SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
MAC
DNS poisoning
SNMP
SSL
2. Recommended LDAP authentication
simple authentication with security layer LDAPv3
DMZ
least privileged principle
configuration management policy
3. SNMP port
network news transfer protocol
161
RBAC
88
4. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
DMZ
FTP hardening
443
DNS hardening
5. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
baselining
DNS hardening
network access control
139
6. NNTP stands for
MAC
network news transfer protocol
configuration baselines
OS hardening
7. NAC stands for
local - site - domain - OU
storage area network
network access control
organizational unit
8. NNTP port
RBAC
least privileged principle
DAC
119
9. Standard setup used when configuring machines - provide a starting point and consistent setup
role-based
500
endpoint based
configuration baselines
10. SSH port
DAC
389
22
rule of least privilege
11. NAS stands for...
network attached storage
80
DNS hardening
endpoint based
12. Contain possible security settings that can control one or multiple computers
FTP hardening
hotfix
25
security template
13. kerberos port
domain name service
88
500
FAT
14. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
DNS poisoning
53
MAC
20 and 21
15. Defining the software and hardware components that can be used in an organization
hotfix
network news transfer protocol
database hardening
configuration management policy
16. Most restrictive access control method that uses security labels to control access
network news transfer protocol
storage area network
MAC
patches
17. Help to make sure devices meet security standards before they are allowed to connect to the network
DAC
NAC
least privileged principle
DMZ
18. POP3 port
encrypted file system
DAC
SSL
110
19. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
simple authentication
database hardening
SNMP
discretionary
20. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
RBAC
OS hardening
25
simple network management protocol
21. NAC method where organizations must run the current hardware and operating systems
DMZ
infrastructure based
hardening
Terminal Access Controller Access-Control System
22. A subnet on the network that separates the internal network from publicly exposed hosts
least privileged principle
MAC
443
DMZ
23. Transferable access controls applied and controlled by the object owner
119
FTP hardening
DAC
TACACS
24. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
service pack
DHCP
open mail relay
dynamic host configuration protocol
25. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
least privileged principle
system hardening
storage area network
RBAC
26. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
system hardening
DNS hardening
simple authentication with security layer LDAPv3
27. Telnet port
23
network access control
rule of least privilege
encrypted file system
28. Making the OS less vulnerable to threats
389
RBAC
hardening
local - site - domain - OU
29. Access control method that uses ACLs
SSL
DAC
DNS poisoning
80
30. TACACS port
organizational unit
file and print sharing hardening
49
80
31. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
DAC
baselining
organizational unit
SNMP
32. Define security settings and user's desktop environment on group of computers
OS hardening
group policies
organizational unit
23
33. DNS stands for...
DAC
domain name service
443
NNTP
34. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
161
20 and 21
anonymous authentication
TACACS
35. LDAP authentication method not recommended
storage area network
configuration baselines
domain name service
anonymous authentication
36. DAC stands for ____________ access control
TACACS
DMZ
discretionary
file and print sharing hardening
37. Access control defined by roles or job functions
OS hardening
hardware based
DAC
RBAC
38. Microsoft software packages that contain one or more patches and can be applied without rebooting
SNMP
anonymous authentication
hardening
hotfix
39. RBAC stands for ____________ access control
role-based
RBAC
88
anonymous authentication
40. SMTP port
25
infrastructure based
161
FTP hardening
41. DNS port
simple mail transport protocol
encrypted file system
500
53
42. LDAP stands for...
lightweight directory access protocol
49
389
SNMP
43. HTTP port
53
80
88
FAT
44. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
network attached storage
SNMP
discretionary
45. SMTP port
Terminal Access Controller Access-Control System
DNS hardening
rule of least privilege
25
46. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
DMZ
organizational unit
anonymous authentication
47. File system that offers limited security and was primarily designed for desktop use
infrastructure based
FAT
RBAC
database hardening
48. Label-based - hard coded access controls - at multiple levels - applied to all objects
domain name service
MAC
SNMP
local - site - domain - OU
49. MAC stands for ____________ access control
encrypted file system
anonymous authentication
organizational unit
mandatory
50. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
20 and 21
DHCP hardening
389
file and print sharing hardening