SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NNTP port
DHCP hardening
simple network management protocol
119
network access control
2. Start with the most secure environment - the loosen the controls as needed
MAC
rule of least privilege
configuration baselines
22
3. DNS port
hardening
configuration baselines
53
service pack
4. LDAP stands for...
network news transfer protocol
RBAC
hardware based
lightweight directory access protocol
5. Centrally managed NAC method requiring installation of software agents on each network client
endpoint based
hotfix
25
rule of least privilege
6. OU stands for...
baselining
DNS hardening
organizational unit
hardware based
7. Recommended LDAP authentication
DHCP hardening
25
security template
simple authentication with security layer LDAPv3
8. A subnet on the network that separates the internal network from publicly exposed hosts
rule of least privilege
NAC
simple authentication
DMZ
9. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
service pack
dynamic host configuration protocol
RBAC
443
10. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
80
organizational unit
configuration management policy
DAC
11. Making the OS less vulnerable to threats
OS hardening
hardening
500
20 and 21
12. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
119
anonymous authentication
configuration baselines
TACACS
13. HTTP port
encrypted file system
80
domain name service
dynamic host configuration protocol
14. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
DHCP hardening
organizational unit
endpoint based
53
15. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
network news transfer protocol
OS hardening
simple network management protocol
lightweight directory access protocol
16. An accumulated set of software updates or hotfixes from Microsoft
110
service pack
security template
file and print sharing hardening
17. Define security settings and user's desktop environment on group of computers
DMZ
group policies
network attached storage
local - site - domain - OU
18. FTP ports
OS hardening
139
anonymous authentication
20 and 21
19. Standard setup used when configuring machines - provide a starting point and consistent setup
OS hardening
configuration baselines
DNS hardening
119
20. SNMP port
OS hardening
161
mandatory
139
21. The process of establishing a standard for security
network attached storage
dynamic host configuration protocol
baselining
500
22. NAC stands for
DHCP
RBAC
network access control
DHCP hardening
23. RBAC stands for ____________ access control
role-based
FTP hardening
25
dynamic host configuration protocol
24. NetBIOS port
simple mail transport protocol
DMZ
139
80
25. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
discretionary
TACACS
443
25
26. NNTP stands for
anonymous authentication
DHCP hardening
service pack
network news transfer protocol
27. Help to make sure devices meet security standards before they are allowed to connect to the network
endpoint based
25
least privileged principle
NAC
28. LDAP authentication method that uses clear text
simple authentication
network news transfer protocol
MAC
49
29. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
file and print sharing hardening
139
dynamic host configuration protocol
22
30. DNS stands for...
domain name service
161
network attached storage
hotfix
31. HTTP SSL port
DNS hardening
simple network management protocol
anonymous authentication
443
32. TACACS
patches
Terminal Access Controller Access-Control System
network access control
DNS hardening
33. Access control method that uses ACLs
simple authentication
DAC
22
OS hardening
34. Telnet port
DHCP
DNS poisoning
hardening
23
35. POP3 port
endpoint based
110
DAC
DHCP hardening
36. SMTP port
system hardening
security template
25
service pack
37. SMTP stands for...
baselining
443
simple mail transport protocol
mandatory
38. Microsoft software packages that contain one or more patches and can be applied without rebooting
DAC
hardware based
hotfix
TACACS
39. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
domain name service
organizational unit
SNMP
40. Contain possible security settings that can control one or multiple computers
DAC
SSL
security template
mandatory
41. EFS stands for...
SSL
encrypted file system
discretionary
storage area network
42. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
anonymous authentication
SNMP
database hardening
service pack
43. SMTP port
discretionary
25
119
88
44. MAC stands for ____________ access control
domain name service
mandatory
161
OS hardening
45. File system that offers limited security and was primarily designed for desktop use
FAT
rule of least privilege
25
domain name service
46. A cryptographic protocol that provides security for communications over networks such as the Internet
389
SSL
dynamic host configuration protocol
discretionary
47. kerberos port
88
organizational unit
RBAC
endpoint based
48. Label-based - hard coded access controls - at multiple levels - applied to all objects
500
simple authentication with security layer LDAPv3
MAC
25
49. DAC stands for ____________ access control
discretionary
endpoint based
local - site - domain - OU
RBAC
50. IPSec port
MAC
500
hardware based
DNS poisoning