Operating System Security Measures
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

The ASD top four measures for prevention are: ______ approved applications, Patch third-party applications and OS vulnerabilities, Restrict admin privileges to users who need them, Create a defense-in-depth system

White-list

The first step in deploying a new system is ______ planning

System Security

The planning process needs to determine ______ requirements for the system, applications, data, and users

security

Default configurations for many operating systems often maximizes ______ of use and functionality, rather than security

<p>ease</p> Signup and view all the answers

Second step is a very critical step in securing a system is to secure the ______ OS

<p>base</p> Signup and view all the answers

Devices ______ enabled, servers ______ enabled, ……..

<p>is, is</p> Signup and view all the answers

An operating system is a set of programs designed to run other programs on a ______.

<p>computer</p> Signup and view all the answers

The security of an OS depends on how the system is being ______ and maintained.

<p>monitored</p> Signup and view all the answers

Each layer is vulnerable to attack from below if the lower layers are not ______ properly.

<p>secured</p> Signup and view all the answers

OS Hardening is the process of adding extra security measures to your operating system in order to ______ it against the risk of cyber attacks.

<p>strengthen</p> Signup and view all the answers

The 2010 Australian Defense Signals Directorate (ASD) lists the “Top 35 ______ Strategies”.

<p>Mitigation</p> Signup and view all the answers

Over 70% of the targeted cyber intrusions investigated by ASD in 2009 could have been prevented by the top four ______.

<p>measures</p> Signup and view all the answers

Identify what is required for a particular system during the ______ phase

<p>Planning</p> Signup and view all the answers

The ______ should be kept up to date with all critical security related patches installed.

<p>system</p> Signup and view all the answers

Removing ______ services, applications, and protocols reduces attack surface.

<p>unnecessary</p> Signup and view all the answers

Configure ______ to operate with minimum permissions.

<p>users</p> Signup and view all the answers

Install and configure ______ controls, such as anti-virus and host-based firewalls.

<p>additional security</p> Signup and view all the answers

The third step is to secure ______ and services.

<p>Apps</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser