SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Standard setup used when configuring machines - provide a starting point and consistent setup
dynamic host configuration protocol
SSL
configuration baselines
Terminal Access Controller Access-Control System
2. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
161
49
NNTP
storage area network
3. MAC stands for ____________ access control
lightweight directory access protocol
organizational unit
mandatory
system hardening
4. Issued by software vendors to fix bugs - address security issues or add functionality
22
patches
23
20 and 21
5. A cryptographic protocol that provides security for communications over networks such as the Internet
hardware based
simple authentication with security layer LDAPv3
SSL
23
6. SMTP port
Terminal Access Controller Access-Control System
22
25
TACACS
7. SSH port
22
simple network management protocol
open mail relay
endpoint based
8. A subnet on the network that separates the internal network from publicly exposed hosts
Terminal Access Controller Access-Control System
DMZ
DHCP hardening
network attached storage
9. The process of establishing a standard for security
DHCP hardening
DNS poisoning
139
baselining
10. NetBIOS port
139
network access control
dynamic host configuration protocol
20 and 21
11. POP3 port
110
25
161
DMZ
12. NAC method where organizations must run the current hardware and operating systems
80
161
anonymous authentication
infrastructure based
13. Access control method used by organizations that have a high turn over
RBAC
file and print sharing hardening
SSL
rule of least privilege
14. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
system hardening
OS hardening
dynamic host configuration protocol
443
15. HTTP port
network access control
RBAC
80
RBAC
16. LDAP authentication method not recommended
storage area network
service pack
network access control
anonymous authentication
17. LDAP stands for...
Terminal Access Controller Access-Control System
lightweight directory access protocol
database hardening
anonymous authentication
18. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
MAC
network access control
database hardening
OS hardening
19. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
simple network management protocol
DAC
baselining
RBAC
20. SMTP stands for...
53
DHCP
security template
simple mail transport protocol
21. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
DMZ
139
DHCP
22. NNTP port
DHCP hardening
119
OS hardening
DNS poisoning
23. Recommended LDAP authentication
simple authentication with security layer LDAPv3
domain name service
443
139
24. Making the OS less vulnerable to threats
DMZ
rule of least privilege
hardening
119
25. File system that offers limited security and was primarily designed for desktop use
389
FAT
domain name service
53
26. DNS stands for...
group policies
domain name service
simple network management protocol
local - site - domain - OU
27. NAC stands for
role-based
network access control
least privileged principle
dynamic host configuration protocol
28. Access control defined by roles or job functions
DAC
simple network management protocol
20 and 21
RBAC
29. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
DNS hardening
infrastructure based
RBAC
configuration baselines
30. LDAP authentication method that uses clear text
simple authentication
dynamic host configuration protocol
system hardening
simple mail transport protocol
31. RBAC stands for ____________ access control
443
DNS hardening
role-based
MAC
32. Most restrictive access control method that uses security labels to control access
least privileged principle
MAC
RBAC
OS hardening
33. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
open mail relay
configuration baselines
FTP hardening
DAC
34. DNS port
25
53
MAC
storage area network
35. Telnet port
infrastructure based
119
23
lightweight directory access protocol
36. Locking down the system
patches
group policies
system hardening
network access control
37. Users granted least amount of access possible that enables them to complete their required work
network attached storage
least privileged principle
DAC
hardware based
38. Centrally managed NAC method requiring installation of software agents on each network client
88
53
80
endpoint based
39. DAC stands for ____________ access control
lightweight directory access protocol
rule of least privilege
discretionary
DAC
40. NNTP stands for
RBAC
network news transfer protocol
110
DAC
41. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
88
DMZ
NAC
DNS poisoning
42. Contain possible security settings that can control one or multiple computers
RBAC
hotfix
database hardening
security template
43. DHCP stands for...
dynamic host configuration protocol
least privileged principle
group policies
database hardening
44. OU stands for...
organizational unit
security template
dynamic host configuration protocol
TACACS
45. SNMP port
rule of least privilege
role-based
encrypted file system
161
46. Access control method that uses ACLs
lightweight directory access protocol
DAC
389
TACACS
47. LDAP port
389
lightweight directory access protocol
rule of least privilege
FTP hardening
48. EFS stands for...
SNMP
simple mail transport protocol
encrypted file system
NAC
49. HTTP SSL port
security template
443
infrastructure based
least privileged principle
50. Transferable access controls applied and controlled by the object owner
25
simple mail transport protocol
database hardening
DAC