Package deal
Bundle for DSAC ANNEX Tests
Bundle for DSAC ANNEX Tests
[Show more]Bundle for DSAC ANNEX Tests
[Show more]Identify two ways to properly uninstall the McAfee Agent. Select one or more: a. Uninstall the Agent from the ePO System Tree b. Uninstall the Agent from the Client c. Run the Installation Repair tool for the Agent d. Uninstalling the ePO Server to remove all Agents - a. Uninstall the Agent from the...
Preview 2 out of 6 pages
Add to cartIdentify two ways to properly uninstall the McAfee Agent. Select one or more: a. Uninstall the Agent from the ePO System Tree b. Uninstall the Agent from the Client c. Run the Installation Repair tool for the Agent d. Uninstalling the ePO Server to remove all Agents - a. Uninstall the Agent from the...
_____ are similar to a virus in that is modifies another compute program, injecting its own code. The main difference is that a worm will self-replicate without the users knowledge. - Worms The STIG community includes representatives from___________? - DISA Any message that is encrypted using a priv...
Preview 2 out of 7 pages
Add to cart_____ are similar to a virus in that is modifies another compute program, injecting its own code. The main difference is that a worm will self-replicate without the users knowledge. - Worms The STIG community includes representatives from___________? - DISA Any message that is encrypted using a priv...
STIGs are accompanied by two items used to check a system for compliance or automatically generate reports based on guidelines. Select both items used during this process. - Checklists and Scripts To be sure you know with whom you are communicating. - Authenticity The act of keeping secrets secret. ...
Preview 2 out of 5 pages
Add to cartSTIGs are accompanied by two items used to check a system for compliance or automatically generate reports based on guidelines. Select both items used during this process. - Checklists and Scripts To be sure you know with whom you are communicating. - Authenticity The act of keeping secrets secret. ...
A ________ is an ID that can authenticate your identity in order to access the DoD's unclassified computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt unclassified email messages and forms. - CAC Identify the components of a Two Tier PKI Model by placing...
Preview 2 out of 5 pages
Add to cartA ________ is an ID that can authenticate your identity in order to access the DoD's unclassified computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt unclassified email messages and forms. - CAC Identify the components of a Two Tier PKI Model by placing...
CSM (Communications Security Module) Correct Answer: Encrypts/Decrypts & Sends/Receives 
 
LSM (LAN Services Module) Correct Answer: End Device Plug-in 
 
LEM (LAN Extension Module) Correct Answer: Extension of LSM 
 
WSM (V1) (WAN Services Module) Correct Answer: Carries Router, different back ...
Preview 2 out of 6 pages
Add to cartCSM (Communications Security Module) Correct Answer: Encrypts/Decrypts & Sends/Receives 
 
LSM (LAN Services Module) Correct Answer: End Device Plug-in 
 
LEM (LAN Extension Module) Correct Answer: Extension of LSM 
 
WSM (V1) (WAN Services Module) Correct Answer: Carries Router, different back ...
The Tripp Lite is a 120 V AC, 50-60 Hz,________Amperes power strip with six output receptacles Correct Answer: 15 
 
KG-175D TACLANE Correct Answer: Tunnel Encryption 
 
KIV-7M Correct Answer: Line Encrytption 
 
Test the construction of a Cat 5 Cable Correct Answer: Network Cable Tester 
 
Mil-...
Preview 1 out of 2 pages
Add to cartThe Tripp Lite is a 120 V AC, 50-60 Hz,________Amperes power strip with six output receptacles Correct Answer: 15 
 
KG-175D TACLANE Correct Answer: Tunnel Encryption 
 
KIV-7M Correct Answer: Line Encrytption 
 
Test the construction of a Cat 5 Cable Correct Answer: Network Cable Tester 
 
Mil-...
Network Correct Answer: system of computers, or devices, that are joined together so they can communicate by exchanging information and sharing resources 
 
Routers Correct Answer: deviced used to interconnect two or more data communications networks 
 
Switch Correct Answer: device used to inter...
Preview 1 out of 4 pages
Add to cartNetwork Correct Answer: system of computers, or devices, that are joined together so they can communicate by exchanging information and sharing resources 
 
Routers Correct Answer: deviced used to interconnect two or more data communications networks 
 
Switch Correct Answer: device used to inter...
ISO 
[NOTE: not iso file] Correct Answer: International Organization for Standardization 
[Ref. DS.02.01 Server Part I, page. 13] 
 
ICMP Correct Answer: Internet Control Message Protocol 
 
SNMP Correct Answer: Solarwinds Network Performance Manager 
 
OSI Correct Answer: Open Systems Interconn...
Preview 2 out of 9 pages
Add to cartISO 
[NOTE: not iso file] Correct Answer: International Organization for Standardization 
[Ref. DS.02.01 Server Part I, page. 13] 
 
ICMP Correct Answer: Internet Control Message Protocol 
 
SNMP Correct Answer: Solarwinds Network Performance Manager 
 
OSI Correct Answer: Open Systems Interconn...
alexander Graham Bell Correct Answer: furthered his fathers work on visible speech for the deaf. 
 
telephony Correct Answer: the technology associated with electronic transmission of voice, fax, and other info between distant parties 
 
telephone Correct Answer: a handheld device containing both...
Preview 1 out of 3 pages
Add to cartalexander Graham Bell Correct Answer: furthered his fathers work on visible speech for the deaf. 
 
telephony Correct Answer: the technology associated with electronic transmission of voice, fax, and other info between distant parties 
 
telephone Correct Answer: a handheld device containing both...
Holds database on a local level. There can be many of these on a network for scalability and manageability purposes, phones are normally pointed towards these____ Correct Answer: SUBSCRIBER 
 
Holds the authoritative database for configuration. There can only be one of these on the network. It repl...
Preview 1 out of 4 pages
Add to cartHolds database on a local level. There can be many of these on a network for scalability and manageability purposes, phones are normally pointed towards these____ Correct Answer: SUBSCRIBER 
 
Holds the authoritative database for configuration. There can only be one of these on the network. It repl...
Microsoft Exchange Requirements Correct Answer: 64-bit CPU architecture, 
2 CPU cores, 
8 GB RAM (recommended), 
1.2 GB free space for files, 
30 GB on install drive + 500 MB for each language, 
200 MB on system drive, 
additional space for mail servers 
NTFS file system 
 
Microsoft Exchange...
Preview 1 out of 4 pages
Add to cartMicrosoft Exchange Requirements Correct Answer: 64-bit CPU architecture, 
2 CPU cores, 
8 GB RAM (recommended), 
1.2 GB free space for files, 
30 GB on install drive + 500 MB for each language, 
200 MB on system drive, 
additional space for mail servers 
NTFS file system 
 
Microsoft Exchange...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
No, you only buy these notes for $15.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
75323 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now