SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NetBIOS port
139
110
DAC
DNS poisoning
2. DAC stands for ____________ access control
group policies
23
discretionary
49
3. Four ways to implement group policies
local - site - domain - OU
53
DNS hardening
file and print sharing hardening
4. IPSec port
110
500
RBAC
storage area network
5. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
161
baselining
SNMP
25
6. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
hardening
TACACS
DHCP hardening
161
7. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
mandatory
database hardening
open mail relay
hotfix
8. NAS stands for...
dynamic host configuration protocol
rule of least privilege
NNTP
network attached storage
9. A subnet on the network that separates the internal network from publicly exposed hosts
DMZ
endpoint based
TACACS
53
10. Access control method that uses ACLs
500
DHCP hardening
lightweight directory access protocol
DAC
11. Define security settings and user's desktop environment on group of computers
role-based
DHCP
group policies
RBAC
12. Centrally managed NAC method requiring installation of software agents on each network client
endpoint based
DNS hardening
network attached storage
20 and 21
13. Defining the software and hardware components that can be used in an organization
configuration management policy
service pack
389
simple authentication with security layer LDAPv3
14. SMTP port
25
lightweight directory access protocol
hotfix
service pack
15. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
configuration baselines
configuration management policy
TACACS
database hardening
16. DHCP stands for...
endpoint based
system hardening
dynamic host configuration protocol
DAC
17. Recommended LDAP authentication
DHCP
database hardening
file and print sharing hardening
simple authentication with security layer LDAPv3
18. NNTP port
DNS hardening
80
119
dynamic host configuration protocol
19. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
NAC
DHCP hardening
20 and 21
dynamic host configuration protocol
20. Standard setup used when configuring machines - provide a starting point and consistent setup
119
encrypted file system
configuration baselines
configuration management policy
21. The process of establishing a standard for security
20 and 21
network attached storage
discretionary
baselining
22. FTP ports
TACACS
49
20 and 21
group policies
23. POP3 port
least privileged principle
53
110
MAC
24. DNS stands for...
domain name service
DNS hardening
SSL
MAC
25. LDAP authentication method that uses clear text
88
Terminal Access Controller Access-Control System
database hardening
simple authentication
26. Telnet port
infrastructure based
FAT
23
DAC
27. NAC method where organizations must run the current hardware and operating systems
MAC
infrastructure based
domain name service
25
28. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
simple authentication with security layer LDAPv3
DNS hardening
FTP hardening
29. NNTP stands for
network news transfer protocol
500
patches
network attached storage
30. EFS stands for...
encrypted file system
organizational unit
network attached storage
configuration baselines
31. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
DNS poisoning
security template
open mail relay
role-based
32. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
group policies
hardware based
simple network management protocol
file and print sharing hardening
33. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
119
MAC
configuration baselines
file and print sharing hardening
34. Start with the most secure environment - the loosen the controls as needed
119
encrypted file system
rule of least privilege
mandatory
35. MAC stands for ____________ access control
DMZ
role-based
25
mandatory
36. Issued by software vendors to fix bugs - address security issues or add functionality
patches
MAC
20 and 21
configuration management policy
37. kerberos port
88
23
simple authentication with security layer LDAPv3
RBAC
38. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
22
OS hardening
hardware based
NNTP
39. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
MAC
88
FTP hardening
network news transfer protocol
40. Help to make sure devices meet security standards before they are allowed to connect to the network
hardening
23
NAC
DAC
41. Transferable access controls applied and controlled by the object owner
DAC
MAC
infrastructure based
139
42. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
DNS hardening
security template
DAC
simple network management protocol
43. RBAC stands for ____________ access control
hardware based
NAC
storage area network
role-based
44. SMTP stands for...
simple network management protocol
infrastructure based
NAC
simple mail transport protocol
45. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
group policies
service pack
DNS poisoning
MAC
46. SAN stands for...
storage area network
baselining
DAC
NNTP
47. Label-based - hard coded access controls - at multiple levels - applied to all objects
group policies
Terminal Access Controller Access-Control System
encrypted file system
MAC
48. Access control defined by roles or job functions
RBAC
SNMP
53
dynamic host configuration protocol
49. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
DAC
DHCP
RBAC
53
50. TACACS port
RBAC
FTP hardening
49
hardening