SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. LDAP authentication method that uses clear text
simple authentication
DNS hardening
file and print sharing hardening
MAC
2. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
security template
organizational unit
20 and 21
3. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
110
SNMP
endpoint based
23
4. HTTP SSL port
443
20 and 21
22
open mail relay
5. TACACS port
NNTP
network access control
MAC
49
6. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
domain name service
configuration management policy
DAC
53
7. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
53
DHCP hardening
20 and 21
49
8. RBAC stands for ____________ access control
TACACS
TACACS
FTP hardening
role-based
9. DAC stands for ____________ access control
SSL
encrypted file system
simple authentication
discretionary
10. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
NNTP
DAC
configuration management policy
RBAC
11. SSH port
23
22
role-based
25
12. Most restrictive access control method that uses security labels to control access
MAC
storage area network
DHCP
88
13. MAC stands for ____________ access control
80
389
DMZ
mandatory
14. Defining the software and hardware components that can be used in an organization
configuration management policy
network attached storage
DMZ
22
15. Start with the most secure environment - the loosen the controls as needed
500
file and print sharing hardening
hotfix
rule of least privilege
16. NAS stands for...
network attached storage
configuration management policy
rule of least privilege
baselining
17. SNMP port
23
group policies
53
161
18. Issued by software vendors to fix bugs - address security issues or add functionality
least privileged principle
RBAC
patches
139
19. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
443
TACACS
simple authentication
anonymous authentication
20. NetBIOS port
88
139
SNMP
RBAC
21. NAC method where organizations must run the current hardware and operating systems
DMZ
389
infrastructure based
25
22. IPSec port
SNMP
DMZ
500
storage area network
23. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
TACACS
DNS hardening
25
443
24. DNS stands for...
161
domain name service
25
role-based
25. Making the OS less vulnerable to threats
FTP hardening
FAT
hardening
local - site - domain - OU
26. Access control defined by roles or job functions
network news transfer protocol
discretionary
25
RBAC
27. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
domain name service
file and print sharing hardening
25
role-based
28. The process of establishing a standard for security
local - site - domain - OU
dynamic host configuration protocol
configuration baselines
baselining
29. FTP ports
MAC
20 and 21
MAC
role-based
30. Users granted least amount of access possible that enables them to complete their required work
139
least privileged principle
88
service pack
31. NNTP stands for
DHCP hardening
80
DHCP
network news transfer protocol
32. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
389
OS hardening
rule of least privilege
role-based
33. Access control method that uses ACLs
configuration baselines
group policies
DAC
20 and 21
34. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
TACACS
encrypted file system
configuration management policy
least privileged principle
35. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
DMZ
patches
open mail relay
25
36. Centrally managed NAC method requiring installation of software agents on each network client
OS hardening
simple mail transport protocol
endpoint based
DHCP
37. LDAP authentication method not recommended
49
discretionary
80
anonymous authentication
38. Label-based - hard coded access controls - at multiple levels - applied to all objects
baselining
infrastructure based
anonymous authentication
MAC
39. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
25
NNTP
Terminal Access Controller Access-Control System
service pack
40. Recommended LDAP authentication
119
simple authentication with security layer LDAPv3
22
88
41. SMTP port
25
discretionary
53
161
42. DHCP stands for...
lightweight directory access protocol
dynamic host configuration protocol
DNS poisoning
file and print sharing hardening
43. DNS port
RBAC
DAC
53
hotfix
44. Telnet port
security template
simple authentication with security layer LDAPv3
DMZ
23
45. NNTP port
119
anonymous authentication
rule of least privilege
MAC
46. Contain possible security settings that can control one or multiple computers
patches
rule of least privilege
110
security template
47. EFS stands for...
rule of least privilege
encrypted file system
service pack
FTP hardening
48. Help to make sure devices meet security standards before they are allowed to connect to the network
NAC
domain name service
DAC
OS hardening
49. NAC stands for
network access control
RBAC
TACACS
domain name service
50. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
security template
DNS hardening
domain name service
hardware based