SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DNS stands for...
domain name service
hardening
patches
FAT
2. Define security settings and user's desktop environment on group of computers
hardening
endpoint based
group policies
domain name service
3. NNTP port
119
simple authentication
local - site - domain - OU
DNS poisoning
4. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
rule of least privilege
discretionary
RBAC
TACACS
5. DNS port
DHCP
DHCP hardening
119
53
6. NetBIOS port
119
139
simple network management protocol
service pack
7. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
mandatory
OS hardening
hardening
NNTP
8. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
dynamic host configuration protocol
119
DNS poisoning
SNMP
9. SNMP stand for...
MAC
database hardening
simple network management protocol
DAC
10. kerberos port
role-based
88
configuration baselines
25
11. DAC stands for ____________ access control
discretionary
SSL
network access control
simple network management protocol
12. Most restrictive access control method that uses security labels to control access
dynamic host configuration protocol
MAC
53
domain name service
13. SMTP stands for...
hardening
20 and 21
simple mail transport protocol
OS hardening
14. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
database hardening
hardware based
FAT
group policies
15. Centrally managed NAC method requiring installation of software agents on each network client
discretionary
role-based
DNS poisoning
endpoint based
16. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
DMZ
file and print sharing hardening
DAC
110
17. LDAP authentication method that uses clear text
local - site - domain - OU
25
119
simple authentication
18. Transferable access controls applied and controlled by the object owner
configuration baselines
TACACS
DAC
network news transfer protocol
19. Issued by software vendors to fix bugs - address security issues or add functionality
49
baselining
patches
SNMP
20. File system that offers limited security and was primarily designed for desktop use
DHCP
FAT
file and print sharing hardening
configuration baselines
21. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
baselining
NNTP
TACACS
443
22. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
22
baselining
RBAC
DAC
23. SNMP port
161
23
53
lightweight directory access protocol
24. DHCP stands for...
infrastructure based
patches
dynamic host configuration protocol
MAC
25. Four ways to implement group policies
local - site - domain - OU
storage area network
network attached storage
hardening
26. A subnet on the network that separates the internal network from publicly exposed hosts
encrypted file system
DMZ
DNS hardening
MAC
27. The process of establishing a standard for security
20 and 21
MAC
Terminal Access Controller Access-Control System
baselining
28. NNTP stands for
network news transfer protocol
configuration management policy
file and print sharing hardening
TACACS
29. A cryptographic protocol that provides security for communications over networks such as the Internet
rule of least privilege
SSL
TACACS
119
30. Label-based - hard coded access controls - at multiple levels - applied to all objects
110
file and print sharing hardening
80
MAC
31. Contain possible security settings that can control one or multiple computers
security template
110
SSL
storage area network
32. TACACS
MAC
hardware based
Terminal Access Controller Access-Control System
network attached storage
33. Microsoft software packages that contain one or more patches and can be applied without rebooting
25
hotfix
DHCP
FTP hardening
34. MAC stands for ____________ access control
mandatory
hotfix
RBAC
security template
35. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
database hardening
least privileged principle
25
hardening
36. OU stands for...
RBAC
161
configuration management policy
organizational unit
37. NAC stands for
configuration management policy
file and print sharing hardening
local - site - domain - OU
network access control
38. Access control defined by roles or job functions
role-based
system hardening
RBAC
NAC
39. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
simple network management protocol
Terminal Access Controller Access-Control System
TACACS
DNS hardening
40. SMTP port
25
network attached storage
NAC
hardware based
41. Access control method used by organizations that have a high turn over
discretionary
mandatory
RBAC
encrypted file system
42. Protocol for assigning dynamic IP addresses to devices on a network
DAC
DAC
DHCP
20 and 21
43. TACACS port
simple network management protocol
organizational unit
49
FTP hardening
44. RBAC stands for ____________ access control
role-based
configuration baselines
anonymous authentication
least privileged principle
45. LDAP port
389
DAC
rule of least privilege
storage area network
46. LDAP stands for...
25
lightweight directory access protocol
simple network management protocol
system hardening
47. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
configuration baselines
TACACS
389
DNS poisoning
48. Making the OS less vulnerable to threats
hardening
dynamic host configuration protocol
RBAC
simple authentication with security layer LDAPv3
49. Standard setup used when configuring machines - provide a starting point and consistent setup
22
configuration baselines
DHCP hardening
88
50. SMTP port
25
file and print sharing hardening
encrypted file system
88