SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Os Hardening
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A DNS server is fed altered or spoofed records that are retained and then duplicated elsewhere
139
20 and 21
DNS poisoning
anonymous authentication
2. The process of establishing a standard for security
configuration baselines
baselining
dynamic host configuration protocol
endpoint based
3. SSH port
dynamic host configuration protocol
group policies
22
NAC
4. Users granted least amount of access possible that enables them to complete their required work
DNS hardening
110
simple authentication
least privileged principle
5. DNS port
53
file and print sharing hardening
lightweight directory access protocol
20 and 21
6. Protocol for assigning dynamic IP addresses to devices on a network
FTP hardening
DHCP
network access control
DNS hardening
7. EFS stands for...
SSL
configuration management policy
encrypted file system
network access control
8. OU stands for...
hardening
organizational unit
service pack
DMZ
9. POP3 port
22
110
configuration baselines
infrastructure based
10. Recommended LDAP authentication
least privileged principle
TACACS
DMZ
simple authentication with security layer LDAPv3
11. Transferable access controls applied and controlled by the object owner
DAC
139
MAC
hardening
12. An accumulated set of software updates or hotfixes from Microsoft
local - site - domain - OU
simple network management protocol
service pack
anonymous authentication
13. NNTP port
discretionary
RBAC
SNMP
119
14. Defining the software and hardware components that can be used in an organization
configuration management policy
DMZ
25
simple authentication with security layer LDAPv3
15. MAC stands for ____________ access control
TACACS
22
DNS poisoning
mandatory
16. IPSec port
119
443
infrastructure based
500
17. LDAP port
infrastructure based
389
baselining
DHCP
18. Access control defined by roles or job functions
RBAC
database hardening
simple authentication
SNMP
19. RBAC stands for ____________ access control
role-based
simple authentication with security layer LDAPv3
file and print sharing hardening
security template
20. TACACS port
443
least privileged principle
49
119
21. Four ways to implement group policies
infrastructure based
local - site - domain - OU
RBAC
file and print sharing hardening
22. SNMP port
161
RBAC
mandatory
DNS hardening
23. Bind MAC addresses of network devices to IP address - monitor logs - apply security patches - use IDS and strong authentication to detect rogue servers
encrypted file system
simple network management protocol
110
DHCP hardening
24. Help to make sure devices meet security standards before they are allowed to connect to the network
119
NAC
encrypted file system
TACACS
25. DHCP stands for...
lightweight directory access protocol
dynamic host configuration protocol
role-based
110
26. SMTP port
25
least privileged principle
group policies
configuration baselines
27. Most restrictive access control method that uses security labels to control access
infrastructure based
MAC
network news transfer protocol
SNMP
28. HTTP port
25
DHCP hardening
simple network management protocol
80
29. Allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network
least privileged principle
TACACS
139
DNS poisoning
30. LDAP authentication method that uses clear text
DAC
NNTP
DNS poisoning
simple authentication
31. NAS stands for...
RBAC
network attached storage
open mail relay
database hardening
32. Misconfiguration of an email server that could allow it to be used by an attacker to spread spam
NNTP
least privileged principle
open mail relay
role-based
33. FTP ports
simple authentication
network attached storage
SNMP
20 and 21
34. Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password
domain name service
encrypted file system
file and print sharing hardening
role-based
35. A cryptographic protocol that provides security for communications over networks such as the Internet
49
RBAC
SSL
SNMP
36. Contain possible security settings that can control one or multiple computers
389
security template
SSL
simple network management protocol
37. Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries
DNS hardening
endpoint based
domain name service
encrypted file system
38. Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material
DMZ
FTP hardening
88
20 and 21
39. SMTP stands for...
22
simple mail transport protocol
139
discretionary
40. LDAP stands for...
DMZ
NAC
SNMP
lightweight directory access protocol
41. SNMP stand for...
NNTP
25
simple network management protocol
storage area network
42. Define security settings and user's desktop environment on group of computers
49
mandatory
group policies
88
43. HTTP SSL port
DAC
simple authentication
443
hotfix
44. Access control method used by organizations that have a high turn over
25
simple authentication with security layer LDAPv3
RBAC
88
45. Used to deliver news articles to users on the Internet - vulnerable to DoS attacks
NNTP
configuration management policy
110
configuration baselines
46. DNS stands for...
security template
domain name service
hardware based
DMZ
47. Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention
RBAC
SNMP
FTP hardening
infrastructure based
48. TACACS
simple network management protocol
Terminal Access Controller Access-Control System
53
service pack
49. NAC stands for
161
hardening
network access control
RBAC
50. LDAP authentication method not recommended
NNTP
anonymous authentication
RBAC
configuration baselines