Bash, the Crucial Exams Chat Bot
AI Bot
Automation, Scripting, and System Hardening Flashcards
Front | Back |
How does scripting support incident response? | It automates data collection for faster analysis |
How does version control improve security scripting? | By tracking changes and enabling audit trails |
Name a static analysis tool for shell scripts. | shellcheck |
What does patch management prevent? | Exploitation of known vulnerabilities |
What does SELinux stand for? | Security-Enhanced Linux |
What does SSH hardening entail? | Strengthening SSH configurations to prevent unauthorized access |
What file permissions should /etc/shadow have? | Read and write by root only (400 or 600) |
What is a CI/CD pipeline? | An automated workflow for building, testing, and deploying code |
What is a common method for hardening remote access? | Limiting open ports and using secure tunnels |
What is a security playbook? | A predefined set of automated steps for incident response |
What is idempotence in configuration management? | Ensuring repeated runs yield the same system state |
What is immutable infrastructure? | Replacing servers rather than modifying them |
What is system hardening? | The process of minimizing a system's vulnerabilities |
What is the benefit of infrastructure as code? | It ensures repeatable secure deployments |
What is the principle of least privilege? | Assigning users only the permissions they need |
What is the purpose of a bastion host? | To act as a secure gateway to internal systems |
What is the purpose of security automation? | It reduces manual effort and speeds up tasks |
Which Python library is commonly used for AWS automation? | boto3 |
Which scripting language is commonly used for security automation? | Python |
Which tool automates system configuration hardening? | Ansible |
Why are configuration baselines important? | They help maintain consistent security settings |
Why is logging essential in system hardening? | It provides visibility for detecting anomalies |
Front
How does version control improve security scripting?
Click the card to flip
Back
By tracking changes and enabling audit trails
Front
What is the purpose of a bastion host?
Back
To act as a secure gateway to internal systems
Front
How does scripting support incident response?
Back
It automates data collection for faster analysis
Front
Which tool automates system configuration hardening?
Back
Ansible
Front
What is a common method for hardening remote access?
Back
Limiting open ports and using secure tunnels
Front
What is system hardening?
Back
The process of minimizing a system's vulnerabilities
Front
What is the benefit of infrastructure as code?
Back
It ensures repeatable secure deployments
Front
Which scripting language is commonly used for security automation?
Back
Python
Front
What does patch management prevent?
Back
Exploitation of known vulnerabilities
Front
What does SSH hardening entail?
Back
Strengthening SSH configurations to prevent unauthorized access
Front
What is the purpose of security automation?
Back
It reduces manual effort and speeds up tasks
Front
Name a static analysis tool for shell scripts.
Back
shellcheck
Front
Why is logging essential in system hardening?
Back
It provides visibility for detecting anomalies
Front
Which Python library is commonly used for AWS automation?
Back
boto3
Front
What does SELinux stand for?
Back
Security-Enhanced Linux
Front
What is idempotence in configuration management?
Back
Ensuring repeated runs yield the same system state
Front
What file permissions should /etc/shadow have?
Back
Read and write by root only (400 or 600)
Front
What is the principle of least privilege?
Back
Assigning users only the permissions they need
Front
What is immutable infrastructure?
Back
Replacing servers rather than modifying them
Front
Why are configuration baselines important?
Back
They help maintain consistent security settings
Front
What is a CI/CD pipeline?
Back
An automated workflow for building, testing, and deploying code
Front
What is a security playbook?
Back
A predefined set of automated steps for incident response
1/22
This deck covers techniques for automating security tasks with scripting, securing systems against vulnerabilities, and implementing hardening measures.