SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
configuration baselines
encrypted file system
MAC
2. Transferable access controls applied and controlled by the object owner
DHCP hardening
MAC
DAC
group policies
3. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
hardware based
discretionary
DNS poisoning
139
4. Define security settings and user's desktop environment on group of computers
hotfix
group policies
system hardening
simple network management protocol
5. NAS stands for...
organizational unit
DMZ
network attached storage
local - site - domain - OU
6. A subnet on the network that separates the internal network from publicly exposed hosts
500
389
DMZ
open mail relay
7. NAC stands for
least privileged principle
network access control
OS hardening
encrypted file system
8. Locking down the system
MAC
system hardening
MAC
role-based
9. POP3 port
simple authentication with security layer LDAPv3
NNTP
110
rule of least privilege
10. DNS stands for...
hardening
domain name service
hardware based
SNMP
11. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
389
NAC
23
12. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
NAC
FTP hardening
119
23
13. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
SNMP
88
DAC
RBAC
14. SNMP stand for...
443
simple network management protocol
DMZ
endpoint based
15. MAC stands for ____________ access control
dynamic host configuration protocol
mandatory
RBAC
simple mail transport protocol
16. Users granted least amount of access possible that enables them to complete their required work
least privileged principle
network access control
domain name service
23
17. Centrally managed NAC method requiring installation of software agents on each network client
NAC
file and print sharing hardening
endpoint based
hardware based
18. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
security template
DHCP hardening
simple network management protocol
RBAC
19. HTTP SSL port
443
110
dynamic host configuration protocol
25
20. SNMP port
25
110
domain name service
161
21. Access control method used by organizations that have a high turn over
MAC
TACACS
20 and 21
RBAC
22. DHCP stands for...
49
500
NAC
dynamic host configuration protocol
23. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
RBAC
Terminal Access Controller Access-Control System
simple mail transport protocol
24. Access control method that uses ACLs
139
network news transfer protocol
local - site - domain - OU
DAC
25. NAC method where organizations must run the current hardware and operating systems
infrastructure based
DAC
network news transfer protocol
role-based
26. Recommended LDAP authentication
simple authentication with security layer LDAPv3
23
simple network management protocol
simple mail transport protocol
27. OU stands for...
lightweight directory access protocol
25
organizational unit
88
28. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
SSL
dynamic host configuration protocol
OS hardening
local - site - domain - OU
29. HTTP port
rule of least privilege
80
88
DMZ
30. Making the OS less vulnerable to threats
database hardening
20 and 21
hardening
storage area network
31. TACACS
DNS poisoning
RBAC
organizational unit
Terminal Access Controller Access-Control System
32. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
network attached storage
TACACS
organizational unit
DNS hardening
33. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
139
RBAC
25
system hardening
34. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
DHCP hardening
local - site - domain - OU
network access control
DAC
35. DAC stands for ____________ access control
53
organizational unit
discretionary
simple mail transport protocol
36. Four ways to implement group policies
DAC
local - site - domain - OU
NNTP
file and print sharing hardening
37. Defining the software and hardware components that can be used in an organization
configuration management policy
simple mail transport protocol
DHCP hardening
patches
38. IPSec port
group policies
DAC
500
simple authentication
39. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
DAC
security template
RBAC
40. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
network access control
file and print sharing hardening
dynamic host configuration protocol
configuration management policy
41. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
DNS hardening
hardware based
88
database hardening
42. FTP ports
SSL
20 and 21
RBAC
161
43. Contain possible security settings that can control one or multiple computers
organizational unit
security template
20 and 21
service pack
44. Help to make sure devices meet security standards before they are allowed to connect to the network
MAC
23
139
NAC
45. Standard setup used when configuring machines - provide a starting point and consistent setup
configuration baselines
DMZ
security template
MAC
46. NNTP port
119
endpoint based
FAT
Terminal Access Controller Access-Control System
47. Issued by software vendors to fix bugs - address security issues or add functionality
configuration management policy
patches
110
security template
48. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
simple authentication
security template
file and print sharing hardening
open mail relay
49. LDAP authentication method that uses clear text
simple authentication
NNTP
49
RBAC
50. File system that offers limited security and was primarily designed for desktop use
FAT
25
organizational unit
domain name service
Link to This Test
Related Subjects
Soft Skills
Business Skills