SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Access control method used by organizations that have a high turn over
simple authentication with security layer LDAPv3
119
OS hardening
RBAC
2. POP3 port
DAC
110
encrypted file system
simple authentication with security layer LDAPv3
3. Label-based - hard coded access controls - at multiple levels - applied to all objects
FAT
MAC
discretionary
SSL
4. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
110
DAC
endpoint based
NNTP
5. DHCP stands for...
hotfix
dynamic host configuration protocol
DAC
simple authentication with security layer LDAPv3
6. SMTP port
simple mail transport protocol
25
DAC
49
7. OU stands for...
80
organizational unit
SSL
anonymous authentication
8. MAC stands for ____________ access control
mandatory
20 and 21
patches
Terminal Access Controller Access-Control System
9. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
SNMP
storage area network
53
rule of least privilege
10. SNMP stand for...
simple network management protocol
configuration baselines
119
group policies
11. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
TACACS
simple mail transport protocol
443
open mail relay
12. Transferable access controls applied and controlled by the object owner
389
network attached storage
DAC
DMZ
13. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
23
simple network management protocol
discretionary
DNS hardening
14. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
110
OS hardening
infrastructure based
endpoint based
15. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
DNS poisoning
DHCP hardening
simple mail transport protocol
49
16. DAC stands for ____________ access control
discretionary
20 and 21
file and print sharing hardening
SSL
17. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
DAC
security template
25
RBAC
18. Define security settings and user's desktop environment on group of computers
80
group policies
DNS poisoning
network attached storage
19. DNS stands for...
20 and 21
110
hardening
domain name service
20. Making the OS less vulnerable to threats
hotfix
119
group policies
hardening
21. TACACS port
MAC
49
infrastructure based
DHCP hardening
22. SNMP port
20 and 21
25
simple authentication with security layer LDAPv3
161
23. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
RBAC
anonymous authentication
TACACS
configuration baselines
24. NetBIOS port
mandatory
hardware based
security template
139
25. Help to make sure devices meet security standards before they are allowed to connect to the network
simple authentication with security layer LDAPv3
group policies
NAC
FTP hardening
26. SMTP port
OS hardening
NAC
25
RBAC
27. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
database hardening
storage area network
NNTP
group policies
28. Access control method that uses ACLs
53
discretionary
DAC
NNTP
29. Standard setup used when configuring machines - provide a starting point and consistent setup
configuration baselines
service pack
configuration management policy
NAC
30. SAN stands for...
25
storage area network
OS hardening
discretionary
31. LDAP stands for...
MAC
lightweight directory access protocol
80
FAT
32. Defining the software and hardware components that can be used in an organization
infrastructure based
22
TACACS
configuration management policy
33. Most restrictive access control method that uses security labels to control access
80
domain name service
file and print sharing hardening
MAC
34. Centrally managed NAC method requiring installation of software agents on each network client
open mail relay
NNTP
endpoint based
security template
35. Recommended LDAP authentication
group policies
FTP hardening
simple authentication with security layer LDAPv3
network news transfer protocol
36. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
dynamic host configuration protocol
DAC
RBAC
hardware based
37. Start with the most secure environment - the loosen the controls as needed
MAC
storage area network
rule of least privilege
open mail relay
38. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
119
DNS poisoning
DNS hardening
39. Telnet port
23
TACACS
DHCP
443
40. IPSec port
25
open mail relay
system hardening
500
41. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
lightweight directory access protocol
service pack
FTP hardening
rule of least privilege
42. NAC stands for
DNS poisoning
configuration management policy
SSL
network access control
43. LDAP authentication method that uses clear text
DMZ
simple authentication
RBAC
endpoint based
44. DNS port
119
53
group policies
discretionary
45. Access control defined by roles or job functions
database hardening
110
patches
RBAC
46. Four ways to implement group policies
local - site - domain - OU
infrastructure based
DAC
DHCP
47. NNTP port
configuration baselines
119
configuration management policy
simple network management protocol
48. RBAC stands for ____________ access control
443
MAC
role-based
file and print sharing hardening
49. An accumulated set of software updates or hotfixes from Microsoft
rule of least privilege
110
service pack
mandatory
50. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
DAC
DNS poisoning
configuration management policy
NNTP