100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

IC34 Questions with complete solution 2025/2026

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
29-09-2025
Written in
2025/2026

IC34 Questions with complete solution 2025/2026 What is System Hardening? - correct answer The process of securing a system by reducing its attack surface Reducing available vectors of attack typically includes: Removal of unnecessary software Removal of unnecessary user accounts Strong access controls (e.g. multifactor authentication) Disabling or removal of unnecessary services Installing security patches What Types of Systems or Devices Can Be Hardened? - correct answer Nearly anything that is configurable! Operating Systems Databases

Show more Read less
Institution
IC34
Course
IC34










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
IC34
Course
IC34

Document information

Uploaded on
September 29, 2025
Number of pages
28
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • ic34

Content preview

IC34 Questions with complete solution
2025/2026
What is System Hardening? - correct answer ✔The process of securing a system by reducing its attack
surface



Reducing available vectors of attack typically includes:

Removal of unnecessary software Removal of unnecessary user accounts Strong access controls (e.g.
multifactor authentication)

Disabling or removal of unnecessary services

Installing security patches



What Types of Systems or Devices Can Be Hardened? - correct answer ✔Nearly anything that is
configurable! Operating Systems

Databases

Applications

Managed switches

Routers firewalls

Communication gateways Modems .

PLCs, RTUs

IEDs

VFDs



OS Hardening Guidance - correct answer ✔NIST SP 800-123 "Guide to General Server Security" .

Microsoft Security Guides

Center for Internet Security's (CIS) Security Benchmarks

,Defense Information Systems Agency's "Security Technical Implementation Guides" (DISA STIGs)

Security Guides from Automation Suppliers

Yokogawa

Emerson -

Honeywel

Siemens -

others



Basic Steps to Secure an Operating System - correct answer ✔Patch and update the OS/

Remove or disable unnecessary services, applications, and network protocols

Configure OS user authentication . Configure access controls appropriately Install and configure
additional security

controls

Test the security of the OS



Examples of Unnecessary Software/Services - correct answer ✔Games

Device drivers for hardware not included

Messaging services

Servers or clients for unused internet or remote access services

Software compilers (except from non-production, development machines) Software compilers for
unused languages

Unused protocols and services .

Unused administrative utilities, diagnostics, management and system management functions .

Test and sample programs or scripts . Unused productivity suites and word processing utilities

Unlicensed tools and shareware Universal Plug and Play services

, CIS Security Configuration - correct answer ✔Recommended technical control rules/values for
hardening operating systems, middleware and software applications, and network devices;



Accepted by government, business, professionals worldwide .

Downloaded several hunsreds thoudand times per year



Distributed free of charge by CIS in .PDF format



Also available in XCCDF, a machine readable XML format

Used by thousands of enterprises as a basis for security configuration policies and the de facto standard
for IT configuratiob best practices.



https://www.cisecurity.org/



Center for Internet Security (CIS) - correct answer ✔Windows Benchmarks Linux Benchmarks Windows
Server 2000Amazon Linux Windows Server 2003CentOS Linux . Windows Server 2008Debian Linux
Windows Server 2012Oracle Linux Windows 7 . Red Hat Linux Windows 8 Slackware Linux WindowS NT .
SuSE Linux Windows XP . Ubuntu Linux



CIS Microsoft Windows 7 Benchmark - correct answer ✔Provides prescriptive guidance for establishing
a secure configuration posture for Microsoft Windows 7

Details approximately 250 recommended settings for local group policies

For each policy

Description -

Rationale Audit -

Remediation -

Impact Default Value -

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LEWISSHAWN55 Yale University
View profile
Follow You need to be logged in order to follow users or courses
Sold
87
Member since
2 year
Number of followers
46
Documents
7240
Last sold
1 month ago
THE SHOP FOR EXAMS,TESTBANKS,AQA, WHAT YOU STUDY AND WISH TO PASS THEN COME AND CHECK FOR YOUR NEED ......

WANT TO PASS YOUR EXAMS??? IF YES CHECK OUT MY ACCOUNT FOR ALL YOUR EXAMS NEED BE IT NURSING,REALTORS, HUMAN RESOURCE,MATHS,BIOLOGY,WGU,ICT, YOU BETTER CHECK MY ACCOUNT FOR MORE IF YOU GET WHAT U WANT THEN FEEL FREE TO PURCHASE AT A BETTER PRICE........

3.1

10 reviews

5
5
4
0
3
0
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions