18 Questions
The ASD top four measures for prevention are: ______ approved applications, Patch third-party applications and OS vulnerabilities, Restrict admin privileges to users who need them, Create a defense-in-depth system
White-list
The first step in deploying a new system is ______ planning
System Security
The planning process needs to determine ______ requirements for the system, applications, data, and users
security
Default configurations for many operating systems often maximizes ______ of use and functionality, rather than security
ease
Second step is a very critical step in securing a system is to secure the ______ OS
base
Devices ______ enabled, servers ______ enabled, ……..
is, is
An operating system is a set of programs designed to run other programs on a ______.
computer
The security of an OS depends on how the system is being ______ and maintained.
monitored
Each layer is vulnerable to attack from below if the lower layers are not ______ properly.
secured
OS Hardening is the process of adding extra security measures to your operating system in order to ______ it against the risk of cyber attacks.
strengthen
The 2010 Australian Defense Signals Directorate (ASD) lists the “Top 35 ______ Strategies”.
Mitigation
Over 70% of the targeted cyber intrusions investigated by ASD in 2009 could have been prevented by the top four ______.
measures
Identify what is required for a particular system during the ______ phase
Planning
The ______ should be kept up to date with all critical security related patches installed.
system
Removing ______ services, applications, and protocols reduces attack surface.
unnecessary
Configure ______ to operate with minimum permissions.
users
Install and configure ______ controls, such as anti-virus and host-based firewalls.
additional security
The third step is to secure ______ and services.
Apps
This quiz covers essential security measures for operating systems, including prevention strategies and risk assessment during the installation process. Learn about the ASD top four measures and how to build a secure system.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free