Vulnerabilities
Hardening
Threat Modeling / IOT
Hardening P2
100

The term used for an attacker taking advantage of a vulnerability

Exploit

100

What does system hardening mean?

Reduce the system's attack surface (improve security of a system)

100

What is the goal of threat modeling?

Identify and mitigate potential threats before they get exploited

100

Examples of password account policies

Age, Length, History, Complexity

200

What is one thing that the CVE database provides

-an easy way to share data about product issues

-a common baseline for comparing products

-a source of ways to mitigate the impact of a vulnerability

200

List of recommended settings put together by the government or industry groups

Benchmarks

200

What is the first step in threat modeling?

Identify the asset or system you want to protect

200

Prompt the user for a yes or no whether to complete a action

User Account Control (UAC)

300

The type of update used to fix a vulnerability

Security update

300

What is the easiest and most important way to harden your system?

Updates

300

What does IOT stand for?

Internet of Things

300

What is Principle of Least Privilege?

Best practice is to provide each user with
the minimum system access needed to perform their necessary tasks.

400

What does a software vulnerability specifically allow an attacker to do?

Gain unauthorized access or disrupt normal operations
400

Method used to identify all the configuration changes needed to secure a system

Vulnerability assessment tool (vulnerability scan)

400

Tool used to scan internet for vulnerable devices

Shodan

400

True or False: Backups are dynamic screenshots of data. An example is a service like Google Drive

False

500

What does the CVE database stand for? 

Common Vulnerabilities and Exposures

500

How do you harden user authentication?

Multi-factor authentication, strong passwords, lockout policies, etc.

500

What is the biggest security risk of connected IoT devices? 

Used as entry points to a network or botnet members


500

Having several copies of backups is known as...

Redundancy