Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Name four procedures for Hardening the Network? |
|
|
Name steps to Harden Network Switch? |
|
|
How is are Rogue system/device handled? |
Disable the port the device is connected to then investigate. |
|
What are Security Templates? |
Security templates are text files that can be used to configure policy settings in a Windows environment. |
|
What is a security Baseline? |
A standard configuration that has been approved by the company for a specific type of system or device. It is required for all systems. |
|
What are the four key stages of managing a Security Baseline? |
|
|
Name three methods of reporting? |
|
|
Purposely Inputting Invalid data into a data entry screens is? |
Fuzzing |
|
What is the Application Security Issue with ActiveX controls, Java, Scripting Browser and Cookies? |
|
|
What is the Application Security Issue with Instant messaging, Peer-to-Peer File sharing, P2P and Buffer overflow?
|
|
|
The best practice for preventing application security fall into two categories what are they? |
|
|
Application Hardening is accomplished by? |
|
|
Cross-site Scripting is prevented by? |
Validating input. |
|
Cross-site request forgery is prevented by? |
|
|
Server and Client side validation can be used is a method of? |
Application Hardening. |
|
What is the first thing to do on all servers to harden them? |
Disable unnecessary software and services. |
|
Once all unnecessary software and services have been disabled what should be done next. |
|
|
In addition to applying standard hardening procedures what should be done with the HTTP servers? |
|
|
In addition to applying standard hardening procedures what should be done with the DNS servers? |
|
|
In addition to applying standard hardening procedures what should be done with the DHCP servers?
|
|
|
In addition to applying standard hardening procedures what should be done with the SMTP and FTP servers?
|
|
|
Network segmentation allow for control of? |
Which systems can communicate with one another on the network.VLANs and IP subnets can be used for segments. |
|
Control redundancy and diversity is the security principle of? |
Ensuring that there is diversity of product |
|
These provide granular control of access to specific network services. What are they? |
Wrappers |
|
In addition to patching the Operating System it is a good practice also patch the ________________? |
Applications |