SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four ways to implement group policies
DAC
local - site - domain - OU
open mail relay
hotfix
2. LDAP authentication method not recommended
DMZ
SNMP
anonymous authentication
network attached storage
3. Issued by software vendors to fix bugs - address security issues or add functionality
25
22
patches
53
4. NAC stands for
network news transfer protocol
SSL
network access control
patches
5. Help to make sure devices meet security standards before they are allowed to connect to the network
500
DNS hardening
NAC
group policies
6. HTTP SSL port
443
simple authentication with security layer LDAPv3
role-based
389
7. NNTP port
119
endpoint based
53
lightweight directory access protocol
8. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
database hardening
file and print sharing hardening
DHCP hardening
80
9. Users granted least amount of access possible that enables them to complete their required work
security template
least privileged principle
network access control
storage area network
10. IPSec port
simple network management protocol
500
system hardening
NAC
11. LDAP authentication method that uses clear text
simple authentication
DAC
DAC
hardening
12. SMTP port
25
20 and 21
139
simple network management protocol
13. EFS stands for...
database hardening
119
20 and 21
encrypted file system
14. NAC method where organizations must run the current hardware and operating systems
RBAC
infrastructure based
DMZ
discretionary
15. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
DAC
mandatory
139
OS hardening
16. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
local - site - domain - OU
TACACS
dynamic host configuration protocol
least privileged principle
17. SSH port
RBAC
TACACS
22
RBAC
18. DNS stands for...
endpoint based
simple authentication
rule of least privilege
domain name service
19. RBAC stands for ____________ access control
role-based
389
DHCP
domain name service
20. HTTP port
88
TACACS
80
simple authentication with security layer LDAPv3
21. POP3 port
domain name service
anonymous authentication
110
network access control
22. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
rule of least privilege
NAC
database hardening
TACACS
23. FTP ports
simple network management protocol
NAC
23
20 and 21
24. DHCP stands for...
dynamic host configuration protocol
MAC
configuration management policy
DMZ
25. Making the OS less vulnerable to threats
simple network management protocol
hardening
110
network attached storage
26. File system that offers limited security and was primarily designed for desktop use
110
FAT
configuration management policy
161
27. Defining the software and hardware components that can be used in an organization
local - site - domain - OU
simple authentication
configuration management policy
simple authentication with security layer LDAPv3
28. LDAP stands for...
lightweight directory access protocol
DNS poisoning
443
RBAC
29. Telnet port
139
MAC
161
23
30. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
110
database hardening
network news transfer protocol
31. An accumulated set of software updates or hotfixes from Microsoft
service pack
infrastructure based
lightweight directory access protocol
DAC
32. kerberos port
hardening
88
MAC
least privileged principle
33. MAC stands for ____________ access control
FAT
DMZ
mandatory
infrastructure based
34. The process of establishing a standard for security
baselining
simple mail transport protocol
25
80
35. Microsoft software packages that contain one or more patches and can be applied without rebooting
hotfix
hardening
TACACS
open mail relay
36. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
TACACS
database hardening
MAC
open mail relay
37. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
role-based
SNMP
80
open mail relay
38. Access control defined by roles or job functions
RBAC
service pack
mandatory
patches
39. SAN stands for...
TACACS
NNTP
domain name service
storage area network
40. Most restrictive access control method that uses security labels to control access
23
anonymous authentication
161
MAC
41. LDAP port
DNS poisoning
RBAC
139
389
42. NetBIOS port
DNS hardening
DAC
group policies
139
43. Protocol for assigning dynamic IP addresses to devices on a network
DMZ
RBAC
encrypted file system
DHCP
44. OU stands for...
organizational unit
mandatory
RBAC
patches
45. Access control method used by organizations that have a high turn over
network attached storage
file and print sharing hardening
RBAC
FTP hardening
46. Access control method that uses ACLs
configuration management policy
TACACS
group policies
DAC
47. DNS port
DHCP
53
simple network management protocol
configuration management policy
48. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
lightweight directory access protocol
infrastructure based
SNMP
DNS hardening
49. TACACS
database hardening
RBAC
Terminal Access Controller Access-Control System
simple authentication
50. SMTP port
anonymous authentication
49
rule of least privilege
25