SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
anonymous authentication
system hardening
DNS hardening
NAC
2. HTTP SSL port
TACACS
443
configuration management policy
22
3. Users granted least amount of access possible that enables them to complete their required work
SSL
least privileged principle
139
NNTP
4. NetBIOS port
file and print sharing hardening
139
security template
Terminal Access Controller Access-Control System
5. Issued by software vendors to fix bugs - address security issues or add functionality
DHCP
discretionary
80
patches
6. Defining the software and hardware components that can be used in an organization
23
22
configuration management policy
network attached storage
7. kerberos port
security template
119
88
system hardening
8. OU stands for...
mandatory
organizational unit
domain name service
lightweight directory access protocol
9. SNMP port
161
NAC
RBAC
OS hardening
10. SAN stands for...
MAC
DMZ
88
storage area network
11. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
simple authentication with security layer LDAPv3
DHCP
role-based
12. DAC stands for ____________ access control
MAC
DNS poisoning
discretionary
80
13. Microsoft software packages that contain one or more patches and can be applied without rebooting
500
hotfix
110
simple mail transport protocol
14. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
database hardening
domain name service
open mail relay
DNS poisoning
15. Standard setup used when configuring machines - provide a starting point and consistent setup
110
88
configuration baselines
119
16. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
DHCP hardening
500
TACACS
RBAC
17. NAC method where organizations must run the current hardware and operating systems
389
discretionary
infrastructure based
simple mail transport protocol
18. SMTP port
patches
lightweight directory access protocol
Terminal Access Controller Access-Control System
25
19. An accumulated set of software updates or hotfixes from Microsoft
MAC
service pack
role-based
88
20. Access control defined by roles or job functions
RBAC
TACACS
simple authentication with security layer LDAPv3
simple mail transport protocol
21. Label-based - hard coded access controls - at multiple levels - applied to all objects
simple network management protocol
MAC
80
FAT
22. POP3 port
NAC
domain name service
110
group policies
23. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
hardening
RBAC
RBAC
SNMP
24. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
configuration baselines
DAC
open mail relay
25
25. Transferable access controls applied and controlled by the object owner
DAC
88
RBAC
MAC
26. Centrally managed NAC method requiring installation of software agents on each network client
hotfix
simple network management protocol
DNS poisoning
endpoint based
27. LDAP authentication method not recommended
domain name service
anonymous authentication
mandatory
22
28. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
open mail relay
RBAC
discretionary
system hardening
29. Locking down the system
NAC
simple authentication
system hardening
rule of least privilege
30. Four ways to implement group policies
lightweight directory access protocol
local - site - domain - OU
161
configuration management policy
31. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
anonymous authentication
23
group policies
DAC
32. SMTP port
DNS poisoning
88
25
FAT
33. Telnet port
SSL
encrypted file system
network attached storage
23
34. LDAP port
25
389
service pack
161
35. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
110
FTP hardening
80
baselining
36. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
25
161
network access control
37. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
service pack
infrastructure based
500
DHCP hardening
38. NAC stands for
database hardening
network access control
patches
least privileged principle
39. Recommended LDAP authentication
25
simple authentication with security layer LDAPv3
network access control
OS hardening
40. SNMP stand for...
139
configuration management policy
FAT
simple network management protocol
41. DNS port
security template
hotfix
FTP hardening
53
42. Contain possible security settings that can control one or multiple computers
network news transfer protocol
FTP hardening
MAC
security template
43. NNTP stands for
FAT
Terminal Access Controller Access-Control System
network news transfer protocol
domain name service
44. FTP ports
service pack
20 and 21
hardware based
network attached storage
45. NNTP port
MAC
hotfix
119
25
46. RBAC stands for ____________ access control
storage area network
dynamic host configuration protocol
53
role-based
47. TACACS port
storage area network
database hardening
25
49
48. A cryptographic protocol that provides security for communications over networks such as the Internet
25
file and print sharing hardening
RBAC
SSL
49. Most restrictive access control method that uses security labels to control access
TACACS
FAT
443
MAC
50. SSH port
RBAC
22
OS hardening
patches