Question 1
What should be periodically checked with manufacturers regarding network devices?
Question 2
What is recommended to remove from workstations to reduce vulnerability risks?
Question 3
What measure can be taken to limit vulnerabilities in IoT devices?
Question 4
How should network infrastructure devices like routers and firewalls be secured?
Question 5
What is a challenge associated with embedded systems and IoT device security?
Question 6
Why are ICS/SCADA systems often air-gapped?
Question 7
What should be done if a hardening guide is not available from the manufacturer?
Question 8
What is a common technique used in mobile device hardening to secure data?
Question 9
For server hardening, which practice is emphasized to enhance security?
Question 10
How does Mobile Device Management (MDM) aid in mobile device hardening?
Question 11
What should be frequently installed on both embedded systems and traditional servers?
Question 12
What is a crucial security tool to install on cloud management workstations?
Question 13
Why are the default configurations of operating systems considered insecure?
Question 14
When hardening workstations, why is removing unused software recommended?
Question 15
What principle is advised for managing centralized cloud workstations securely?