SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Centrally managed NAC method requiring installation of software agents on each network client
simple network management protocol
group policies
endpoint based
network news transfer protocol
2. kerberos port
88
role-based
network attached storage
simple network management protocol
3. Help to make sure devices meet security standards before they are allowed to connect to the network
Terminal Access Controller Access-Control System
NAC
network access control
endpoint based
4. A subnet on the network that separates the internal network from publicly exposed hosts
500
dynamic host configuration protocol
hardening
DMZ
5. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
DHCP
161
DAC
RBAC
6. LDAP port
database hardening
hardware based
endpoint based
389
7. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
configuration management policy
FAT
OS hardening
25
8. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
NNTP
file and print sharing hardening
simple mail transport protocol
role-based
9. SAN stands for...
dynamic host configuration protocol
SSL
DAC
storage area network
10. RBAC stands for ____________ access control
OS hardening
role-based
simple mail transport protocol
network attached storage
11. EFS stands for...
group policies
patches
configuration baselines
encrypted file system
12. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
encrypted file system
110
RBAC
open mail relay
13. Start with the most secure environment - the loosen the controls as needed
DAC
rule of least privilege
lightweight directory access protocol
443
14. Defining the software and hardware components that can be used in an organization
configuration management policy
baselining
simple mail transport protocol
system hardening
15. An accumulated set of software updates or hotfixes from Microsoft
DNS poisoning
security template
hardware based
service pack
16. LDAP stands for...
role-based
lightweight directory access protocol
DAC
network access control
17. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
hardware based
simple authentication with security layer LDAPv3
TACACS
23
18. SMTP port
storage area network
service pack
DNS poisoning
25
19. NNTP stands for
network news transfer protocol
simple authentication
NNTP
DNS hardening
20. SNMP port
domain name service
161
group policies
simple mail transport protocol
21. NAC method where organizations must run the current hardware and operating systems
security template
patches
organizational unit
infrastructure based
22. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
hardening
SNMP
NNTP
network news transfer protocol
23. SMTP port
DHCP hardening
MAC
database hardening
25
24. TACACS port
hardware based
49
DHCP hardening
network access control
25. DNS port
anonymous authentication
53
hardware based
DHCP hardening
26. IPSec port
500
DNS poisoning
database hardening
161
27. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
simple authentication
DNS poisoning
rule of least privilege
organizational unit
28. SSH port
DHCP
simple authentication with security layer LDAPv3
139
22
29. SMTP stands for...
simple mail transport protocol
hardware based
encrypted file system
simple authentication with security layer LDAPv3
30. SNMP stand for...
simple network management protocol
161
22
storage area network
31. POP3 port
110
hardening
MAC
119
32. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
DAC
simple authentication
hardware based
configuration baselines
33. Recommended LDAP authentication
security template
hardware based
443
simple authentication with security layer LDAPv3
34. NAS stands for...
file and print sharing hardening
443
RBAC
network attached storage
35. NNTP port
MAC
encrypted file system
500
119
36. LDAP authentication method that uses clear text
88
simple authentication
DAC
DNS hardening
37. Four ways to implement group policies
infrastructure based
23
local - site - domain - OU
discretionary
38. Users granted least amount of access possible that enables them to complete their required work
least privileged principle
MAC
DAC
53
39. Microsoft software packages that contain one or more patches and can be applied without rebooting
file and print sharing hardening
hotfix
patches
NAC
40. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
80
FTP hardening
database hardening
25
41. File system that offers limited security and was primarily designed for desktop use
FAT
anonymous authentication
SNMP
local - site - domain - OU
42. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
configuration management policy
DNS hardening
DMZ
DAC
43. Transferable access controls applied and controlled by the object owner
TACACS
anonymous authentication
local - site - domain - OU
DAC
44. Label-based - hard coded access controls - at multiple levels - applied to all objects
simple mail transport protocol
anonymous authentication
MAC
mandatory
45. Access control defined by roles or job functions
local - site - domain - OU
Terminal Access Controller Access-Control System
RBAC
TACACS
46. Locking down the system
system hardening
simple network management protocol
network access control
group policies
47. Most restrictive access control method that uses security labels to control access
simple mail transport protocol
MAC
88
119
48. HTTP port
80
RBAC
security template
RBAC
49. LDAP authentication method not recommended
DAC
file and print sharing hardening
anonymous authentication
443
50. DNS stands for...
domain name service
least privileged principle
25
system hardening