SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SSH port
simple authentication with security layer LDAPv3
infrastructure based
group policies
22
2. SNMP port
file and print sharing hardening
service pack
storage area network
161
3. Label-based - hard coded access controls - at multiple levels - applied to all objects
389
baselining
MAC
anonymous authentication
4. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
RBAC
DAC
80
network attached storage
5. SNMP stand for...
simple authentication with security layer LDAPv3
file and print sharing hardening
SSL
simple network management protocol
6. Most restrictive access control method that uses security labels to control access
DAC
mandatory
MAC
389
7. LDAP port
FTP hardening
389
role-based
DNS poisoning
8. Recommended LDAP authentication
simple authentication with security layer LDAPv3
49
hotfix
role-based
9. NNTP stands for
49
443
DMZ
network news transfer protocol
10. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
hotfix
Terminal Access Controller Access-Control System
SNMP
88
11. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
security template
encrypted file system
Terminal Access Controller Access-Control System
hardware based
12. Transferable access controls applied and controlled by the object owner
NAC
53
network news transfer protocol
DAC
13. DHCP stands for...
domain name service
dynamic host configuration protocol
hotfix
25
14. TACACS port
dynamic host configuration protocol
49
Terminal Access Controller Access-Control System
discretionary
15. FTP ports
23
20 and 21
simple authentication
88
16. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
53
161
hardware based
open mail relay
17. NAC stands for
network access control
network attached storage
DAC
domain name service
18. OU stands for...
configuration management policy
hotfix
organizational unit
DNS hardening
19. Issued by software vendors to fix bugs - address security issues or add functionality
161
patches
domain name service
DAC
20. Microsoft software packages that contain one or more patches and can be applied without rebooting
simple authentication with security layer LDAPv3
hotfix
configuration management policy
DHCP
21. Protocol for assigning dynamic IP addresses to devices on a network
DMZ
DHCP
least privileged principle
161
22. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
configuration baselines
RBAC
DNS hardening
open mail relay
23. Access control method used by organizations that have a high turn over
RBAC
simple authentication
80
simple network management protocol
24. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
discretionary
rule of least privilege
network attached storage
DNS poisoning
25. IPSec port
139
lightweight directory access protocol
500
MAC
26. HTTP port
25
DNS hardening
security template
80
27. Standard setup used when configuring machines - provide a starting point and consistent setup
database hardening
49
simple mail transport protocol
configuration baselines
28. LDAP authentication method not recommended
MAC
anonymous authentication
NNTP
DAC
29. LDAP authentication method that uses clear text
simple authentication with security layer LDAPv3
simple authentication
least privileged principle
TACACS
30. A subnet on the network that separates the internal network from publicly exposed hosts
DNS hardening
DMZ
SSL
25
31. Define security settings and user's desktop environment on group of computers
baselining
role-based
group policies
MAC
32. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
OS hardening
configuration baselines
SSL
139
33. A cryptographic protocol that provides security for communications over networks such as the Internet
domain name service
80
SSL
OS hardening
34. Defining the software and hardware components that can be used in an organization
20 and 21
simple authentication with security layer LDAPv3
least privileged principle
configuration management policy
35. Four ways to implement group policies
system hardening
DNS hardening
mandatory
local - site - domain - OU
36. HTTP SSL port
Terminal Access Controller Access-Control System
dynamic host configuration protocol
443
storage area network
37. DNS stands for...
domain name service
encrypted file system
hotfix
DHCP hardening
38. SAN stands for...
storage area network
simple mail transport protocol
DAC
OS hardening
39. The process of establishing a standard for security
RBAC
MAC
baselining
TACACS
40. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
TACACS
configuration management policy
simple network management protocol
hotfix
41. kerberos port
RBAC
88
anonymous authentication
hotfix
42. Access control defined by roles or job functions
organizational unit
443
RBAC
network access control
43. Telnet port
110
23
storage area network
endpoint based
44. EFS stands for...
open mail relay
DNS poisoning
encrypted file system
hardware based
45. NNTP port
119
SNMP
49
DAC
46. DAC stands for ____________ access control
DNS poisoning
SNMP
discretionary
SSL
47. Users granted least amount of access possible that enables them to complete their required work
least privileged principle
80
local - site - domain - OU
53
48. Contain possible security settings that can control one or multiple computers
security template
23
group policies
DAC
49. Centrally managed NAC method requiring installation of software agents on each network client
anonymous authentication
endpoint based
MAC
TACACS
50. Access control method that uses ACLs
RBAC
25
DAC
discretionary