Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
|
SUBJECTS
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 30 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four ways to implement group policies
OS hardening
local - site - domain - OU
389
DMZ
2. NNTP port
443
dynamic host configuration protocol
database hardening
119
3. Most restrictive access control method that uses security labels to control access
open mail relay
Terminal Access Controller Access-Control System
RBAC
MAC
4. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
rule of least privilege
database hardening
hardware based
simple network management protocol
5. The process of establishing a standard for security
patches
baselining
encrypted file system
infrastructure based
6. DNS stands for...
domain name service
389
hardening
group policies
7. OU stands for...
NNTP
DAC
organizational unit
RBAC
8. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
80
simple authentication with security layer LDAPv3
DNS hardening
9. FTP ports
RBAC
MAC
20 and 21
open mail relay
10. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
DHCP hardening
161
least privileged principle
hardening
11. Label-based - hard coded access controls - at multiple levels - applied to all objects
organizational unit
MAC
local - site - domain - OU
53
12. Standard setup used when configuring machines - provide a starting point and consistent setup
baselining
NAC
443
configuration baselines
13. Start with the most secure environment - the loosen the controls as needed
mandatory
infrastructure based
FTP hardening
rule of least privilege
14. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
dynamic host configuration protocol
49
DNS poisoning
hardware based
15. Access control defined by roles or job functions
SSL
baselining
110
RBAC
16. Making the OS less vulnerable to threats
FAT
hardening
TACACS
88
17. Users granted least amount of access possible that enables them to complete their required work
simple authentication
least privileged principle
Terminal Access Controller Access-Control System
TACACS
18. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
25
389
Terminal Access Controller Access-Control System
TACACS
19. NAS stands for...
network attached storage
configuration baselines
local - site - domain - OU
FTP hardening
20. Access control method that uses ACLs
Terminal Access Controller Access-Control System
role-based
DAC
DNS poisoning
21. Issued by software vendors to fix bugs - address security issues or add functionality
patches
simple network management protocol
25
49
22. kerberos port
88
open mail relay
MAC
389
23. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
open mail relay
lightweight directory access protocol
RBAC
anonymous authentication
24. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
RBAC
20 and 21
MAC
DNS hardening
25. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
network news transfer protocol
TACACS
encrypted file system
file and print sharing hardening
26. RBAC stands for ____________ access control
DNS poisoning
role-based
88
NNTP
27. NAC method where organizations must run the current hardware and operating systems
110
SSL
MAC
infrastructure based
28. Help to make sure devices meet security standards before they are allowed to connect to the network
DAC
23
lightweight directory access protocol
NAC
29. An accumulated set of software updates or hotfixes from Microsoft
service pack
simple network management protocol
database hardening
139
30. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
simple authentication
49
FTP hardening
MAC
31. HTTP SSL port
endpoint based
simple authentication
443
FTP hardening
32. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
DHCP hardening
mandatory
500
33. NNTP stands for
mandatory
OS hardening
network news transfer protocol
patches
34. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
open mail relay
OS hardening
SSL
RBAC
35. POP3 port
389
DNS hardening
anonymous authentication
110
36. DHCP stands for...
TACACS
FAT
dynamic host configuration protocol
configuration baselines
37. Microsoft software packages that contain one or more patches and can be applied without rebooting
hotfix
network access control
DNS hardening
dynamic host configuration protocol
38. Contain possible security settings that can control one or multiple computers
security template
RBAC
FAT
simple authentication
39. SMTP stands for...
20 and 21
simple mail transport protocol
discretionary
anonymous authentication
40. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
53
25
161
41. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
MAC
SSL
SNMP
110
42. DNS port
53
49
hardening
FTP hardening
43. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
FTP hardening
RBAC
database hardening
MAC
44. TACACS port
49
139
RBAC
discretionary
45. LDAP port
389
simple mail transport protocol
discretionary
RBAC
46. SSH port
discretionary
22
dynamic host configuration protocol
local - site - domain - OU
47. File system that offers limited security and was primarily designed for desktop use
service pack
FAT
DHCP hardening
infrastructure based
48. SMTP port
domain name service
25
role-based
RBAC
49. Centrally managed NAC method requiring installation of software agents on each network client
simple authentication
endpoint based
storage area network
49
50. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
file and print sharing hardening
RBAC
service pack
DAC