SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of establishing a standard for security
baselining
DAC
110
network attached storage
2. IPSec port
161
23
local - site - domain - OU
500
3. Centrally managed NAC method requiring installation of software agents on each network client
FTP hardening
endpoint based
20 and 21
group policies
4. An accumulated set of software updates or hotfixes from Microsoft
configuration management policy
500
simple authentication
service pack
5. LDAP stands for...
119
MAC
lightweight directory access protocol
endpoint based
6. SMTP port
DNS poisoning
simple authentication with security layer LDAPv3
25
FTP hardening
7. Start with the most secure environment - the loosen the controls as needed
hotfix
patches
rule of least privilege
hardening
8. Define security settings and user's desktop environment on group of computers
configuration baselines
group policies
discretionary
simple authentication
9. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
DHCP hardening
DAC
OS hardening
DAC
10. SSH port
configuration baselines
22
TACACS
group policies
11. DHCP stands for...
20 and 21
49
dynamic host configuration protocol
discretionary
12. MAC stands for ____________ access control
OS hardening
23
mandatory
system hardening
13. Telnet port
49
DMZ
open mail relay
23
14. Help to make sure devices meet security standards before they are allowed to connect to the network
NAC
local - site - domain - OU
anonymous authentication
SNMP
15. Users granted least amount of access possible that enables them to complete their required work
Terminal Access Controller Access-Control System
53
least privileged principle
389
16. SNMP stand for...
network access control
configuration baselines
DAC
simple network management protocol
17. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
role-based
configuration baselines
TACACS
NAC
18. POP3 port
TACACS
110
139
389
19. LDAP port
simple mail transport protocol
DHCP hardening
rule of least privilege
389
20. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
file and print sharing hardening
RBAC
least privileged principle
161
21. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
500
25
DAC
SNMP
22. Issued by software vendors to fix bugs - address security issues or add functionality
patches
network access control
DAC
infrastructure based
23. Transferable access controls applied and controlled by the object owner
simple network management protocol
configuration management policy
DAC
DHCP
24. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
discretionary
RBAC
FTP hardening
hotfix
25. Access control method that uses ACLs
DAC
25
25
endpoint based
26. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
53
RBAC
DNS hardening
network attached storage
27. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
patches
database hardening
25
161
28. A subnet on the network that separates the internal network from publicly exposed hosts
DHCP hardening
80
DMZ
RBAC
29. Standard setup used when configuring machines - provide a starting point and consistent setup
configuration baselines
role-based
49
139
30. File system that offers limited security and was primarily designed for desktop use
network attached storage
FAT
139
hardware based
31. NAS stands for...
file and print sharing hardening
simple network management protocol
network attached storage
simple authentication
32. LDAP authentication method not recommended
NNTP
anonymous authentication
RBAC
OS hardening
33. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
file and print sharing hardening
22
TACACS
service pack
34. kerberos port
88
110
group policies
TACACS
35. SMTP port
25
DAC
patches
service pack
36. DNS stands for...
database hardening
53
MAC
domain name service
37. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
88
80
database hardening
38. A cryptographic protocol that provides security for communications over networks such as the Internet
hardware based
FAT
SSL
simple authentication with security layer LDAPv3
39. FTP ports
network access control
20 and 21
simple authentication with security layer LDAPv3
22
40. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
hardware based
storage area network
group policies
open mail relay
41. DAC stands for ____________ access control
discretionary
hotfix
least privileged principle
hardware based
42. TACACS
MAC
domain name service
Terminal Access Controller Access-Control System
SNMP
43. EFS stands for...
simple authentication
encrypted file system
network attached storage
mandatory
44. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
system hardening
organizational unit
FTP hardening
DNS poisoning
45. Most restrictive access control method that uses security labels to control access
443
MAC
hotfix
NAC
46. Access control defined by roles or job functions
RBAC
configuration baselines
security template
DAC
47. HTTP port
DNS poisoning
80
mandatory
file and print sharing hardening
48. SAN stands for...
DNS poisoning
MAC
TACACS
storage area network
49. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
open mail relay
least privileged principle
80
hotfix
50. SMTP stands for...
anonymous authentication
53
simple mail transport protocol
NNTP