Recall & Review
beginner
What is OS hardening?
OS hardening is the process of securing an operating system by reducing its vulnerabilities. This includes removing unnecessary software, closing unused ports, and applying security patches.
Click to reveal answer
beginner
What does 'attack surface' mean in cybersecurity?
Attack surface refers to all the points where an unauthorized user can try to enter or extract data from a system. The larger the attack surface, the more opportunities for attacks.
Click to reveal answer
beginner
How does removing unnecessary software help in OS hardening?
Removing unnecessary software reduces the number of programs that could have security weaknesses, thus lowering the chances attackers can exploit them.
Click to reveal answer
beginner
Why is closing unused network ports important in OS hardening?
Closing unused ports stops attackers from accessing services that are not needed, which reduces entry points for attacks.
Click to reveal answer
beginner
How do security patches contribute to reducing the attack surface?
Security patches fix known vulnerabilities in the OS, preventing attackers from exploiting those weaknesses.
Click to reveal answer
What is the main goal of OS hardening?
✗ Incorrect
OS hardening aims to reduce vulnerabilities and entry points for attackers, thus reducing the attack surface.
Which of the following helps reduce the attack surface?
✗ Incorrect
Applying security patches fixes vulnerabilities, reducing the attack surface.
What happens if unused software is left on the OS?
✗ Incorrect
Unused software can have vulnerabilities that attackers might exploit, increasing the attack surface.
Why should unused network ports be closed?
✗ Incorrect
Closing unused ports reduces the number of ways attackers can access the system.
Which action is NOT part of OS hardening?
✗ Incorrect
Opening all firewall ports increases the attack surface and is not part of OS hardening.
Explain how OS hardening reduces the attack surface.
Think about what makes a system safer by limiting ways attackers can get in.
You got /5 concepts.
List common steps involved in OS hardening and why each step helps reduce the attack surface.
Consider how each step limits opportunities for attackers.
You got /4 concepts.