SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Label-based - hard coded access controls - at multiple levels - applied to all objects
119
MAC
configuration baselines
local - site - domain - OU
2. Start with the most secure environment - the loosen the controls as needed
88
443
23
rule of least privilege
3. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
file and print sharing hardening
25
TACACS
FAT
4. NNTP port
hardware based
119
anonymous authentication
RBAC
5. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
DMZ
anonymous authentication
service pack
NNTP
6. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
49
53
Terminal Access Controller Access-Control System
7. NAC method where organizations must run the current hardware and operating systems
20 and 21
infrastructure based
23
discretionary
8. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
system hardening
hardware based
161
file and print sharing hardening
9. Contain possible security settings that can control one or multiple computers
20 and 21
baselining
anonymous authentication
security template
10. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
443
file and print sharing hardening
group policies
OS hardening
11. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
rule of least privilege
system hardening
endpoint based
DHCP hardening
12. DNS stands for...
OS hardening
domain name service
hardening
MAC
13. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
configuration baselines
patches
discretionary
hardware based
14. NetBIOS port
endpoint based
139
baselining
rule of least privilege
15. File system that offers limited security and was primarily designed for desktop use
RBAC
FAT
mandatory
SNMP
16. Access control method that uses ACLs
SNMP
patches
DAC
OS hardening
17. The process of establishing a standard for security
DAC
baselining
MAC
DHCP hardening
18. TACACS port
443
49
SSL
rule of least privilege
19. DAC stands for ____________ access control
patches
23
DAC
discretionary
20. LDAP authentication method that uses clear text
least privileged principle
139
22
simple authentication
21. Microsoft software packages that contain one or more patches and can be applied without rebooting
RBAC
hotfix
database hardening
network access control
22. RBAC stands for ____________ access control
storage area network
security template
role-based
network attached storage
23. Help to make sure devices meet security standards before they are allowed to connect to the network
23
NAC
88
110
24. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
DNS hardening
DAC
system hardening
hotfix
25. SMTP port
119
25
161
500
26. SAN stands for...
DAC
DAC
storage area network
role-based
27. HTTP SSL port
FAT
443
Terminal Access Controller Access-Control System
security template
28. Users granted least amount of access possible that enables them to complete their required work
OS hardening
simple network management protocol
least privileged principle
infrastructure based
29. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
patches
infrastructure based
database hardening
RBAC
30. SSH port
patches
security template
22
simple authentication
31. Access control defined by roles or job functions
local - site - domain - OU
lightweight directory access protocol
RBAC
system hardening
32. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
SSL
FTP hardening
network attached storage
33. EFS stands for...
RBAC
domain name service
encrypted file system
443
34. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
domain name service
DNS hardening
OS hardening
DAC
35. SMTP stands for...
anonymous authentication
80
simple mail transport protocol
25
36. Telnet port
DAC
23
389
configuration management policy
37. LDAP port
389
23
network access control
DAC
38. kerberos port
simple authentication with security layer LDAPv3
configuration management policy
lightweight directory access protocol
88
39. FTP ports
20 and 21
lightweight directory access protocol
OS hardening
role-based
40. Centrally managed NAC method requiring installation of software agents on each network client
file and print sharing hardening
DAC
endpoint based
DMZ
41. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
443
hardware based
FTP hardening
hardening
42. IPSec port
role-based
lightweight directory access protocol
simple network management protocol
500
43. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
TACACS
group policies
configuration baselines
SNMP
44. Recommended LDAP authentication
500
simple authentication with security layer LDAPv3
MAC
service pack
45. SNMP stand for...
simple network management protocol
open mail relay
mandatory
OS hardening
46. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
mandatory
23
DNS poisoning
SSL
47. NAS stands for...
configuration management policy
open mail relay
network attached storage
MAC
48. Define security settings and user's desktop environment on group of computers
network access control
group policies
389
SNMP
49. DHCP stands for...
infrastructure based
simple authentication
20 and 21
dynamic host configuration protocol
50. Most restrictive access control method that uses security labels to control access
MAC
NAC
RBAC
49