SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DNS port
NNTP
baselining
110
53
2. Access control method that uses ACLs
dynamic host configuration protocol
hotfix
MAC
DAC
3. Users granted least amount of access possible that enables them to complete their required work
110
configuration management policy
discretionary
least privileged principle
4. TACACS
Terminal Access Controller Access-Control System
MAC
80
SSL
5. NAS stands for...
patches
simple authentication
SNMP
network attached storage
6. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
simple authentication with security layer LDAPv3
TACACS
discretionary
anonymous authentication
7. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
system hardening
hardware based
DNS poisoning
OS hardening
8. DAC stands for ____________ access control
80
dynamic host configuration protocol
DHCP
discretionary
9. Disable default accounts and passwords - regular backups - enable auditing features - monitor user privileges - implement authentication for users and applications
simple authentication
patches
database hardening
RBAC
10. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
119
patches
FTP hardening
161
11. Recommended LDAP authentication
443
simple authentication with security layer LDAPv3
FAT
simple network management protocol
12. Telnet port
dynamic host configuration protocol
20 and 21
23
configuration management policy
13. SSH port
system hardening
22
MAC
DAC
14. Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups
RBAC
500
443
encrypted file system
15. Protocol for assigning dynamic IP addresses to devices on a network
443
hardware based
DHCP
MAC
16. DHCP stands for...
443
dynamic host configuration protocol
system hardening
rule of least privilege
17. LDAP port
389
service pack
RBAC
baselining
18. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
hotfix
file and print sharing hardening
DHCP hardening
NNTP
19. FTP ports
lightweight directory access protocol
20 and 21
22
simple network management protocol
20. The process of establishing a standard for security
configuration baselines
119
baselining
DAC
21. Start with the most secure environment - the loosen the controls as needed
rule of least privilege
storage area network
organizational unit
443
22. kerberos port
SSL
88
110
infrastructure based
23. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
49
139
open mail relay
DAC
24. DNS stands for...
49
domain name service
hardware based
SSL
25. SMTP port
encrypted file system
25
MAC
mandatory
26. EFS stands for...
DHCP
open mail relay
500
encrypted file system
27. An accumulated set of software updates or hotfixes from Microsoft
DAC
service pack
local - site - domain - OU
mandatory
28. Most restrictive access control method that uses security labels to control access
simple authentication
MAC
389
configuration baselines
29. Issued by software vendors to fix bugs - address security issues or add functionality
53
patches
infrastructure based
dynamic host configuration protocol
30. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
network access control
configuration management policy
encrypted file system
DHCP hardening
31. SMTP port
file and print sharing hardening
FAT
25
139
32. Four ways to implement group policies
local - site - domain - OU
simple mail transport protocol
FTP hardening
DNS poisoning
33. NAC stands for
network access control
23
organizational unit
configuration baselines
34. Help to make sure devices meet security standards before they are allowed to connect to the network
DAC
open mail relay
53
NAC
35. MAC stands for ____________ access control
mandatory
25
baselining
DHCP hardening
36. IPSec port
88
443
110
500
37. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
FAT
file and print sharing hardening
baselining
DMZ
38. SAN stands for...
baselining
configuration baselines
system hardening
storage area network
39. A cryptographic protocol that provides security for communications over networks such as the Internet
80
SSL
SNMP
least privileged principle
40. NetBIOS port
SSL
139
simple authentication with security layer LDAPv3
DAC
41. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
configuration management policy
110
file and print sharing hardening
TACACS
42. SNMP port
DHCP hardening
role-based
161
patches
43. Transferable access controls applied and controlled by the object owner
DAC
139
FAT
lightweight directory access protocol
44. RBAC stands for ____________ access control
role-based
80
DMZ
system hardening
45. A subnet on the network that separates the internal network from publicly exposed hosts
role-based
110
DMZ
domain name service
46. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
simple network management protocol
DHCP hardening
configuration baselines
DNS hardening
47. Contain possible security settings that can control one or multiple computers
network attached storage
lightweight directory access protocol
22
security template
48. Centrally managed NAC method requiring installation of software agents on each network client
organizational unit
53
endpoint based
NAC
49. LDAP authentication method not recommended
anonymous authentication
SSL
hardware based
FAT
50. Locking down the system
storage area network
system hardening
20 and 21
NNTP