Annex E quiz and practice written test questions and answers 2023 with complete solution
2 views 0 purchase
Course
Annex E
Institution
Annex E
Annex E quiz and practice written test questions and answers 2023 with complete solution
STIGs are accompanied by two items used to check a system for compliance or automatically generate reports based on guidelines. Select both items used during this process.
Checklists; scripts
You are more ...
annex e quiz and practice written test questions and answers 2023 with complete solution stigs are accompanied by two items used to check a system for compliance or automatically generate reports bas
Written for
Annex E
All documents for this subject (6)
Seller
Follow
LECTMAGGY
Reviews received
Content preview
Annex E quiz and practice written test questions and
answers 2023 with complete solution
STIGs are accompanied by two items used to check a system for compliance or
automatically generate reports based on guidelines. Select both items used
during this process.
Checklists; scripts
You are more likely to receive certification from _______________ if you have
configured your systems in accordance with the recommendations in a STIG.
DISA
a uniform way for different organizations to identify people through their digital
certificates containing public keys
PKI
As Data Systems Administrators, you will need to be informed on the types of
threats we will face and the tools we have to defend our systems from them. An
example of these cyber threats is:
Malware/spyware/adware/worm/trojan/social engineers/virus
PKI protects the confidentiality, integrity, authenticity, and non-repudiation of
data.
Having the evidence in the event of a dispute.
non-repudiation
PKI protects the confidentiality, integrity, authenticity, and non-repudiation of
data.
To be sure you know with whom you are communicating.
Authenticity
PKI protects the confidentiality, integrity, authenticity, and non-repudiation of
data.
The act of keeping secrets secret.
Confidentially
PKI protects the confidentiality, integrity, authenticity, and non-repudiation of
data.
To be sure nothing is modified behind your back
Integrity
What is the central console for ACAS?
Security Center
The STIG community includes representatives from:
(Type in any of the STIG Community Representatives listed in the Student
Handouts. You may type in full names or acronyms.)
DISA/NSA/OSD/Combatant Commands/Military Services/NIST
, T F: You create policies on how each product will behave through the ePO's
Group Policy Management Console.
FALSE; created on ePO's web interface
There are two ways to issue a wake-up call from an ePO server to a client. The
first is directly from the server, and other way is:
on a schedule
T F: HBSS is a DoD-Specific security system that's unique to the military and only
provided by the Defense Information Systems Agency (DISA).
FALSE; HBSS is COTS
The ______________________ determines how often the agent checks in with the
ePO server.
ASCI
In the DISA builds the ePO contains the _______________ that stores logs,
events, and policies.
It is also contains the _________________ which stores all products as well as
software that is deployable to the clients.
SQL database; master repository
When a client first initiates communication with the ePO server, the call to the
server is at a randomized interval within the first ______________ minutes of
startup.
10
T F: McAfee Agent provides full system protection even without an ePO server.
False; McAfee itself offers no protection
You can request a copy of an HBSS image from DISA who maintains the latest
image of HBSS. Under what resource can you find step-by-step instructions for
installing HBSS?
DoD patch repository
Identify the three sources used to obtain Audit Files for the Security Center.
Select each correct option from the list below.
Tenable network security templates (SC 5)
DISA STIG automated benchmarks (.zip)
SCAP compliant checklists from NIST (.xccdf).
When it comes to uploading audit files, they can be uploaded by anyone with the
right permissions.
Can upload Audit Files for Security Center-wide usage.
Administrators
When it comes to uploading audit files, they can be uploaded by anyone with the
right permissions.
Can upload Audit Files for use amongst a defined user group.
Unauthorized Organizational Users
The STIG configuration settings are converted to _________________ , imported
into _______________ , and used by _______________ to audit asset
configurations for ___________________.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LECTMAGGY. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.29. You're not tied to anything after your purchase.