SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
119
file and print sharing hardening
discretionary
organizational unit
2. Most restrictive access control method that uses security labels to control access
DHCP hardening
MAC
139
least privileged principle
3. kerberos port
389
MAC
88
system hardening
4. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
DMZ
DHCP hardening
49
configuration management policy
5. Access control defined by roles or job functions
simple network management protocol
least privileged principle
RBAC
network access control
6. The process of establishing a standard for security
119
88
FAT
baselining
7. RBAC stands for ____________ access control
RBAC
role-based
configuration management policy
500
8. SNMP stand for...
SNMP
infrastructure based
49
simple network management protocol
9. Access control method used by organizations that have a high turn over
baselining
RBAC
119
storage area network
10. SMTP port
25
baselining
80
DAC
11. A cryptographic protocol that provides security for communications over networks such as the Internet
SSL
DAC
80
simple mail transport protocol
12. LDAP stands for...
DNS hardening
lightweight directory access protocol
FAT
MAC
13. LDAP port
20 and 21
hardening
SSL
389
14. Contain possible security settings that can control one or multiple computers
security template
baselining
22
DHCP hardening
15. LDAP authentication method not recommended
25
139
20 and 21
anonymous authentication
16. POP3 port
FTP hardening
80
MAC
110
17. Four ways to implement group policies
database hardening
DHCP
DMZ
local - site - domain - OU
18. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
configuration baselines
dynamic host configuration protocol
DNS poisoning
baselining
19. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
TACACS
DNS hardening
FAT
FTP hardening
20. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
MAC
hardening
open mail relay
53
21. SAN stands for...
NNTP
simple network management protocol
storage area network
80
22. Start with the most secure environment - the loosen the controls as needed
FTP hardening
rule of least privilege
Terminal Access Controller Access-Control System
SNMP
23. File system that offers limited security and was primarily designed for desktop use
simple mail transport protocol
OS hardening
FAT
service pack
24. DHCP stands for...
anonymous authentication
110
organizational unit
dynamic host configuration protocol
25. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
configuration baselines
hardware based
23
OS hardening
26. DNS stands for...
domain name service
DAC
hardening
discretionary
27. NNTP port
discretionary
simple mail transport protocol
110
119
28. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
anonymous authentication
discretionary
Terminal Access Controller Access-Control System
29. Issued by software vendors to fix bugs - address security issues or add functionality
patches
endpoint based
simple authentication with security layer LDAPv3
139
30. NAS stands for...
network attached storage
mandatory
baselining
file and print sharing hardening
31. Defining the software and hardware components that can be used in an organization
discretionary
configuration management policy
local - site - domain - OU
patches
32. Help to make sure devices meet security standards before they are allowed to connect to the network
23
storage area network
simple mail transport protocol
NAC
33. Telnet port
161
SSL
infrastructure based
23
34. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
389
simple network management protocol
SNMP
hardening
35. Protocol for assigning dynamic IP addresses to devices on a network
encrypted file system
storage area network
DHCP
88
36. NAC method where organizations must run the current hardware and operating systems
simple authentication
443
local - site - domain - OU
infrastructure based
37. SNMP port
119
role-based
161
file and print sharing hardening
38. NAC stands for
network access control
file and print sharing hardening
119
security template
39. FTP ports
simple authentication
baselining
20 and 21
open mail relay
40. Define security settings and user's desktop environment on group of computers
DNS hardening
group policies
simple authentication
configuration baselines
41. LDAP authentication method that uses clear text
hardware based
storage area network
simple authentication with security layer LDAPv3
simple authentication
42. MAC stands for ____________ access control
DAC
group policies
DMZ
mandatory
43. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
lightweight directory access protocol
DMZ
configuration management policy
44. EFS stands for...
encrypted file system
role-based
service pack
hardware based
45. SMTP port
25
22
TACACS
DNS poisoning
46. TACACS
DAC
49
Terminal Access Controller Access-Control System
storage area network
47. DAC stands for ____________ access control
Terminal Access Controller Access-Control System
simple authentication with security layer LDAPv3
discretionary
database hardening
48. DNS port
security template
25
dynamic host configuration protocol
53
49. Users granted least amount of access possible that enables them to complete their required work
domain name service
139
Terminal Access Controller Access-Control System
least privileged principle
50. SSH port
22
20 and 21
RBAC
configuration management policy