SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. FTP ports
20 and 21
DAC
389
500
2. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
DNS poisoning
DHCP hardening
49
SSL
3. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
TACACS
MAC
group policies
MAC
4. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
storage area network
DAC
FTP hardening
simple mail transport protocol
5. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
hotfix
49
storage area network
6. Contain possible security settings that can control one or multiple computers
119
open mail relay
500
security template
7. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
configuration management policy
23
SNMP
SSL
8. SAN stands for...
20 and 21
RBAC
NAC
storage area network
9. RBAC stands for ____________ access control
mandatory
domain name service
500
role-based
10. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
security template
organizational unit
RBAC
DNS hardening
11. NAS stands for...
network attached storage
simple authentication with security layer LDAPv3
organizational unit
DMZ
12. SMTP port
lightweight directory access protocol
25
network news transfer protocol
open mail relay
13. LDAP stands for...
lightweight directory access protocol
role-based
network attached storage
security template
14. Locking down the system
49
organizational unit
system hardening
mandatory
15. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
simple authentication with security layer LDAPv3
DHCP hardening
DAC
FTP hardening
16. A subnet on the network that separates the internal network from publicly exposed hosts
88
Terminal Access Controller Access-Control System
OS hardening
DMZ
17. Issued by software vendors to fix bugs - address security issues or add functionality
TACACS
patches
security template
lightweight directory access protocol
18. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
hardware based
SNMP
RBAC
19. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NAC
OS hardening
NNTP
DNS poisoning
20. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
MAC
DAC
SSL
simple authentication
21. Microsoft software packages that contain one or more patches and can be applied without rebooting
RBAC
hotfix
domain name service
SNMP
22. SSH port
110
500
22
DHCP
23. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
database hardening
DHCP
RBAC
88
24. TACACS port
configuration management policy
DMZ
mandatory
49
25. Define security settings and user's desktop environment on group of computers
110
mandatory
encrypted file system
group policies
26. Access control method that uses ACLs
DAC
hardware based
security template
organizational unit
27. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
infrastructure based
FTP hardening
hotfix
file and print sharing hardening
28. LDAP port
anonymous authentication
infrastructure based
SNMP
389
29. DAC stands for ____________ access control
FTP hardening
discretionary
25
DNS hardening
30. The process of establishing a standard for security
RBAC
organizational unit
baselining
TACACS
31. LDAP authentication method not recommended
DMZ
group policies
hardware based
anonymous authentication
32. IPSec port
DNS poisoning
SSL
500
local - site - domain - OU
33. Transferable access controls applied and controlled by the object owner
DAC
DHCP
service pack
25
34. SMTP stands for...
simple authentication with security layer LDAPv3
anonymous authentication
20 and 21
simple mail transport protocol
35. SMTP port
baselining
role-based
25
49
36. NNTP port
DAC
119
49
discretionary
37. MAC stands for ____________ access control
110
mandatory
endpoint based
hardware based
38. HTTP port
simple authentication
25
infrastructure based
80
39. File system that offers limited security and was primarily designed for desktop use
open mail relay
RBAC
FAT
simple authentication
40. HTTP SSL port
database hardening
500
DHCP hardening
443
41. Centrally managed NAC method requiring installation of software agents on each network client
endpoint based
hardware based
network access control
file and print sharing hardening
42. TACACS
DMZ
Terminal Access Controller Access-Control System
RBAC
hardware based
43. Standard setup used when configuring machines - provide a starting point and consistent setup
FTP hardening
22
configuration baselines
FAT
44. DNS stands for...
discretionary
DNS hardening
domain name service
SNMP
45. Label-based - hard coded access controls - at multiple levels - applied to all objects
RBAC
MAC
open mail relay
DAC
46. POP3 port
network access control
rule of least privilege
110
organizational unit
47. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
encrypted file system
rule of least privilege
OS hardening
53
48. Four ways to implement group policies
SNMP
MAC
local - site - domain - OU
161
49. Protocol for assigning dynamic IP addresses to devices on a network
NAC
file and print sharing hardening
DHCP
DAC
50. EFS stands for...
endpoint based
dynamic host configuration protocol
encrypted file system
mandatory