Podcast
Questions and Answers
Which step is the first critical step in securing a system?
Which step is the first critical step in securing a system?
- Securing the base operating system (correct)
- Assessing risks and planning system deployment
- Securing network protection mechanisms
- Securing key applications
What is the purpose of operating systems hardening?
What is the purpose of operating systems hardening?
- To configure users, groups, and permissions
- To remove unnecessary services, applications, and protocols
- To secure the base operating system (correct)
- To install and patch the operating system
What should be done to secure any critical system content?
What should be done to secure any critical system content?
- Secure underlying operating system (correct)
- Assess risks and plan the system deployment
- Ensure appropriate processes are used to maintain security
- Ensure appropriate network protection mechanisms are used
What is the purpose of securing the underlying operating system and key applications?
What is the purpose of securing the underlying operating system and key applications?
What additional security controls can be installed and configured?
What additional security controls can be installed and configured?
Flashcards are hidden until you start studying