SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
25
389
TACACS
DNS hardening
2. Issued by software vendors to fix bugs - address security issues or add functionality
lightweight directory access protocol
110
patches
DAC
3. Locking down the system
system hardening
SNMP
RBAC
MAC
4. File system that offers limited security and was primarily designed for desktop use
FAT
local - site - domain - OU
hardening
storage area network
5. SSH port
25
139
infrastructure based
22
6. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
119
25
hotfix
FTP hardening
7. NAC method where organizations must run the current hardware and operating systems
25
simple authentication with security layer LDAPv3
infrastructure based
DHCP hardening
8. NAS stands for...
network attached storage
storage area network
RBAC
system hardening
9. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
MAC
110
NNTP
network attached storage
10. DAC stands for ____________ access control
role-based
53
DMZ
discretionary
11. TACACS port
DAC
DMZ
49
NNTP
12. NNTP port
role-based
anonymous authentication
119
20 and 21
13. POP3 port
110
network access control
FAT
119
14. Help to make sure devices meet security standards before they are allowed to connect to the network
NAC
file and print sharing hardening
baselining
discretionary
15. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
hotfix
RBAC
110
DNS hardening
16. HTTP port
23
80
baselining
25
17. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
encrypted file system
DHCP
DAC
23
18. LDAP authentication method not recommended
organizational unit
discretionary
open mail relay
anonymous authentication
19. Recommended LDAP authentication
DHCP hardening
80
DNS hardening
simple authentication with security layer LDAPv3
20. SNMP port
53
simple network management protocol
161
configuration baselines
21. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
system hardening
anonymous authentication
simple mail transport protocol
DNS poisoning
22. Access control defined by roles or job functions
RBAC
domain name service
group policies
open mail relay
23. MAC stands for ____________ access control
configuration management policy
configuration baselines
mandatory
system hardening
24. EFS stands for...
simple authentication
22
DHCP
encrypted file system
25. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
RBAC
DHCP hardening
20 and 21
DAC
26. LDAP port
simple network management protocol
MAC
group policies
389
27. SNMP stand for...
network access control
139
DMZ
simple network management protocol
28. kerberos port
20 and 21
88
443
500
29. NetBIOS port
139
service pack
security template
500
30. LDAP authentication method that uses clear text
mandatory
baselining
dynamic host configuration protocol
simple authentication
31. SMTP port
infrastructure based
25
SNMP
rule of least privilege
32. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
domain name service
FTP hardening
open mail relay
role-based
33. Most restrictive access control method that uses security labels to control access
110
20 and 21
network access control
MAC
34. DHCP stands for...
dynamic host configuration protocol
group policies
SNMP
110
35. SAN stands for...
least privileged principle
23
storage area network
NAC
36. Four ways to implement group policies
NNTP
domain name service
simple authentication with security layer LDAPv3
local - site - domain - OU
37. Start with the most secure environment - the loosen the controls as needed
endpoint based
rule of least privilege
23
discretionary
38. Label-based - hard coded access controls - at multiple levels - applied to all objects
MAC
hardware based
simple network management protocol
dynamic host configuration protocol
39. Standard setup used when configuring machines - provide a starting point and consistent setup
SNMP
configuration baselines
security template
baselining
40. Define security settings and user's desktop environment on group of computers
simple network management protocol
TACACS
group policies
encrypted file system
41. FTP ports
storage area network
MAC
20 and 21
local - site - domain - OU
42. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
organizational unit
mandatory
configuration management policy
43. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
dynamic host configuration protocol
service pack
88
44. RBAC stands for ____________ access control
role-based
lightweight directory access protocol
RBAC
500
45. Microsoft software packages that contain one or more patches and can be applied without rebooting
system hardening
open mail relay
88
hotfix
46. DNS stands for...
organizational unit
DHCP
domain name service
lightweight directory access protocol
47. NNTP stands for
NNTP
DAC
443
network news transfer protocol
48. Transferable access controls applied and controlled by the object owner
443
discretionary
encrypted file system
DAC
49. Defining the software and hardware components that can be used in an organization
RBAC
SSL
configuration management policy
DHCP
50. The process of establishing a standard for security
baselining
TACACS
hardware based
endpoint based