SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four ways to implement group policies
local - site - domain - OU
role-based
discretionary
network access control
2. Centrally managed NAC method requiring installation of software agents on each network client
DMZ
endpoint based
20 and 21
25
3. An accumulated set of software updates or hotfixes from Microsoft
service pack
RBAC
rule of least privilege
security template
4. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
network attached storage
anonymous authentication
DNS poisoning
139
5. SMTP stands for...
SNMP
configuration management policy
simple mail transport protocol
hardware based
6. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
SNMP
TACACS
simple authentication
443
7. kerberos port
88
mandatory
161
simple authentication
8. MAC stands for ____________ access control
security template
database hardening
mandatory
network news transfer protocol
9. EFS stands for...
encrypted file system
lightweight directory access protocol
RBAC
simple authentication
10. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
simple authentication with security layer LDAPv3
OS hardening
open mail relay
configuration baselines
11. Telnet port
22
RBAC
TACACS
23
12. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
TACACS
hardware based
DHCP hardening
group policies
13. The process of establishing a standard for security
security template
RBAC
DAC
baselining
14. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
mandatory
SSL
NNTP
simple mail transport protocol
15. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
encrypted file system
DAC
389
role-based
16. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
DNS hardening
TACACS
hardening
dynamic host configuration protocol
17. Locking down the system
domain name service
system hardening
service pack
anonymous authentication
18. HTTP SSL port
443
configuration baselines
20 and 21
infrastructure based
19. RBAC stands for ____________ access control
discretionary
role-based
500
hardening
20. TACACS
Terminal Access Controller Access-Control System
organizational unit
SSL
hardening
21. Access control method used by organizations that have a high turn over
389
simple authentication with security layer LDAPv3
RBAC
network access control
22. DNS stands for...
DMZ
139
DHCP hardening
domain name service
23. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
FTP hardening
Terminal Access Controller Access-Control System
system hardening
configuration baselines
24. Contain possible security settings that can control one or multiple computers
389
security template
SSL
TACACS
25. Access control defined by roles or job functions
RBAC
DHCP
infrastructure based
25
26. Start with the most secure environment - the loosen the controls as needed
389
23
rule of least privilege
TACACS
27. Transferable access controls applied and controlled by the object owner
49
DAC
service pack
endpoint based
28. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
configuration management policy
rule of least privilege
TACACS
group policies
29. NAC method where organizations must run the current hardware and operating systems
infrastructure based
endpoint based
MAC
25
30. LDAP stands for...
lightweight directory access protocol
25
22
20 and 21
31. Define security settings and user's desktop environment on group of computers
SSL
group policies
patches
49
32. LDAP authentication method not recommended
anonymous authentication
Terminal Access Controller Access-Control System
group policies
patches
33. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
network news transfer protocol
database hardening
simple authentication with security layer LDAPv3
simple network management protocol
34. LDAP port
DNS poisoning
389
49
simple authentication
35. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
SNMP
encrypted file system
system hardening
DHCP hardening
36. Recommended LDAP authentication
DAC
RBAC
service pack
simple authentication with security layer LDAPv3
37. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
endpoint based
Terminal Access Controller Access-Control System
RBAC
SNMP
38. DAC stands for ____________ access control
TACACS
configuration management policy
discretionary
simple authentication with security layer LDAPv3
39. DHCP stands for...
dynamic host configuration protocol
Terminal Access Controller Access-Control System
20 and 21
FAT
40. FTP ports
TACACS
network news transfer protocol
20 and 21
open mail relay
41. HTTP port
endpoint based
80
FTP hardening
161
42. Access control method that uses ACLs
25
DAC
hotfix
configuration baselines
43. SMTP port
TACACS
25
NNTP
SNMP
44. Making the OS less vulnerable to threats
49
anonymous authentication
dynamic host configuration protocol
hardening
45. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
rule of least privilege
RBAC
OS hardening
46. TACACS port
DNS hardening
simple authentication with security layer LDAPv3
49
DAC
47. NetBIOS port
DNS hardening
RBAC
139
infrastructure based
48. NAC stands for
DHCP hardening
MAC
network access control
network attached storage
49. Standard setup used when configuring machines - provide a starting point and consistent setup
389
infrastructure based
23
configuration baselines
50. Help to make sure devices meet security standards before they are allowed to connect to the network
dynamic host configuration protocol
baselining
organizational unit
NAC