100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
DSAC ANNEX E STUDY GUIDE 2022 (VERIFIED) $7.49   Add to cart

Exam (elaborations)

DSAC ANNEX E STUDY GUIDE 2022 (VERIFIED)

 2 views  0 purchase
  • Course
  • Institution

A ________ is an ID that can authenticate your identity in order to access the DoD's unclassified computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt unclassified email messages and forms. - CAC Identify the components of a Two Tier PKI Model by placing...

[Show more]

Preview 2 out of 5  pages

  • October 31, 2022
  • 5
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
DSAC ANNEX E STUDY GUIDE 2022 (VERIFIED)
A ________ is an ID that can authenticate your identity in order to access the DoD's unclassified
computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt
unclassified email messages and forms. Correct Answer: CAC

Identify the components of a Two Tier PKI Model by placing (dragging) a term onto the
provided blank spaces.
_______ are kept offline to prevent its Private Key from being compromised. They will then
issue certificates for __________which are responsible for issuing certificates for ___________.
OPTIONS:
Root CA, Subordinate CA, Computers and Users, Object and Services Correct Answer: Root
CA, Subordinate CA, Object and Services

contain IP Address and vulnerability information obtained via network synchronization with a
second (off-site) Security Center. Correct Answer: Remote Repositories

are active repositories of Security Center data collected via scanners attached to the site's
Security Center Correct Answer: Local Repositories

enables Security Center to obtain repository data via manual file export/import from a Security
Center that is not network-accessible Correct Answer: Offline Repositories

TRUE OR FALSE The Defense Information Systems Agency Server is responsible for issuing
and authenticating certificates and keys for PKI. Correct Answer: FALSE

TRUE OR FALSE Repositories are organization-specific Correct Answer: FALSE

PKI uses this method for digital encryption and digital signatures Correct Answer:
ASYMMETRIC KEY

Has a Public Key and a Private Key. One key is available to the public, and the other is not. A
message encrypted with one key can only be decrypted by the opposite key. Correct Answer:
ASYMMETRIC KEY

Has a Shared Secret and Private Key. Both keys are used to do the same task. The same key that
encrypts can decrypt, and vice versa. Correct Answer: SYMMETRIC KEY

What system is configured and managed locally on a workstation to address known traffic
exploits?
Select one:
a. HBSS
b. ACAS
c. ePO
d. PKI Correct Answer: HBSS

, Identify the five elements of a Common Access Card. Select five options from below.
Select one or more:
a. Password Elements
b. PKI Elements
c. Identification Elements
d. Personal Identification Number Elements
e. Card Management Elements
f. Organization Elements
g. Benefits Elements Correct Answer: B. PKI ELEMENTS,
C. IDENTIFICATION ELEMENTS,
E. CARD MANAGEMENT ELEMENTS,
F. ORGANIZATION ELEMENTS
G. BENEFITS ELEMENTS

STIGs, checklists, scripts, and other information security-related information are available at
which two of the provided locations?
Select one or more:
a. NIST Computer Security Resource Center
b. Windows Update Service Upstream Servers
c. Department of Defense Information Technology website
d. DISA's Information Assurance website Correct Answer: A. NIST Computer Security
Resource Center,
D. DISA's Information Assurance website

The agents will continue to enforce the ____ it pulled from the ePO as long as the agent is
running even if it has lost contact with the___. Drag the correct term to the provided spaces to
identify what happens when an Agent loses connectivity.
OPTIONS:
the ePO Server, the HBSS Server, last policy, STIG Policy Correct Answer: LAST POLICY,
EPO SERVER

TRUE OR FALSE Software, such as Microsoft Outlook, does not need to be public key enabled
to realize the securities that PKI provides. Correct Answer: FALSE

_______reside on the Security Center and store scan results.
OPTIONS:
NETWORK ATTACHED STORAGE
REPOSITORIES
CERTIFICATE AUTHORITIES
STORAGE AREA NETWORK Correct Answer: REPOSITORIES

This is a type of malicious software that disguises itself as a regular piece of software. It works
as the intended program would normally
Select one:
a. Trojan
b. Ransomware

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77824 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.49
  • (0)
  Add to cart