SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Access control defined by roles or job functions
DAC
DHCP
RBAC
DAC
2. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
local - site - domain - OU
DNS hardening
TACACS
SSL
3. HTTP SSL port
lightweight directory access protocol
443
53
group policies
4. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
network access control
TACACS
local - site - domain - OU
dynamic host configuration protocol
5. SSH port
simple network management protocol
22
110
MAC
6. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
DAC
NAC
database hardening
simple authentication
7. Centrally managed NAC method requiring installation of software agents on each network client
FAT
Terminal Access Controller Access-Control System
file and print sharing hardening
endpoint based
8. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
RBAC
hardening
SNMP
file and print sharing hardening
9. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
open mail relay
88
organizational unit
DHCP hardening
10. NAS stands for...
20 and 21
RBAC
patches
network attached storage
11. Protocol for assigning dynamic IP addresses to devices on a network
TACACS
DHCP
organizational unit
configuration baselines
12. POP3 port
file and print sharing hardening
local - site - domain - OU
configuration management policy
110
13. DNS stands for...
88
mandatory
hardening
domain name service
14. NAC stands for
endpoint based
network access control
mandatory
hardening
15. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
DHCP hardening
domain name service
TACACS
group policies
16. Making the OS less vulnerable to threats
open mail relay
hardening
file and print sharing hardening
simple mail transport protocol
17. kerberos port
infrastructure based
88
MAC
open mail relay
18. Standard setup used when configuring machines - provide a starting point and consistent setup
500
open mail relay
TACACS
configuration baselines
19. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
open mail relay
anonymous authentication
25
TACACS
20. SAN stands for...
NAC
anonymous authentication
23
storage area network
21. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
OS hardening
TACACS
DAC
group policies
22. OU stands for...
hardening
NAC
organizational unit
DMZ
23. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
database hardening
20 and 21
configuration management policy
OS hardening
24. Four ways to implement group policies
lightweight directory access protocol
local - site - domain - OU
configuration baselines
anonymous authentication
25. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
DNS poisoning
88
FAT
26. DNS port
25
53
20 and 21
anonymous authentication
27. Access control method that uses ACLs
161
endpoint based
file and print sharing hardening
DAC
28. TACACS port
88
22
49
hardware based
29. Locking down the system
anonymous authentication
110
SSL
system hardening
30. Contain possible security settings that can control one or multiple computers
53
security template
hardening
organizational unit
31. SMTP port
500
file and print sharing hardening
simple mail transport protocol
25
32. LDAP authentication method that uses clear text
MAC
53
simple authentication
22
33. DHCP stands for...
group policies
role-based
dynamic host configuration protocol
SSL
34. Microsoft software packages that contain one or more patches and can be applied without rebooting
hotfix
network access control
database hardening
RBAC
35. NAC method where organizations must run the current hardware and operating systems
infrastructure based
500
49
161
36. MAC stands for ____________ access control
110
mandatory
49
TACACS
37. NNTP stands for
network news transfer protocol
FAT
security template
infrastructure based
38. Help to make sure devices meet security standards before they are allowed to connect to the network
SSL
DAC
NAC
22
39. IPSec port
lightweight directory access protocol
security template
MAC
500
40. LDAP authentication method not recommended
security template
DAC
500
anonymous authentication
41. SMTP port
storage area network
25
80
53
42. SNMP stand for...
encrypted file system
simple network management protocol
dynamic host configuration protocol
simple authentication with security layer LDAPv3
43. Defining the software and hardware components that can be used in an organization
119
139
25
configuration management policy
44. TACACS
110
Terminal Access Controller Access-Control System
49
NNTP
45. HTTP port
RBAC
80
110
NNTP
46. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
simple mail transport protocol
hardware based
389
SNMP
47. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
TACACS
SNMP
FTP hardening
DHCP hardening
48. An accumulated set of software updates or hotfixes from Microsoft
service pack
local - site - domain - OU
infrastructure based
role-based
49. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
group policies
RBAC
hotfix
TACACS
50. A cryptographic protocol that provides security for communications over networks such as the Internet
RBAC
anonymous authentication
simple network management protocol
SSL