cyber attacks.
Signup and view all the answers
The 2010 Australian Defense Signals Directorate (ASD) lists the “Top 35 ______ Strategies”.
The 2010 Australian Defense Signals Directorate (ASD) lists the “Top 35 ______ Strategies”.
Signup and view all the answers
Over 70% of the targeted cyber intrusions investigated by ASD in 2009 could have been prevented by the top four ______.
Over 70% of the targeted cyber intrusions investigated by ASD in 2009 could have been prevented by the top four ______.
Signup and view all the answers
Identify what is required for a particular system during the ______ phase
Identify what is required for a particular system during the ______ phase
Signup and view all the answers
The ______ should be kept up to date with all critical security related patches installed.
The ______ should be kept up to date with all critical security related patches installed.
Signup and view all the answers
Removing ______ services, applications, and protocols reduces attack surface.
Removing ______ services, applications, and protocols reduces attack surface.
Signup and view all the answers
Configure ______ to operate with minimum permissions.
Configure ______ to operate with minimum permissions.
Signup and view all the answers
Install and configure ______ controls, such as anti-virus and host-based firewalls.
Install and configure ______ controls, such as anti-virus and host-based firewalls.
Signup and view all the answers
The third step is to secure ______ and services.
The third step is to secure ______ and services.
Signup and view all the answers