100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DSAC ANNEX E QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
03-11-2024
Written in
2024/2025

DSAC ANNEX E QUESTIONS AND ANSWERS

Institution
DSAC 25 ANNEX
Module
DSAC 25 ANNEX

Content preview

DSAC ANNEX E QUESTIONS AND ANSWERS
The STIG configuration settings are converted to _____, imported into ____ , and used
by ____________ to audit asset configurations for ____ - Answers- SCRAP content
Security Center
Nessus Scanners
Compliance

malware - Answers- type of sofewware that is designed to attack a system
used to damage system files, provide access to systems, disable or even take control of
computers

spyware - Answers- software that keeps track of a users activity on a computer.
then it sends the info to another entity without th user's consent

virus - Answers- most common type of malware. it modifies another computer program
and inserts its own code. The affected area are then considered "infected"

worms - Answers- similar to virus; it modifies another computer program, injecting its
own code.

social engineering - Answers- when a person pretends to be someone else in order to
get info about a network or system.
info is then used t attack the system to steal data

STIG - Answers- Security Technical Information Guide

STIG - Answers- document that includes DOD policies and security regulations, best
practices and config guidelines.
used for securing a specific system or application in accordance with DoD
requirements.
help you configure your systems for security and compliance with government
Information Assurance (IA) requirements.
- how the government expects you to operate

worm and virus diff - Answers- The main difference is that a worm will self-replicate
without the users knowledge.

trojan - Answers- type of malicious software that disguises itself as a regular piece of
software. works as intended program would normally. begins to cause problems such as
killing background processes or deleting data.

what does stig help avoid? - Answers- help avoid and detect intrusion, respond to and
recover from security breaches if they occur, and implement security policies. provide
guidance to ensure that your applications will be in compliance with DoD requirements.
You can save significant time and money

, DISA - Answers- Defense Information Systems Agency,

PKI - Answers- a public key infractructure, a framework that consists of hardware
software, software, people, processes, and policies, that together helps identify and
solve information security problems for you by establishing safe and reliable
environment for electronic transactions. It uses PUBLIC KEY ENCRYPTION techniques
to protect the confidentiality, integrity, authenticity and non-repudiation of data. PKI is a
uniform way for different organizations to identify people through their digital certificates
containing public keys.

Stig locations - Answers- includes representatives from DISA; the National Security
Agency, or NSA; the Office of the Secretary of Defense, or OSD; combatant commands;
military services; the National Institute of Standards and Technology, or NIST; and other
organizations.

FSO - Answers- Field Security Operations

FSO - Answers- decide which new STIGs should written and which existing STIGs
should be updated. These decisions are based on market trends, technological
changes, customer requirements, and DoD policy and guidance.

How often are STIGS updated - Answers- New checklists come out the fourth Friday of
each month. incorporate the latest vulnerability notices and security patches

HBSS - Answers- Host-Based Security Systems

HBSS - Answers- a host based security system, which means it is located on the
individual workstation or the host. Also a COTS product. uses multiple different modules
to MONITOR, DETECT, COUNTER against known cyber threats. The system is
configured and managed locally to address known traffic exploits.

ACAS - Answers- Assured Compliance Assessment Solution

ACAS - Answers- consists of a suite of products to include Red Hat Enterprise Linux,
Security Center, Nessus Scanner and the Nessus Network Monitor

Security Center - Answers- central console for ACAS.

Security Center - Answers- offers the ability to automate scale an organization's
vulnerability and compliance scanning infrastructure, provide capabilities to allow for
management, alerting, and reporting against vulnerability and compliance requirements.

Nessus - Answers- fully capable scanner covers a breadth of checks, including unique
Common Vulnerabilities and Exposures (CVEs), and successfully operates across
different environments.

Written for

Institution
DSAC 25 ANNEX
Module
DSAC 25 ANNEX

Document information

Uploaded on
November 3, 2024
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2045
Member since
4 year
Number of followers
1446
Documents
50847
Last sold
1 day ago

3.8

351 reviews

5
176
4
61
3
45
2
16
1
53

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions