SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Access control method that uses ACLs
22
discretionary
configuration baselines
DAC
2. NAC method where organizations must run the current hardware and operating systems
20 and 21
infrastructure based
patches
RBAC
3. Users granted least amount of access possible that enables them to complete their required work
20 and 21
161
least privileged principle
simple network management protocol
4. SAN stands for...
23
encrypted file system
file and print sharing hardening
storage area network
5. Making the OS less vulnerable to threats
DNS poisoning
TACACS
simple authentication
hardening
6. DNS port
49
53
file and print sharing hardening
patches
7. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
500
FTP hardening
network news transfer protocol
hardware based
8. Recommended LDAP authentication
RBAC
443
25
simple authentication with security layer LDAPv3
9. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
RBAC
NNTP
configuration management policy
simple mail transport protocol
10. Locking down the system
anonymous authentication
system hardening
SSL
NNTP
11. Label-based - hard coded access controls - at multiple levels - applied to all objects
MAC
file and print sharing hardening
FAT
RBAC
12. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
dynamic host configuration protocol
open mail relay
RBAC
DAC
13. OU stands for...
OS hardening
organizational unit
hardening
baselining
14. SMTP port
25
RBAC
FAT
open mail relay
15. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
group policies
139
SSL
16. LDAP stands for...
lightweight directory access protocol
group policies
MAC
TACACS
17. Define security settings and user's desktop environment on group of computers
TACACS
group policies
anonymous authentication
NNTP
18. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
hardening
role-based
lightweight directory access protocol
hardware based
19. FTP ports
MAC
baselining
hardening
20 and 21
20. Access control defined by roles or job functions
NNTP
139
mandatory
RBAC
21. Telnet port
baselining
23
NAC
simple network management protocol
22. TACACS
389
hotfix
Terminal Access Controller Access-Control System
DMZ
23. RBAC stands for ____________ access control
file and print sharing hardening
49
role-based
MAC
24. A cryptographic protocol that provides security for communications over networks such as the Internet
25
SSL
161
MAC
25. NAC stands for
system hardening
network access control
lightweight directory access protocol
110
26. Standard setup used when configuring machines - provide a starting point and consistent setup
organizational unit
configuration baselines
FAT
DNS hardening
27. A subnet on the network that separates the internal network from publicly exposed hosts
simple mail transport protocol
DMZ
security template
service pack
28. TACACS port
service pack
system hardening
DNS poisoning
49
29. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
network news transfer protocol
service pack
DHCP hardening
mandatory
30. Issued by software vendors to fix bugs - address security issues or add functionality
SNMP
patches
49
DHCP
31. Help to make sure devices meet security standards before they are allowed to connect to the network
119
DAC
NAC
anonymous authentication
32. File system that offers limited security and was primarily designed for desktop use
389
FAT
49
DAC
33. IPSec port
dynamic host configuration protocol
rule of least privilege
least privileged principle
500
34. SSH port
49
DHCP hardening
22
simple authentication
35. NetBIOS port
DAC
22
storage area network
139
36. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
DHCP hardening
local - site - domain - OU
simple mail transport protocol
37. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
network news transfer protocol
RBAC
Terminal Access Controller Access-Control System
SNMP
38. HTTP SSL port
RBAC
443
dynamic host configuration protocol
RBAC
39. Access control method used by organizations that have a high turn over
RBAC
119
23
161
40. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
simple mail transport protocol
service pack
endpoint based
OS hardening
41. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
DAC
NNTP
TACACS
mandatory
42. MAC stands for ____________ access control
service pack
49
mandatory
network attached storage
43. Contain possible security settings that can control one or multiple computers
anonymous authentication
storage area network
security template
DMZ
44. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
Terminal Access Controller Access-Control System
system hardening
TACACS
DNS poisoning
45. LDAP port
endpoint based
389
RBAC
simple authentication with security layer LDAPv3
46. EFS stands for...
role-based
DAC
encrypted file system
80
47. Start with the most secure environment - the loosen the controls as needed
110
network attached storage
rule of least privilege
TACACS
48. Microsoft software packages that contain one or more patches and can be applied without rebooting
service pack
database hardening
DNS poisoning
hotfix
49. The process of establishing a standard for security
network attached storage
baselining
25
domain name service
50. Most restrictive access control method that uses security labels to control access
rule of least privilege
FTP hardening
network access control
MAC