SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. HTTP SSL port
NAC
security template
443
local - site - domain - OU
2. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
DHCP
rule of least privilege
database hardening
endpoint based
3. Most restrictive access control method that uses security labels to control access
rule of least privilege
DNS hardening
domain name service
MAC
4. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
role-based
patches
RBAC
OS hardening
5. Locking down the system
22
hotfix
system hardening
DNS hardening
6. SMTP port
25
53
dynamic host configuration protocol
local - site - domain - OU
7. POP3 port
MAC
rule of least privilege
RBAC
110
8. LDAP authentication method that uses clear text
25
Terminal Access Controller Access-Control System
SNMP
simple authentication
9. SAN stands for...
storage area network
system hardening
hotfix
simple network management protocol
10. NAC stands for
configuration management policy
hotfix
network access control
DHCP hardening
11. DHCP stands for...
dynamic host configuration protocol
RBAC
389
DNS poisoning
12. SSH port
infrastructure based
22
least privileged principle
139
13. DAC stands for ____________ access control
DNS hardening
discretionary
389
25
14. NetBIOS port
23
configuration baselines
139
baselining
15. Defining the software and hardware components that can be used in an organization
organizational unit
389
mandatory
configuration management policy
16. Start with the most secure environment - the loosen the controls as needed
dynamic host configuration protocol
NNTP
rule of least privilege
49
17. NNTP port
110
119
DAC
RBAC
18. The process of establishing a standard for security
baselining
RBAC
database hardening
443
19. Microsoft software packages that contain one or more patches and can be applied without rebooting
DHCP
hotfix
RBAC
least privileged principle
20. Centrally managed NAC method requiring installation of software agents on each network client
RBAC
endpoint based
mandatory
500
21. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
MAC
network news transfer protocol
configuration management policy
22. FTP ports
119
TACACS
OS hardening
20 and 21
23. Recommended LDAP authentication
file and print sharing hardening
system hardening
RBAC
simple authentication with security layer LDAPv3
24. HTTP port
TACACS
49
FAT
80
25. NAC method where organizations must run the current hardware and operating systems
system hardening
infrastructure based
DAC
organizational unit
26. File system that offers limited security and was primarily designed for desktop use
MAC
119
FAT
encrypted file system
27. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
mandatory
DAC
endpoint based
RBAC
28. Users granted least amount of access possible that enables them to complete their required work
Terminal Access Controller Access-Control System
500
domain name service
least privileged principle
29. IPSec port
49
DAC
RBAC
500
30. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
dynamic host configuration protocol
network access control
TACACS
hardware based
31. Four ways to implement group policies
22
local - site - domain - OU
FTP hardening
storage area network
32. LDAP authentication method not recommended
anonymous authentication
DMZ
23
TACACS
33. Contain possible security settings that can control one or multiple computers
20 and 21
patches
security template
network access control
34. Making the OS less vulnerable to threats
hardening
139
simple authentication with security layer LDAPv3
role-based
35. Standard setup used when configuring machines - provide a starting point and consistent setup
simple authentication with security layer LDAPv3
88
DHCP
configuration baselines
36. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
DNS poisoning
SNMP
domain name service
system hardening
37. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
discretionary
system hardening
SNMP
TACACS
38. TACACS port
49
389
110
MAC
39. OU stands for...
encrypted file system
system hardening
role-based
organizational unit
40. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
discretionary
23
DMZ
TACACS
41. RBAC stands for ____________ access control
TACACS
OS hardening
role-based
organizational unit
42. Issued by software vendors to fix bugs - address security issues or add functionality
FTP hardening
RBAC
RBAC
patches
43. NAS stands for...
configuration management policy
DAC
network attached storage
anonymous authentication
44. TACACS
least privileged principle
25
Terminal Access Controller Access-Control System
SSL
45. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
TACACS
mandatory
file and print sharing hardening
DAC
46. EFS stands for...
hardware based
infrastructure based
configuration baselines
encrypted file system
47. DNS port
53
25
system hardening
139
48. Transferable access controls applied and controlled by the object owner
configuration management policy
simple mail transport protocol
DAC
endpoint based
49. SNMP stand for...
88
hardening
DAC
simple network management protocol
50. An accumulated set of software updates or hotfixes from Microsoft
simple authentication
SSL
service pack
TACACS