SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Locking down the system
DHCP
23
80
system hardening
2. SAN stands for...
FAT
SSL
storage area network
local - site - domain - OU
3. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
DNS poisoning
443
20 and 21
file and print sharing hardening
4. Contain possible security settings that can control one or multiple computers
80
security template
RBAC
88
5. NAC stands for
network access control
configuration baselines
role-based
infrastructure based
6. FTP ports
group policies
mandatory
FAT
20 and 21
7. Users granted least amount of access possible that enables them to complete their required work
service pack
least privileged principle
FTP hardening
open mail relay
8. OU stands for...
SSL
storage area network
organizational unit
network access control
9. TACACS port
system hardening
security template
49
service pack
10. Start with the most secure environment - the loosen the controls as needed
OS hardening
endpoint based
25
rule of least privilege
11. HTTP SSL port
88
TACACS
simple network management protocol
443
12. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
MAC
DHCP
OS hardening
DNS poisoning
13. LDAP authentication method not recommended
389
88
RBAC
anonymous authentication
14. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
anonymous authentication
hotfix
service pack
15. Defining the software and hardware components that can be used in an organization
MAC
500
configuration management policy
open mail relay
16. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
MAC
configuration management policy
file and print sharing hardening
open mail relay
17. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
DHCP hardening
SNMP
DAC
baselining
18. A subnet on the network that separates the internal network from publicly exposed hosts
encrypted file system
20 and 21
443
DMZ
19. LDAP stands for...
lightweight directory access protocol
simple network management protocol
simple authentication with security layer LDAPv3
DMZ
20. NAC method where organizations must run the current hardware and operating systems
security template
161
infrastructure based
anonymous authentication
21. SMTP stands for...
simple authentication
file and print sharing hardening
simple mail transport protocol
group policies
22. DNS stands for...
lightweight directory access protocol
simple mail transport protocol
domain name service
TACACS
23. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
443
TACACS
patches
simple authentication
24. Label-based - hard coded access controls - at multiple levels - applied to all objects
system hardening
DAC
Terminal Access Controller Access-Control System
MAC
25. Microsoft software packages that contain one or more patches and can be applied without rebooting
hotfix
TACACS
dynamic host configuration protocol
lightweight directory access protocol
26. Access control method that uses ACLs
rule of least privilege
DMZ
DAC
Terminal Access Controller Access-Control System
27. MAC stands for ____________ access control
dynamic host configuration protocol
discretionary
DAC
mandatory
28. SMTP port
25
NAC
simple authentication with security layer LDAPv3
patches
29. Help to make sure devices meet security standards before they are allowed to connect to the network
80
RBAC
49
NAC
30. Access control defined by roles or job functions
DAC
20 and 21
TACACS
RBAC
31. DHCP stands for...
database hardening
25
open mail relay
dynamic host configuration protocol
32. Transferable access controls applied and controlled by the object owner
25
DAC
RBAC
anonymous authentication
33. HTTP port
open mail relay
role-based
80
lightweight directory access protocol
34. SNMP port
configuration baselines
88
DHCP hardening
161
35. IPSec port
DAC
file and print sharing hardening
500
baselining
36. File system that offers limited security and was primarily designed for desktop use
baselining
local - site - domain - OU
MAC
FAT
37. DNS port
389
organizational unit
group policies
53
38. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
simple network management protocol
FAT
NNTP
MAC
39. RBAC stands for ____________ access control
49
20 and 21
role-based
hardening
40. Define security settings and user's desktop environment on group of computers
TACACS
Terminal Access Controller Access-Control System
DMZ
group policies
41. SNMP stand for...
110
simple network management protocol
system hardening
DNS poisoning
42. LDAP port
DAC
simple network management protocol
389
domain name service
43. Most restrictive access control method that uses security labels to control access
20 and 21
443
MAC
DHCP hardening
44. NNTP port
119
53
22
SSL
45. NAS stands for...
simple network management protocol
storage area network
DAC
network attached storage
46. An accumulated set of software updates or hotfixes from Microsoft
hardware based
service pack
lightweight directory access protocol
DMZ
47. Protocol for assigning dynamic IP addresses to devices on a network
network access control
hardware based
DHCP
RBAC
48. NetBIOS port
simple network management protocol
infrastructure based
anonymous authentication
139
49. Telnet port
role-based
139
simple authentication
23
50. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
network news transfer protocol
389
role-based
DAC