11. Who is responsible for ensuring the safety of cloud networks? Select all that apply.

  • Individual users
  • Research department
  • Cloud service provider
  • Security team

12. Fill in the blank: _____ cloud services are a common source of cloud security issues.

  • Misconfigured
  • Unauthorized
  • Shared
  • Managed

Weekly challenge 4

13. Which of the following tasks are security hardening practices? Select all that apply.

  • Keeping network devices functioning properly
  • Updating software
  • Loosening access permissions
  • Performing port filtering

14. What is the relationship between security hardening and an attack surface?

  • Security hardening permanently eliminates the attack surface. 
  • Security hardening diminishes the attack surface.
  • Security hardening expands the attack surface.
  • Security hardening increases the attack surface.

15. Fill in the blank: Hiring a security guard is an example of a _____ security hardening practice.

  • physical
  • virtual
  • software-based
  • network-focused

16. An organization’s in-house security team has been authorized to simulate an attack on the organization’s website. The objective is to identify any vulnerabilities that are present. What does this scenario describe?

  • Penetration testing
  • The Ping of Death
  • Packet sniffing
  • A Distributed Denial of Service (DDoS) attack

17. What are some methods for hardening operating systems? Select three answers.

  • Removing unused software to limit unnecessary vulnerabilities
  • Implementing an intrusion detection system (IDS)
  • Configuring a device setting to fit a secure encryption standard
  • Keeping an up-to-date list of authorized users.

18. A security analyst notices something unusual affecting their company’s OS. To confirm that no changes have been made to the system, the analyst compares the current configuration to existing documentation about the OS. What does this scenario describe?

  • Checking baseline configuration
  • Upgrading the interface between computer hardware and the user
  • Responsibly managing applications
  • Verifying user identity when accessing an OS

Shuffle Q/A 2

19. Fill in the blank: The security measure multifactor authentication (MFA) requires a user to verify their _____ in two or more ways to access a system or network.

  • password
  • user permissions
  • job title
  • identity

20. In what way might port filtering be used to protect a network from an attack?

  • By increasing the attack surface within a business network
  • By creating isolated subnets for each of the various departments within an organization
  • By helping analysts inspect, analyze, and react to security events based on their priority
  • By blocking or allowing certain port numbers in order to limit unwanted communication

Leave a Reply