SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. LDAP port
RBAC
storage area network
simple authentication with security layer LDAPv3
389
2. Protocol for assigning dynamic IP addresses to devices on a network
139
rule of least privilege
security template
DHCP
3. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
simple mail transport protocol
TACACS
anonymous authentication
88
4. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
DHCP hardening
file and print sharing hardening
simple network management protocol
database hardening
5. SNMP stand for...
least privileged principle
RBAC
lightweight directory access protocol
simple network management protocol
6. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
DHCP hardening
FTP hardening
baselining
database hardening
7. LDAP stands for...
discretionary
NNTP
configuration management policy
lightweight directory access protocol
8. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
hardening
SNMP
file and print sharing hardening
least privileged principle
9. The process of establishing a standard for security
service pack
security template
baselining
simple authentication with security layer LDAPv3
10. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
security template
88
network access control
DAC
11. MAC stands for ____________ access control
23
TACACS
configuration management policy
mandatory
12. LDAP authentication method not recommended
DHCP
FAT
anonymous authentication
25
13. DNS port
53
group policies
discretionary
119
14. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
mandatory
local - site - domain - OU
22
NNTP
15. DNS stands for...
hardening
organizational unit
domain name service
25
16. Defining the software and hardware components that can be used in an organization
FAT
configuration management policy
DAC
119
17. TACACS
MAC
simple authentication with security layer LDAPv3
22
Terminal Access Controller Access-Control System
18. HTTP port
DNS poisoning
DHCP
161
80
19. OU stands for...
organizational unit
configuration baselines
lightweight directory access protocol
anonymous authentication
20. Standard setup used when configuring machines - provide a starting point and consistent setup
database hardening
mandatory
endpoint based
configuration baselines
21. A cryptographic protocol that provides security for communications over networks such as the Internet
RBAC
20 and 21
DNS poisoning
SSL
22. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
53
database hardening
OS hardening
22
23. NAC stands for
network access control
SSL
DAC
hardening
24. HTTP SSL port
443
TACACS
encrypted file system
53
25. Recommended LDAP authentication
DNS hardening
500
file and print sharing hardening
simple authentication with security layer LDAPv3
26. Access control method used by organizations that have a high turn over
SSL
least privileged principle
RBAC
rule of least privilege
27. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
role-based
DNS poisoning
database hardening
389
28. Access control defined by roles or job functions
RBAC
23
DNS hardening
FTP hardening
29. NAC method where organizations must run the current hardware and operating systems
infrastructure based
simple network management protocol
53
simple authentication
30. Transferable access controls applied and controlled by the object owner
NAC
simple authentication with security layer LDAPv3
DAC
mandatory
31. Issued by software vendors to fix bugs - address security issues or add functionality
simple mail transport protocol
patches
network news transfer protocol
OS hardening
32. Microsoft software packages that contain one or more patches and can be applied without rebooting
storage area network
NAC
hotfix
network attached storage
33. Most restrictive access control method that uses security labels to control access
MAC
hardening
DNS hardening
20 and 21
34. NNTP stands for
network news transfer protocol
lightweight directory access protocol
patches
OS hardening
35. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
OS hardening
DNS hardening
500
domain name service
36. DAC stands for ____________ access control
discretionary
infrastructure based
storage area network
53
37. Access control method that uses ACLs
mandatory
hardware based
DAC
DHCP hardening
38. Start with the most secure environment - the loosen the controls as needed
500
hardware based
49
rule of least privilege
39. SMTP port
25
FTP hardening
RBAC
encrypted file system
40. SSH port
22
simple authentication
110
anonymous authentication
41. Users granted least amount of access possible that enables them to complete their required work
lightweight directory access protocol
hotfix
25
least privileged principle
42. Making the OS less vulnerable to threats
least privileged principle
RBAC
hardening
NAC
43. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
hardware based
110
encrypted file system
500
44. An accumulated set of software updates or hotfixes from Microsoft
service pack
database hardening
storage area network
500
45. NAS stands for...
DNS hardening
110
network attached storage
RBAC
46. TACACS port
139
49
53
network news transfer protocol
47. Contain possible security settings that can control one or multiple computers
25
security template
database hardening
25
48. FTP ports
NAC
security template
20 and 21
SNMP
49. SMTP stands for...
configuration baselines
simple mail transport protocol
database hardening
MAC
50. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
storage area network
hardware based
security template
FTP hardening