Valid Cybersecurity-Architecture-and-Engineering Dumps shared by ExamDiscuss.com for Helping Passing Cybersecurity-Architecture-and-Engineering Exam! ExamDiscuss.com now offer the newest Cybersecurity-Architecture-and-Engineering exam dumps, the ExamDiscuss.com Cybersecurity-Architecture-and-Engineering exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Cybersecurity-Architecture-and-Engineering dumps with Test Engine here:
A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk. Which hardening technique will meet the needs of this company?
Correct Answer: C
The correct answer is C - Implementing shell restrictions. According to WGU Cybersecurity Architecture and Engineering (KFO1 / D488), shell restrictions on Linux systems can prevent users (or attackers) from executing unauthorized commands, significantly reducing the exploitation risk on Linux servers. Host-based IDPS (A) detects attacks but does not directly harden the OS. Access control (B) andassessments /penetration testing (D) are important but do not focus specifically on securing the Linux shell environment. Reference Extract from Study Guide: "Implementing shell restrictions on Linux systems minimizes the attack surface by limiting the ability of users and processes to execute unauthorized commands." - WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Linux System Hardening Techniques