SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TACACS
161
Terminal Access Controller Access-Control System
NNTP
dynamic host configuration protocol
2. A subnet on the network that separates the internal network from publicly exposed hosts
DMZ
20 and 21
system hardening
database hardening
3. Start with the most secure environment - the loosen the controls as needed
simple network management protocol
139
rule of least privilege
DHCP
4. EFS stands for...
discretionary
139
endpoint based
encrypted file system
5. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
20 and 21
dynamic host configuration protocol
DAC
443
6. kerberos port
mandatory
88
MAC
Terminal Access Controller Access-Control System
7. An accumulated set of software updates or hotfixes from Microsoft
110
139
service pack
SNMP
8. SNMP stand for...
FAT
storage area network
group policies
simple network management protocol
9. Contain possible security settings that can control one or multiple computers
DAC
discretionary
network access control
security template
10. NAC method where organizations must run the current hardware and operating systems
infrastructure based
139
database hardening
NAC
11. DNS stands for...
domain name service
simple authentication
NNTP
88
12. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
baselining
139
161
13. Four ways to implement group policies
configuration management policy
49
local - site - domain - OU
OS hardening
14. Making the OS less vulnerable to threats
500
hardening
88
configuration baselines
15. LDAP authentication method that uses clear text
25
simple authentication
simple network management protocol
rule of least privilege
16. HTTP port
endpoint based
DAC
configuration baselines
80
17. Microsoft software packages that contain one or more patches and can be applied without rebooting
file and print sharing hardening
hotfix
DAC
FTP hardening
18. DAC stands for ____________ access control
discretionary
dynamic host configuration protocol
SSL
file and print sharing hardening
19. File system that offers limited security and was primarily designed for desktop use
database hardening
FAT
simple mail transport protocol
group policies
20. MAC stands for ____________ access control
mandatory
DHCP hardening
DMZ
system hardening
21. NetBIOS port
least privileged principle
baselining
139
role-based
22. SSH port
22
RBAC
TACACS
domain name service
23. Defining the software and hardware components that can be used in an organization
network attached storage
53
configuration management policy
RBAC
24. Locking down the system
group policies
domain name service
system hardening
simple network management protocol
25. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
file and print sharing hardening
119
simple authentication
domain name service
26. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
FTP hardening
TACACS
RBAC
500
27. Telnet port
23
20 and 21
25
organizational unit
28. Standard setup used when configuring machines - provide a starting point and consistent setup
configuration baselines
OS hardening
DAC
configuration management policy
29. LDAP authentication method not recommended
anonymous authentication
role-based
organizational unit
139
30. Transferable access controls applied and controlled by the object owner
DAC
20 and 21
MAC
80
31. DNS port
25
SSL
configuration management policy
53
32. FTP ports
open mail relay
database hardening
service pack
20 and 21
33. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
DNS hardening
role-based
service pack
RBAC
34. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
TACACS
network news transfer protocol
organizational unit
SSL
35. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
22
encrypted file system
139
36. Most restrictive access control method that uses security labels to control access
anonymous authentication
MAC
NNTP
configuration baselines
37. Access control method that uses ACLs
security template
database hardening
encrypted file system
DAC
38. RBAC stands for ____________ access control
NAC
file and print sharing hardening
443
role-based
39. NNTP stands for
RBAC
DNS hardening
network news transfer protocol
SNMP
40. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
open mail relay
simple authentication with security layer LDAPv3
file and print sharing hardening
mandatory
41. Access control defined by roles or job functions
MAC
139
RBAC
rule of least privilege
42. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
patches
simple mail transport protocol
DHCP
SNMP
43. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
OS hardening
389
discretionary
FTP hardening
44. Protocol for assigning dynamic IP addresses to devices on a network
organizational unit
hardening
DHCP
443
45. DHCP stands for...
88
MAC
dynamic host configuration protocol
patches
46. SMTP stands for...
infrastructure based
simple mail transport protocol
DAC
49
47. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
anonymous authentication
500
NAC
48. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
database hardening
500
endpoint based
NAC
49. POP3 port
110
local - site - domain - OU
RBAC
500
50. Label-based - hard coded access controls - at multiple levels - applied to all objects
network access control
MAC
network news transfer protocol
RBAC