SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SSH port
TACACS
110
22
119
2. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
Terminal Access Controller Access-Control System
RBAC
domain name service
3. Transferable access controls applied and controlled by the object owner
group policies
baselining
DAC
discretionary
4. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
encrypted file system
FAT
TACACS
endpoint based
5. Recommended LDAP authentication
NNTP
simple authentication with security layer LDAPv3
DAC
161
6. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
161
MAC
DNS poisoning
22
7. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
hardening
443
endpoint based
database hardening
8. OU stands for...
hotfix
least privileged principle
organizational unit
rule of least privilege
9. HTTP SSL port
simple authentication with security layer LDAPv3
system hardening
simple authentication
443
10. kerberos port
88
dynamic host configuration protocol
patches
hardware based
11. Define security settings and user's desktop environment on group of computers
group policies
patches
network news transfer protocol
DHCP hardening
12. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
RBAC
OS hardening
443
53
13. LDAP authentication method that uses clear text
RBAC
open mail relay
simple authentication
20 and 21
14. Access control defined by roles or job functions
encrypted file system
RBAC
network access control
database hardening
15. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
file and print sharing hardening
endpoint based
TACACS
rule of least privilege
16. SMTP port
25
NAC
SSL
network attached storage
17. A subnet on the network that separates the internal network from publicly exposed hosts
DMZ
discretionary
domain name service
baselining
18. Microsoft software packages that contain one or more patches and can be applied without rebooting
security template
SNMP
119
hotfix
19. IPSec port
DAC
simple network management protocol
500
simple authentication with security layer LDAPv3
20. SNMP port
161
organizational unit
20 and 21
simple authentication
21. Centrally managed NAC method requiring installation of software agents on each network client
network news transfer protocol
SNMP
network access control
endpoint based
22. SAN stands for...
simple authentication with security layer LDAPv3
simple network management protocol
storage area network
110
23. Locking down the system
database hardening
Terminal Access Controller Access-Control System
system hardening
open mail relay
24. TACACS port
80
49
161
500
25. DNS port
MAC
RBAC
53
network access control
26. MAC stands for ____________ access control
mandatory
network access control
anonymous authentication
least privileged principle
27. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
service pack
DHCP hardening
rule of least privilege
domain name service
28. Standard setup used when configuring machines - provide a starting point and consistent setup
hardware based
network access control
configuration baselines
local - site - domain - OU
29. LDAP port
389
system hardening
49
RBAC
30. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
23
FAT
53
NNTP
31. Issued by software vendors to fix bugs - address security issues or add functionality
53
discretionary
patches
23
32. A cryptographic protocol that provides security for communications over networks such as the Internet
open mail relay
SSL
simple mail transport protocol
DAC
33. Users granted least amount of access possible that enables them to complete their required work
NNTP
configuration management policy
53
least privileged principle
34. DAC stands for ____________ access control
80
network attached storage
simple network management protocol
discretionary
35. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
hardware based
infrastructure based
139
22
36. SMTP stands for...
simple mail transport protocol
network access control
SSL
organizational unit
37. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
TACACS
hardware based
endpoint based
139
38. NetBIOS port
139
hardening
hotfix
mandatory
39. Making the OS less vulnerable to threats
network attached storage
500
hardening
database hardening
40. LDAP stands for...
lightweight directory access protocol
service pack
RBAC
file and print sharing hardening
41. Four ways to implement group policies
system hardening
service pack
161
local - site - domain - OU
42. Access control method that uses ACLs
TACACS
49
storage area network
DAC
43. NNTP stands for
anonymous authentication
OS hardening
network news transfer protocol
DHCP
44. LDAP authentication method not recommended
TACACS
anonymous authentication
database hardening
DNS poisoning
45. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
389
open mail relay
file and print sharing hardening
DAC
46. EFS stands for...
baselining
encrypted file system
network attached storage
DHCP hardening
47. An accumulated set of software updates or hotfixes from Microsoft
NNTP
DNS poisoning
SNMP
service pack
48. Help to make sure devices meet security standards before they are allowed to connect to the network
NAC
DAC
file and print sharing hardening
hotfix
49. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
configuration baselines
RBAC
least privileged principle
dynamic host configuration protocol
50. HTTP port
80
161
anonymous authentication
security template