Understand secure baselines, host and mobile hardening, wireless protection, application security, sandboxing, and operational monitoring for Security+.
Hardening questions on Security+ are about secure defaults and consistency. The exam wants you to recognize that a strong environment is not secured by one heroic tool. It is secured by baseline configuration, controlled change, narrow exposure, secure application settings, and monitoring that shows when systems drift away from the approved state.
CompTIA is usually checking whether you can separate:
The strongest answer often sounds boring because it is disciplined: remove unnecessary surface, lock down defaults, and make the secure state repeatable.
CompTIA combines several operational layers here:
| Situation | Strongest first focus | Why |
|---|---|---|
| New workstation or server build | secure baseline plus least privilege | Secure defaults are easiest to enforce at the start |
| Mobile fleet with company data | MDM, encryption, screen lock, and remote wipe | Mobile loss and policy drift are major risks |
| Wireless environment with business access | WPA3 or enterprise auth plus rogue-device awareness | Weak wireless defaults create broad attack surface |
| Browser-facing app | secure headers, secret handling, and narrow service permissions | Hardening exists at the app layer too |
| Risky code or attachment execution | sandboxing or isolation | Reduces host impact if execution is malicious |
| Area | Strong first moves |
|---|---|
| Server or workstation | disable unused services, patch, least privilege, logging |
| Mobile device | screen lock, encryption, MDM, remote wipe, approved apps only |
| Wireless | WPA3 or enterprise auth, disable insecure defaults, detect rogue APs |
| Application platform | secure headers, input validation, secret management, least privilege |
1Strict-Transport-Security: max-age=31536000; includeSubDomains
2Content-Security-Policy: default-src 'self'
3X-Content-Type-Options: nosniff
What to notice:
A baseline only helps if the organization can tell when systems move away from it. That is why Security+ keeps pairing hardening with monitoring. If a team builds a strong image once and never checks whether services, ports, or local privileges changed later, the hardening program is incomplete.
1systemctl disable telnet.socket
2ufw default deny incoming
3ufw allow 443/tcp
What to notice:
Security+ does not require exact command memorization here. It does expect you to recognize the pattern: remove what is not needed, then expose only what the business actually needs.
A company rolls out a new internal application to employee laptops. The security team learns that the laptops still have unnecessary remote-management services enabled, local admin is common, and browser protections are inconsistent. Which answer is strongest first?
A. Add a login banner and leave the technical state unchanged
B. Define and enforce a secure baseline that removes unnecessary services, narrows privilege, standardizes security settings, and monitors for drift
C. Disable all logging to reduce performance impact
D. Move the app to a cold site
Best answer: B. The scenario is about secure defaults and operational consistency across endpoints, not a single isolated configuration tweak.
Continue with 4.2 Asset Management to connect hardened systems to inventory, ownership, and lifecycle control.