SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Access control method that uses ACLs
configuration management policy
OS hardening
DAC
lightweight directory access protocol
2. TACACS port
49
storage area network
discretionary
53
3. RBAC stands for ____________ access control
file and print sharing hardening
role-based
49
network news transfer protocol
4. Start with the most secure environment - the loosen the controls as needed
23
network news transfer protocol
infrastructure based
rule of least privilege
5. Protocol for assigning dynamic IP addresses to devices on a network
DHCP
MAC
endpoint based
25
6. Centrally managed NAC method requiring installation of software agents on each network client
service pack
NNTP
endpoint based
88
7. NAS stands for...
role-based
simple network management protocol
110
network attached storage
8. Access control method used by organizations that have a high turn over
baselining
139
20 and 21
RBAC
9. IPSec port
500
49
TACACS
MAC
10. EFS stands for...
database hardening
hardening
organizational unit
encrypted file system
11. Defining the software and hardware components that can be used in an organization
domain name service
simple authentication
configuration management policy
NAC
12. NNTP port
security template
hotfix
simple mail transport protocol
119
13. Making the OS less vulnerable to threats
DAC
DAC
hardening
lightweight directory access protocol
14. LDAP stands for...
DAC
DNS poisoning
389
lightweight directory access protocol
15. SMTP port
25
20 and 21
database hardening
500
16. A subnet on the network that separates the internal network from publicly exposed hosts
DNS poisoning
DMZ
simple authentication
OS hardening
17. Define security settings and user's desktop environment on group of computers
20 and 21
hardware based
group policies
domain name service
18. Contain possible security settings that can control one or multiple computers
simple authentication
configuration baselines
rule of least privilege
security template
19. DAC stands for ____________ access control
configuration management policy
endpoint based
discretionary
storage area network
20. The process of establishing a standard for security
FTP hardening
hotfix
baselining
443
21. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
SNMP
NAC
DAC
security template
22. OU stands for...
DAC
organizational unit
53
security template
23. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
DMZ
NAC
hardware based
FTP hardening
24. Most restrictive access control method that uses security labels to control access
endpoint based
SSL
lightweight directory access protocol
MAC
25. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
open mail relay
DHCP hardening
161
configuration baselines
26. Recommended LDAP authentication
patches
Terminal Access Controller Access-Control System
443
simple authentication with security layer LDAPv3
27. FTP ports
20 and 21
22
TACACS
group policies
28. HTTP SSL port
hardening
RBAC
443
RBAC
29. Standard setup used when configuring machines - provide a starting point and consistent setup
configuration baselines
group policies
hardware based
DNS poisoning
30. An accumulated set of software updates or hotfixes from Microsoft
network access control
service pack
role-based
DHCP hardening
31. NNTP stands for
110
25
network news transfer protocol
NAC
32. SNMP stand for...
network access control
MAC
MAC
simple network management protocol
33. A cryptographic protocol that provides security for communications over networks such as the Internet
500
OS hardening
SSL
endpoint based
34. NetBIOS port
139
local - site - domain - OU
endpoint based
110
35. LDAP authentication method not recommended
anonymous authentication
network attached storage
161
88
36. MAC stands for ____________ access control
500
mandatory
DHCP
open mail relay
37. TACACS
endpoint based
organizational unit
group policies
Terminal Access Controller Access-Control System
38. Issued by software vendors to fix bugs - address security issues or add functionality
patches
SSL
110
endpoint based
39. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
simple mail transport protocol
network news transfer protocol
database hardening
DHCP hardening
40. kerberos port
MAC
88
22
hardening
41. SSH port
80
22
SSL
443
42. DNS port
open mail relay
SSL
SNMP
53
43. SMTP stands for...
simple network management protocol
simple mail transport protocol
database hardening
dynamic host configuration protocol
44. NAC stands for
network access control
hotfix
DNS poisoning
88
45. Telnet port
119
23
organizational unit
OS hardening
46. Transferable access controls applied and controlled by the object owner
simple mail transport protocol
organizational unit
DAC
least privileged principle
47. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
configuration baselines
TACACS
lightweight directory access protocol
DHCP
48. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
database hardening
DMZ
file and print sharing hardening
mandatory
49. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
OS hardening
161
discretionary
hardening
50. HTTP port
25
baselining
80
discretionary