Comptia Security +: Os Hardening MCQs

Comptia Security +: Os Hardening MCQs

Our team has conducted extensive research to compile a set of Comptia Security +: Os Hardening MCQs. We encourage you to test your Comptia Security +: Os Hardening knowledge by answering these 30 multiple-choice questions provided below.
Simply scroll down to begin!

1: LDAP authentication method that uses clear text

A.   RBAC

B.   Simple authentication

C.   Baselining

D.   Storage area network

2: TACACS port

A.   49

B.   Network attached storage

C.   110

D.   Network news transfer protocol

3: Highly configurable - discretionary - job based access control - more flexible that MAC - more precise that groups

A.   110

B.   RBAC

C.   Discretionary

D.   161

4: Start with the most secure environment - the loosen the controls as needed

A.   500

B.   Rule of least privilege

C.   80

D.   DMZ

5: LDAP stands for...

A.   Lightweight directory access protocol

B.   DAC

C.   Simple network management protocol

D.   DNS hardening

6: Enable and monitor logs - perform regular backups - use file encryption - enable account lockout and strong user name and password

A.   Encrypted file system

B.   DMZ

C.   File and print sharing hardening

D.   Simple authentication

7: A cryptographic protocol that provides security for communications over networks such as the Internet

A.   22

B.   SNMP

C.   SSL

D.   49

8: A subnet on the network that separates the internal network from publicly exposed hosts

A.   Network attached storage

B.   DNS hardening

C.   DMZ

D.   Security template

9: Isolate directories - place server in DMZ - disallow anonymous access - audit logs - and review contents for unauthorized material

A.   FTP hardening

B.   Hardware based

C.   Hotfix

D.   389

10: EFS stands for...

A.   RBAC

B.   Network news transfer protocol

C.   Hotfix

D.   Encrypted file system

11: TACACS

A.   Terminal Access Controller Access-Control System

B.   Network access control

C.   500

D.   Organizational unit

12: NAC method where organizations must run the current hardware and operating systems

A.   RBAC

B.   Discretionary

C.   Infrastructure based

D.   Encrypted file system

13: SSH port

A.   NAC

B.   TACACS

C.   Organizational unit

D.   22

14: Making the OS less vulnerable to threats

A.   System hardening

B.   RBAC

C.   NAC

D.   Hardening

15: Four ways to implement group policies

A.   Local - site - domain - OU

B.   Domain name service

C.   23

D.   Network attached storage

16: SAN stands for...

A.   DAC

B.   Storage area network

C.   MAC

D.   DAC

17: IPSec port

A.   Mandatory

B.   Discretionary

C.   Role-based

D.   500

18: Restrict zone transfers to designated servers - restrict users via ACLs who can query zone records - do not use recursive queries

A.   Infrastructure based

B.   DNS hardening

C.   Hardware based

D.   OS hardening

19: LDAP port

A.   DHCP hardening

B.   389

C.   23

D.   Simple mail transport protocol

20: DHCP stands for...

A.   Hardening

B.   RBAC

C.   Dynamic host configuration protocol

D.   161

21: SMTP port

A.   25

B.   DMZ

C.   Lightweight directory access protocol

D.   22

22: NNTP stands for

A.   Security template

B.   53

C.   80

D.   Network news transfer protocol

23: NAC method requiring installation of a network appliance to monitor network devices and limit connectivity should non compliant activity be detected

A.   System hardening

B.   DNS poisoning

C.   Hardware based

D.   49

24: File system that offers limited security and was primarily designed for desktop use

A.   Storage area network

B.   FAT

C.   Group policies

D.   Infrastructure based

25: SNMP stand for...

A.   Simple network management protocol

B.   DNS hardening

C.   389

D.   Discretionary

26: Is a UDP-based network protocol - used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention

A.   Hardening

B.   Least privileged principle

C.   SNMP

D.   TACACS

27: Defining the software and hardware components that can be used in an organization

A.   110

B.   Configuration management policy

C.   DMZ

D.   NAC

28: POP3 port

A.   Rule of least privilege

B.   110

C.   Dynamic host configuration protocol

D.   MAC

29: FTP ports

A.   20 and 21

B.   Lightweight directory access protocol

C.   FTP hardening

D.   Domain name service

30: Issued by software vendors to fix bugs - address security issues or add functionality

A.   Patches

B.   139

C.   Network attached storage

D.   80