SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
FAT
DHCP hardening
hardware based
DHCP
2. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
network attached storage
FTP hardening
open mail relay
OS hardening
3. SAN stands for...
storage area network
security template
organizational unit
network access control
4. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
DAC
TACACS
FTP hardening
RBAC
5. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
rule of least privilege
DNS hardening
baselining
23
6. File system that offers limited security and was primarily designed for desktop use
DAC
FAT
hardening
389
7. NAC method where organizations must run the current hardware and operating systems
500
group policies
infrastructure based
110
8. Microsoft software packages that contain one or more patches and can be applied without rebooting
storage area network
hotfix
group policies
open mail relay
9. NAC stands for
open mail relay
FAT
network access control
file and print sharing hardening
10. SNMP port
configuration baselines
110
network news transfer protocol
161
11. Transferable access controls applied and controlled by the object owner
simple authentication
DAC
500
TACACS
12. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
SNMP
DNS hardening
FTP hardening
local - site - domain - OU
13. Label-based - hard coded access controls - at multiple levels - applied to all objects
rule of least privilege
hotfix
MAC
hardening
14. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
database hardening
TACACS
DMZ
simple authentication
15. Contain possible security settings that can control one or multiple computers
dynamic host configuration protocol
security template
anonymous authentication
database hardening
16. FTP ports
lightweight directory access protocol
49
local - site - domain - OU
20 and 21
17. HTTP port
lightweight directory access protocol
domain name service
NNTP
80
18. Access control method used by organizations that have a high turn over
88
open mail relay
DAC
RBAC
19. Most restrictive access control method that uses security labels to control access
500
MAC
rule of least privilege
DHCP hardening
20. Protocol for assigning dynamic IP addresses to devices on a network
lightweight directory access protocol
DHCP
least privileged principle
53
21. Help to make sure devices meet security standards before they are allowed to connect to the network
simple mail transport protocol
hardening
network news transfer protocol
NAC
22. DNS stands for...
storage area network
domain name service
encrypted file system
network news transfer protocol
23. A subnet on the network that separates the internal network from publicly exposed hosts
FTP hardening
DMZ
TACACS
80
24. Making the OS less vulnerable to threats
hardening
23
139
mandatory
25. SMTP stands for...
simple mail transport protocol
open mail relay
SNMP
Terminal Access Controller Access-Control System
26. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
endpoint based
DAC
security template
DNS poisoning
27. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
service pack
network access control
DMZ
NNTP
28. NetBIOS port
endpoint based
22
25
139
29. EFS stands for...
DAC
discretionary
25
encrypted file system
30. LDAP port
encrypted file system
dynamic host configuration protocol
389
mandatory
31. RBAC stands for ____________ access control
infrastructure based
DHCP
20 and 21
role-based
32. Telnet port
simple network management protocol
FTP hardening
23
infrastructure based
33. Recommended LDAP authentication
endpoint based
simple authentication with security layer LDAPv3
local - site - domain - OU
119
34. Users granted least amount of access possible that enables them to complete their required work
NNTP
DAC
least privileged principle
system hardening
35. DNS port
53
file and print sharing hardening
discretionary
SSL
36. Four ways to implement group policies
network access control
DNS poisoning
local - site - domain - OU
security template
37. POP3 port
MAC
network access control
49
110
38. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
SSL
simple authentication
TACACS
39. Access control method that uses ACLs
22
system hardening
DAC
139
40. A cryptographic protocol that provides security for communications over networks such as the Internet
DHCP hardening
SSL
patches
database hardening
41. SNMP stand for...
simple network management protocol
DAC
443
NNTP
42. HTTP SSL port
Terminal Access Controller Access-Control System
DHCP hardening
23
443
43. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
infrastructure based
TACACS
Terminal Access Controller Access-Control System
network attached storage
44. Start with the most secure environment - the loosen the controls as needed
infrastructure based
rule of least privilege
22
Terminal Access Controller Access-Control System
45. kerberos port
DAC
23
local - site - domain - OU
88
46. DAC stands for ____________ access control
network news transfer protocol
discretionary
mandatory
database hardening
47. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
110
22
dynamic host configuration protocol
OS hardening
48. The process of establishing a standard for security
baselining
hotfix
TACACS
network news transfer protocol
49. Issued by software vendors to fix bugs - address security issues or add functionality
DHCP
patches
49
MAC
50. An accumulated set of software updates or hotfixes from Microsoft
encrypted file system
service pack
DAC
file and print sharing hardening