SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
FAT
OS hardening
23
network news transfer protocol
2. NetBIOS port
configuration baselines
139
DNS hardening
configuration management policy
3. DHCP stands for...
23
DNS poisoning
hardening
dynamic host configuration protocol
4. SAN stands for...
storage area network
network access control
FTP hardening
open mail relay
5. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
least privileged principle
FAT
DAC
dynamic host configuration protocol
6. DNS port
infrastructure based
53
hardening
88
7. kerberos port
49
RBAC
88
network news transfer protocol
8. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
DAC
TACACS
SSL
least privileged principle
9. Help to make sure devices meet security standards before they are allowed to connect to the network
TACACS
NAC
encrypted file system
MAC
10. A subnet on the network that separates the internal network from publicly exposed hosts
SNMP
network news transfer protocol
NNTP
DMZ
11. Access control method used by organizations that have a high turn over
22
baselining
RBAC
storage area network
12. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
endpoint based
simple authentication with security layer LDAPv3
500
13. File system that offers limited security and was primarily designed for desktop use
FAT
group policies
DNS poisoning
DAC
14. Locking down the system
simple network management protocol
system hardening
network access control
500
15. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
23
FTP hardening
DHCP hardening
endpoint based
16. SSH port
mandatory
network news transfer protocol
OS hardening
22
17. DNS stands for...
role-based
FAT
domain name service
hardening
18. SNMP port
80
endpoint based
161
500
19. NNTP port
119
storage area network
25
hardening
20. TACACS
simple authentication
endpoint based
Terminal Access Controller Access-Control System
20 and 21
21. EFS stands for...
encrypted file system
local - site - domain - OU
domain name service
MAC
22. Transferable access controls applied and controlled by the object owner
system hardening
DNS poisoning
file and print sharing hardening
DAC
23. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
DNS hardening
DNS poisoning
service pack
SNMP
24. Access control defined by roles or job functions
RBAC
configuration baselines
simple authentication
hardware based
25. RBAC stands for ____________ access control
role-based
network access control
49
rule of least privilege
26. NNTP stands for
110
DNS hardening
baselining
network news transfer protocol
27. Four ways to implement group policies
49
simple authentication
local - site - domain - OU
MAC
28. Define security settings and user's desktop environment on group of computers
local - site - domain - OU
mandatory
group policies
hardening
29. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
mandatory
network attached storage
DNS hardening
simple network management protocol
30. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
110
rule of least privilege
file and print sharing hardening
49
31. SMTP stands for...
DHCP
FTP hardening
simple mail transport protocol
161
32. NAC method where organizations must run the current hardware and operating systems
119
infrastructure based
80
NNTP
33. Users granted least amount of access possible that enables them to complete their required work
security template
role-based
least privileged principle
53
34. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
110
DNS hardening
TACACS
35. Making the OS less vulnerable to threats
22
119
dynamic host configuration protocol
hardening
36. HTTP SSL port
443
encrypted file system
FAT
simple mail transport protocol
37. TACACS port
hardware based
49
storage area network
SSL
38. FTP ports
20 and 21
OS hardening
NAC
Terminal Access Controller Access-Control System
39. LDAP port
encrypted file system
network news transfer protocol
389
DHCP hardening
40. The process of establishing a standard for security
119
mandatory
baselining
FTP hardening
41. Standard setup used when configuring machines - provide a starting point and consistent setup
storage area network
configuration baselines
system hardening
domain name service
42. Contain possible security settings that can control one or multiple computers
rule of least privilege
anonymous authentication
88
security template
43. LDAP authentication method that uses clear text
hardware based
simple authentication
110
system hardening
44. Most restrictive access control method that uses security labels to control access
MAC
FAT
22
network news transfer protocol
45. SNMP stand for...
anonymous authentication
RBAC
FTP hardening
simple network management protocol
46. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
DAC
RBAC
service pack
hardware based
47. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
Terminal Access Controller Access-Control System
storage area network
SNMP
network access control
48. IPSec port
389
443
500
20 and 21
49. Access control method that uses ACLs
security template
110
file and print sharing hardening
DAC
50. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
MAC
DNS poisoning
network attached storage