SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SMTP port
25
RBAC
database hardening
NAC
2. Making the OS less vulnerable to threats
network news transfer protocol
hardening
DMZ
hardware based
3. Access permissions applied by the owner of an object using ACLs - commonly found on PCs
role-based
80
DAC
22
4. Transferable access controls applied and controlled by the object owner
MAC
SSL
system hardening
DAC
5. LDAP authentication method that uses clear text
simple authentication
simple mail transport protocol
TACACS
domain name service
6. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
DMZ
local - site - domain - OU
Terminal Access Controller Access-Control System
7. POP3 port
RBAC
110
local - site - domain - OU
53
8. Define security settings and user's desktop environment on group of computers
group policies
lightweight directory access protocol
49
500
9. HTTP port
configuration baselines
80
49
MAC
10. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
MAC
DHCP hardening
file and print sharing hardening
49
11. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
TACACS
rule of least privilege
DAC
encrypted file system
12. Access control defined by roles or job functions
domain name service
patches
RBAC
161
13. NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected
RBAC
hardware based
DAC
53
14. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
open mail relay
simple authentication with security layer LDAPv3
NAC
25
15. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
NAC
25
group policies
FTP hardening
16. NAC method where organizations must run the current hardware and operating systems
file and print sharing hardening
MAC
TACACS
infrastructure based
17. LDAP port
DAC
389
80
hotfix
18. OU stands for...
DHCP hardening
110
least privileged principle
organizational unit
19. Microsoft software packages that contain one or more patches and can be applied without rebooting
NNTP
DMZ
hotfix
53
20. NAC stands for
NAC
network access control
OS hardening
configuration baselines
21. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
SNMP
443
RBAC
88
22. NAS stands for...
least privileged principle
389
network attached storage
88
23. TACACS port
49
RBAC
group policies
53
24. DAC stands for ____________ access control
119
discretionary
FAT
NAC
25. TACACS
80
Terminal Access Controller Access-Control System
security template
service pack
26. Most restrictive access control method that uses security labels to control access
161
MAC
20 and 21
NNTP
27. Telnet port
RBAC
RBAC
23
119
28. Reduce the possibility of a breach by locking down the file system - controlling software installation and use - limiting access - disabling unnecessary services and applying patches -
database hardening
network access control
OS hardening
patches
29. EFS stands for...
encrypted file system
group policies
RBAC
FTP hardening
30. SSH port
hotfix
22
infrastructure based
configuration baselines
31. SNMP port
500
161
110
80
32. Access control method used by organizations that have a high turn over
storage area network
RBAC
SSL
DAC
33. Label-based - hard coded access controls - at multiple levels - applied to all objects
119
MAC
database hardening
domain name service
34. DNS port
file and print sharing hardening
53
Terminal Access Controller Access-Control System
FTP hardening
35. Standard setup used when configuring machines - provide a starting point and consistent setup
security template
configuration baselines
least privileged principle
database hardening
36. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
baselining
25
DNS hardening
system hardening
37. Start with the most secure environment - the loosen the controls as needed
DNS hardening
53
DAC
rule of least privilege
38. RBAC stands for ____________ access control
389
role-based
88
RBAC
39. NNTP stands for
23
49
configuration baselines
network news transfer protocol
40. NNTP port
119
simple authentication
role-based
RBAC
41. Defining the software and hardware components that can be used in an organization
DAC
group policies
FTP hardening
configuration management policy
42. LDAP stands for...
lightweight directory access protocol
simple mail transport protocol
domain name service
DNS hardening
43. Locking down the system
simple authentication with security layer LDAPv3
NNTP
system hardening
80
44. LDAP authentication method not recommended
Terminal Access Controller Access-Control System
anonymous authentication
53
NAC
45. HTTP SSL port
88
open mail relay
TACACS
443
46. The process of establishing a standard for security
simple authentication
baselining
service pack
network attached storage
47. Four ways to implement group policies
domain name service
local - site - domain - OU
80
500
48. A remote authentication protocol used to communicate with an authentication server commonly used in UNIX networks.
DNS hardening
domain name service
TACACS
simple authentication with security layer LDAPv3
49. Access control method that uses ACLs
discretionary
389
DAC
TACACS
50. Contain possible security settings that can control one or multiple computers
161
DHCP
local - site - domain - OU
security template