Exam Objectives 4.1
Given a scenario, apply common security techniques to computing resources.
- Secure baselines: Fundamental security configuration standards:
- Establish: Define security measures
- Deploy: Implement security measures
- Maintain: Sustain and update security measures
- Hardening targets: Making targets more secure:
- Mobile devices: Secure smartphones and tablets
- Workstations: Enhance security on desktop computers
- Switches: Secure network switches for data protection
- Routers: Strengthen security on network routers
- Cloud infrastructure: Secure cloud-based resources
- Servers: Enhance security on server systems
- ICS/SCADA: Secure industrial control systems and SCADA
- Embedded systems: Strengthen security for embedded devices
- RTOS: Secure real-time operating systems
- IoT devices: Enhance security for Internet of Things devices
- Wireless devices: Mobile and wireless technology equipment:
- Installation considerations: Factors for successful setup
- Site surveys: Assess location for optimal...