SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
database hardening
system hardening
hardware based
security template
2. Microsoft software packages that contain one or more patches and can be applied without rebooting
hotfix
SNMP
DAC
simple network management protocol
3. Making the OS less vulnerable to threats
25
local - site - domain - OU
DMZ
hardening
4. SMTP port
DAC
80
configuration baselines
25
5. LDAP port
simple mail transport protocol
389
baselining
20 and 21
6. FTP ports
DNS hardening
20 and 21
NNTP
OS hardening
7. Most restrictive access control method that uses security labels to control access
system hardening
NNTP
hotfix
MAC
8. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
119
DHCP hardening
organizational unit
security template
9. Access control method used by organizations that have a high turn over
SNMP
network news transfer protocol
DNS poisoning
RBAC
10. SMTP stands for...
DNS poisoning
role-based
SNMP
simple mail transport protocol
11. SNMP port
MAC
161
hotfix
389
12. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
119
53
DAC
discretionary
13. NNTP stands for
25
49
network news transfer protocol
network access control
14. A subnet on the network that separates the internal network from publicly exposed hosts
patches
network news transfer protocol
simple authentication with security layer LDAPv3
DMZ
15. SSH port
encrypted file system
22
endpoint based
20 and 21
16. Protocol for assigning dynamic IP addresses to devices on a network
161
local - site - domain - OU
patches
DHCP
17. HTTP port
TACACS
80
20 and 21
NNTP
18. Centrally managed NAC method requiring installation of software agents on each network client
500
endpoint based
DAC
110
19. DHCP stands for...
dynamic host configuration protocol
25
22
SSL
20. LDAP authentication method not recommended
SNMP
anonymous authentication
file and print sharing hardening
encrypted file system
21. Access control method that uses ACLs
local - site - domain - OU
configuration management policy
DAC
49
22. Access control defined by roles or job functions
SSL
RBAC
discretionary
least privileged principle
23. Users granted least amount of access possible that enables them to complete their required work
least privileged principle
NAC
role-based
389
24. SAN stands for...
SNMP
DAC
storage area network
SSL
25. MAC stands for ____________ access control
mandatory
TACACS
NAC
161
26. EFS stands for...
hardware based
FAT
encrypted file system
simple network management protocol
27. NAC method where organizations must run the current hardware and operating systems
SNMP
110
infrastructure based
DHCP
28. Transferable access controls applied and controlled by the object owner
DAC
80
least privileged principle
443
29. Start with the most secure environment - the loosen the controls as needed
simple network management protocol
rule of least privilege
open mail relay
MAC
30. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
rule of least privilege
discretionary
mandatory
DNS poisoning
31. DNS stands for...
139
hardware based
domain name service
DAC
32. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
DHCP
role-based
organizational unit
open mail relay
33. Four ways to implement group policies
389
20 and 21
22
local - site - domain - OU
34. OU stands for...
network attached storage
organizational unit
500
139
35. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
storage area network
rule of least privilege
database hardening
DHCP
36. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
22
MAC
88
RBAC
37. Recommended LDAP authentication
simple authentication
23
dynamic host configuration protocol
simple authentication with security layer LDAPv3
38. Label-based - hard coded access controls - at multiple levels - applied to all objects
MAC
group policies
20 and 21
system hardening
39. Locking down the system
DHCP
DAC
system hardening
file and print sharing hardening
40. Define security settings and user's desktop environment on group of computers
389
group policies
MAC
OS hardening
41. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
139
TACACS
role-based
network news transfer protocol
42. IPSec port
500
RBAC
443
25
43. TACACS
Terminal Access Controller Access-Control System
DHCP
organizational unit
network access control
44. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
system hardening
DNS hardening
FAT
file and print sharing hardening
45. SMTP port
RBAC
database hardening
25
161
46. DAC stands for ____________ access control
security template
discretionary
443
network access control
47. Defining the software and hardware components that can be used in an organization
MAC
configuration management policy
lightweight directory access protocol
53
48. Telnet port
139
Terminal Access Controller Access-Control System
group policies
23
49. NAC stands for
network news transfer protocol
simple network management protocol
infrastructure based
network access control
50. File system that offers limited security and was primarily designed for desktop use
FAT
baselining
open mail relay
encrypted file system