Case 1:
Which method can be used to harden a device?
- use SSH and disable the root account access over SSH
- allow default services to remain enabled
- maintain use of the same passwords
- allow USB auto-detection
Explanation: The basic best practices for device hardening are as follows:
Ensure physical security.
Minimize installed packages.
Disable unused services.
Use SSH and disable the root account login over SSH.
Keep the system updated.
Disable USB auto-detection.
Enforce strong passwords.
Force periodic password changes.
Keep users from re-using old passwords.
Review logs regularly.
Exam with this question: CCNA Cyber Ops Final Exam Answers
Exam with this question: CyberOps Associate Course Final Exam Answers
Exam with this question: Endpoint Security (ESec) Final Exam Answers (Course Final)
Exam with this question: Operating Systems Basics Final Exam
Case 2:
Which method can be used to harden a device?
- Allow users to re-use old passwords.
- Force periodic password changes.
- Allow USB auto-detection.
- Allow default services to remain enabled.
Explanation: The basic best practices for device hardening are as follows:
Ensure physical security.
Minimize installed packages.
Disable unused services.
Use SSH and disable the root account login over SSH.
Keep the system updated.
Disable USB auto-detection.
Enforce strong passwords.
Force periodic password changes.
Keep users from re-using old passwords.
Review logs regularly.
Exam with this question: CCNA Cyber Ops Practice Final Exam Answers
Exam with this question: CyberOps Associate (Version 1.0) - Module 4: Linux Basics Quiz Answers
Exam with this question: 2.8.2 Quiz - Linux Overview
Exam with this question: 8.8.2 Linux Basics Quiz
Exam with this question: Endpoint Security: My Knowledge Check Answers
Please login or Register to submit your answer