Search Header Logo

Module-10 Hardening

Authored by Prathamesh S

Information Technology (IT)

University

Used 2+ times

Module-10 Hardening
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary advantage of the least functionality principle in system hardening?

Reducing system resource consumption

Increasing the system's processing speed

Minimizing the system's attack surface

Enhancing user experience

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When configuring a baseline image for system deployment, which factor is most critical for security?

Including the latest software versions

Installing all available applications

Only including necessary and secure applications

Maximizing the system's performance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might an organization prefer blacklisting over whitelisting in application management?

Blacklisting requires more frequent updates

Blacklisting is easier to manage and implement

Whitelisting allows unknown applications to run

Blacklisting is more secure than whitelisting

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the impact of uninstalling unused applications on a system?

  1. A) It improves the user interface of the system

  1. B) It increases the number of services running

  1. C) It decreases the number of potential vulnerabilities

  1. It complicates system updates and patches

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does disabling unnecessary services contribute to system security?

  1. A) It reduces system performance by limiting functionality

  1. B) It increases the attack surface by restricting necessary services

  1. C) It closes potential attack vectors by limiting services running

  1. D) It makes the system more vulnerable to malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which challenge is associated with maintaining whitelists in a dynamic environment?

Lack of support for software updates

Difficulty in managing a large number of applications

Increased risk of malware infections

High resource consumption on the system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the context of system hardening, what is the most significant risk of using blacklists?

Blacklists are difficult to manage

New malicious programs may bypass the blacklist

Blacklists are more secure than whitelists

They are too resource-intensive

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?