4.1 Given a scenario, apply common security techniques to computing resources

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

These flashcards are designed to help students review key concepts related to applying security techniques to computing resources, focusing on device hardening, secure configuration practices, and risk management.

Last updated 6:14 PM on 3/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Device hardening is the practice of changing configurations to secure systems from threats by reducing the vulnerabilities attributed to __________ configurations.

default

2
New cards

Common techniques for device hardening include regular update processes, secure password policies, the principle of __________, and disabling unnecessary software.

least privilege

3
New cards

A secure baseline is a collection of standard configurations and settings for network devices, software, and __________ controls.

access

4
New cards

The Center for __________ Security (CIS) Benchmarks are a resource for secure configuration best practices.

Internet

5
New cards

Security Technical Implementation Guides (STIGs) are developed by the Defense Information Systems Agency (____________) for standardized security configurations.

DISA

6
New cards

Tools like Puppet and Chef are used for __________ management to automate the deployment of secure baseline configurations.

configuration

7
New cards

Regular security audits and __________ assessments ensure ongoing system security.

vulnerability

8
New cards

The principle of __________ states that users should only have the minimum permissions necessary to complete their duties.

least privilege

9
New cards

Wireless Access Points (WAPs) must be configured to use a specific __________ to reduce interference.

channel

10
New cards

An example of hardening practices for switches and routers is to disable unnecessary services and __________.

interfaces

11
New cards

Full Disk Encryption (FDE) protects sensitive data by encrypting the entire contents of the __________.

drive

12
New cards

Mobile Device Management (MDM) allows IT departments to maintain an inventory of all mobile devices __________ corporate resources.

accessing

13
New cards

Various security standards define requirements, controls, and procedures relevant to RTOS and embedded systems, such as __________.

ISO/IEC 15408

14
New cards

Sandboxing is used to isolate running processes from each other, effectively controlling a program so it runs with __________ access.

restrictive

15
New cards

The __________ attribute must be used for cookies to ensure they are only sent over HTTPS connections.

Secure

16
New cards

Input validation is essential to prevent __________ attacks that exploit application input mechanisms.

injection

17
New cards

Bluetooth employs encryption algorithms to protect data transmitted between devices; however, many devices still have vulnerabilities related to __________.

authentication

18
New cards

Device isolation refers to segregating individual devices within a __________ to limit their interaction with others.

network

Explore top notes

note
1.1 Understanding Social Problems
Updated 1102d ago
0.0(0)
note
Chapter 29- Fungi
Updated 1177d ago
0.0(0)
note
Vitamins and Minerals
Updated 723d ago
0.0(0)
note
Training Session 6
Updated 498d ago
0.0(0)
note
Chemical Changes
Updated 1348d ago
0.0(0)
note
1.1 Understanding Social Problems
Updated 1102d ago
0.0(0)
note
Chapter 29- Fungi
Updated 1177d ago
0.0(0)
note
Vitamins and Minerals
Updated 723d ago
0.0(0)
note
Training Session 6
Updated 498d ago
0.0(0)
note
Chemical Changes
Updated 1348d ago
0.0(0)

Explore top flashcards

flashcards
Unit 7: Period 7: 1890–1945
47
Updated 73d ago
0.0(0)
flashcards
Muscles of the Face
31
Updated 1214d ago
0.0(0)
flashcards
Unit 0.All
29
Updated 940d ago
0.0(0)
flashcards
Unit 1.1
23
Updated 207d ago
0.0(0)
flashcards
7Atelier B und 8entree
74
Updated 1163d ago
0.0(0)
flashcards
AP Wrld- Vocab Unit 7
25
Updated 703d ago
0.0(0)
flashcards
AP Psych Unit 1 Biology Part 1
52
Updated 530d ago
0.0(0)
flashcards
Unit 7: Period 7: 1890–1945
47
Updated 73d ago
0.0(0)
flashcards
Muscles of the Face
31
Updated 1214d ago
0.0(0)
flashcards
Unit 0.All
29
Updated 940d ago
0.0(0)
flashcards
Unit 1.1
23
Updated 207d ago
0.0(0)
flashcards
7Atelier B und 8entree
74
Updated 1163d ago
0.0(0)
flashcards
AP Wrld- Vocab Unit 7
25
Updated 703d ago
0.0(0)
flashcards
AP Psych Unit 1 Biology Part 1
52
Updated 530d ago
0.0(0)