DSAC ANNEX E TEST QUESTIONS 2022 (VERIFIED) COMPLETE SOLUTION
1 view 0 purchase
Course
DSAC ANNEX E
Institution
Liberty University
Identify two ways to properly uninstall the McAfee Agent. Select one or more: a. Uninstall the Agent from the ePO System Tree b. Uninstall the Agent from the Client c. Run the Installation Repair tool for the Agent d. Uninstalling the ePO Server to remove all Agents - a. Uninstall the Agent from th...
dsac annex e test questions 2022 verified complete solution
Written for
Liberty University
DSAC ANNEX E
All documents for this subject (4)
Seller
Follow
Classroom
Reviews received
Content preview
DSAC ANNEX E TEST QUESTIONS 2022 (VERIFIED)
COMPLETE SOLUTION
Identify two ways to properly uninstall the McAfee Agent.
Select one or more:
a. Uninstall the Agent from the ePO System Tree
b. Uninstall the Agent from the Client
c. Run the Installation Repair tool for the Agent
d. Uninstalling the ePO Server to remove all Agents Correct Answer: a. Uninstall the Agent
from the ePO System Tree
b. Uninstall the Agent from the Client
_______ is/are located on the individual workstation or the host and uses multiple different
modules to monitor, detect, and counter against known cyber threats.
(Type in the correct answer in the given blank space. You may type the full correct name, or the
acronym.) Correct Answer: HBSS
There are two different types of cryptographic methods used to decrypt and encrypt data. Based
on the given description, match each description to the correct term in the dropdown menus.
Has a Shared Secret and Private Key. Both keys are used to do the same task. The same key that
encrypts can decrypt, and vice versa
Has a Public Key and a Private Key. One key is available to the public, and the other is not. A
message encrypted with one key can only be decrypted by the opposite key.
PKI uses this method for digital encryption and digital signatures Correct Answer: symmetric
key
asymmetric key
asymmetric key
Identify which component of HBSS provides a secure communication channel to the ePO and
manages all other modules that will be installed on the client.
a. McAfee Agent
b. Windows Server Update Service (WSUS)
c. Virtual Private Networks (VPN)
d. Super Agent Update Server (SAUS) Correct Answer: McAfee Agent
A _______ is an ID that can authenticate your identity in order to access the DoD's unclassified
computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt
unclassified email messages and forms. Correct Answer: CAC
There are different ways for an Agent to communicate with the ePO server. For each of the
methods below, identify the term used to describe that method by selecting the correct choice
from the dropdown menus.
, Occurs within a randomized interval within the first ten minutes of startup. The agent will initiate
a communication like to the
Administrators send a Wake-Up call to a machine or group of machines. The individual Agent or
group of Agents will respond in a randomized time interval.
The Agent manually sends information to the ePO server. This is accomplished through the
System Tray Icons, or through the Command Line. Correct Answer: Communication After
Agent Installation
Forcing Agent Activity from the Server
Forcing Activity from the Client
Identify who can upload Audit Files.
Select one:
a. Anyone with the right permissions
b. Only administrators.
c. Only authroized organizational users
d. Any users can upload Audit Files Correct Answer: Anyone with the right permissions
Identify what concept provides a framework that consists of Hardware, Software, People,
Processes, and Policies, that together help identify/solve Information Security problems.
Select one:
a. Public Key Infrastructure (PKI)
b. DISA Cyber Security Solutions (CSS)
c. Information Assurance (IA)
d. The Department of Defense Correct Answer: a. Public Key Infrastructure (PKI)
Identify the four major components of HBSS.
Select one or more:
a. ePolicy Orchestrator (ePO) Server
b. McAfee Agents
c. Distributed Repositories
d. Registered Servers
e. Update Servers
f. Local Repositories
g. Network Monitors Correct Answer: a. ePolicy Orchestrator (ePO) Server
b. McAfee Agents
c. Distributed Repositories
d. Registered Servers
______are kept offline to prevent its Private Key from being compromised. They will then issue
certificates for _____________ which are responsible for issuing certificates for __________.
Correct Answer: Root CA
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.