The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security
posture. Which of the following security techniques is MOST appropriate to do this?
A.
Log audits
B.
System hardening
C.
Use IPS/IDS
D.
Continuous security monitoring
Explanation:
A security baseline is the security setting of a system that is known to be secure. This is the initial security setting of a system. Once the baseline has been applied,
it must be maintained or improved. Maintaining the security baseline requires continuous monitoring.
Incorrect Answers:
A: Auditing logs is good practice. However, it is only one aspect of maintaining security posture. This question asks for the MOST appropriate answer. Continuous
security monitoring covers all aspects of maintaining security posture so it is a more appropriate answer.
B: Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing or
disabling unnecessary functions and features, removing or disabling unnecessary user accounts, disabling unnecessary protocols and ports, and disabling
unnecessary services.
C: An IPS/IDS (intrusion prevention system/intrusion detection system) is used to detect and prevent malicious activity on a network or a host. However, there is
more to maintaining security posture that this one aspect and should be a part of continuous security monitoring.Stewart, James Michael, Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, Sybex, Indianapolis, 2014, p 12, 61, 130 Dulaney,
Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 208, 215-217, 222