SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Most restrictive access control method that uses security labels to control access
22
lightweight directory access protocol
DNS poisoning
MAC
2. RBAC stands for ____________ access control
mandatory
22
88
role-based
3. EFS stands for...
configuration management policy
RBAC
encrypted file system
TACACS
4. LDAP authentication method not recommended
22
anonymous authentication
53
389
5. HTTP SSL port
role-based
dynamic host configuration protocol
49
443
6. The process of establishing a standard for security
161
baselining
simple authentication with security layer LDAPv3
database hardening
7. Access control method that uses ACLs
RBAC
network access control
DAC
organizational unit
8. NNTP port
patches
DMZ
119
encrypted file system
9. HTTP port
file and print sharing hardening
80
Terminal Access Controller Access-Control System
mandatory
10. A subnet on the network that separates the internal network from publicly exposed hosts
23
25
139
DMZ
11. NAS stands for...
network attached storage
DNS poisoning
least privileged principle
TACACS
12. SMTP port
network attached storage
DNS poisoning
25
DMZ
13. Contain possible security settings that can control one or multiple computers
security template
TACACS
25
anonymous authentication
14. SSH port
22
domain name service
simple network management protocol
encrypted file system
15. POP3 port
23
RBAC
SNMP
110
16. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
configuration management policy
DNS poisoning
161
network access control
17. NAC method where organizations must run the current hardware and operating systems
443
infrastructure based
mandatory
lightweight directory access protocol
18. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
RBAC
discretionary
Terminal Access Controller Access-Control System
database hardening
19. NNTP stands for
discretionary
DNS hardening
network news transfer protocol
database hardening
20. TACACS port
network attached storage
simple mail transport protocol
49
simple network management protocol
21. OU stands for...
organizational unit
25
network access control
OS hardening
22. File system that offers limited security and was primarily designed for desktop use
group policies
500
FAT
DAC
23. kerberos port
88
discretionary
local - site - domain - OU
20 and 21
24. An accumulated set of software updates or hotfixes from Microsoft
service pack
FAT
RBAC
25
25. NetBIOS port
least privileged principle
network attached storage
139
DAC
26. Four ways to implement group policies
baselining
local - site - domain - OU
NAC
system hardening
27. DNS port
49
hardening
53
storage area network
28. SAN stands for...
anonymous authentication
storage area network
configuration management policy
53
29. Issued by software vendors to fix bugs - address security issues or add functionality
patches
DHCP hardening
SSL
open mail relay
30. SNMP stand for...
domain name service
patches
simple network management protocol
Terminal Access Controller Access-Control System
31. DNS stands for...
hardening
hardware based
domain name service
80
32. Centrally managed NAC method requiring installation of software agents on each network client
endpoint based
discretionary
500
simple authentication
33. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
storage area network
RBAC
endpoint based
DHCP hardening
34. LDAP stands for...
open mail relay
least privileged principle
lightweight directory access protocol
endpoint based
35. Access control method used by organizations that have a high turn over
DAC
500
RBAC
configuration baselines
36. SNMP port
domain name service
least privileged principle
161
simple network management protocol
37. Microsoft software packages that contain one or more patches and can be applied without rebooting
23
hotfix
system hardening
RBAC
38. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
encrypted file system
hardware based
DAC
DHCP
39. Recommended LDAP authentication
lightweight directory access protocol
simple authentication with security layer LDAPv3
DAC
389
40. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
configuration baselines
FTP hardening
MAC
role-based
41. Define security settings and user's desktop environment on group of computers
network access control
group policies
organizational unit
TACACS
42. SMTP port
25
discretionary
MAC
88
43. A cryptographic protocol that provides security for communications over networks such as the Internet
FTP hardening
110
SSL
least privileged principle
44. Transferable access controls applied and controlled by the object owner
file and print sharing hardening
network attached storage
DAC
23
45. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
dynamic host configuration protocol
domain name service
lightweight directory access protocol
NNTP
46. Making the OS less vulnerable to threats
hardening
22
119
MAC
47. Users granted least amount of access possible that enables them to complete their required work
least privileged principle
119
security template
NAC
48. IPSec port
DAC
hardware based
500
139
49. NAC stands for
network access control
20 and 21
TACACS
443
50. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
hotfix
RBAC
open mail relay