Annex D: Security (Hbss + Acas)
Questions And Answers With Verified
Solutions 100% Correct!!! Latest
Updated 2024
Security Technical Information Guide (STIG) - ANSWER✔✔ A carefully crafted
document that includes not only DoD policies and security regulations, but also
up-todate best practices and configuration guidelines. These guidelines are used
for securing a specific system or application in accordance with DoD
requirements.
Host-Based Security Systems (HBSS) - ANSWER✔✔ A host based security system,
which means it is located on the individual workstation or the host. Uses multiple
different modules to monitor, detect, and counter against known cyber threats.
Assured Compliance Assessment Solution (ACAS) - ANSWER✔✔ Consists of a suite
of products to include Red Hat Enterprise Linux, Security Center, Nessus Scanner
and the Nessus Network Monitor (formerly the Passive Vulnerability Scanner)
which is provided by DISA to DoD Customers.
Public Key Infrastructure (PKI) - ANSWER✔✔ A framework that consists of
hardware, software, people, processes, and policies, that together helps identify
and solve information security problems for you by establishing safe and reliable
environment for electronic transactions in the internet.
Public Key Encryption - ANSWER✔✔ Protects the confidentiality, integrity,
authenticity and non-repudiation of data.
, Why do we use HBSS - ANSWER✔✔ US Cyber Command (USCYBERCOM)
mandates that HBSS be installed on every DoD system.
HBSS Components - ANSWER✔✔ ePolicy Orchestrator Server, the McAfee Agent,
the distributed repositories, and the registered servers.
McAfee Agent - ANSWER✔✔ Its job is to provide a secure communication channel
to the ePO and manages all of the other modules that will be installed on the
client machine (VSE, HIPS, etc.).
Agent to Server Communication Interval (ASCI) - ANSWER✔✔ Determines how
often the agent checks in with the ePO. Default is 60 minutes.
Agent to Server Communication (ASCI) - ANSWER✔✔ Encrypted communication
using Secure Sockets Layer (SSL) or Transport Layer Security (TLS). All encryption is
128-bit strength and, except for Mac OS X, is FIPS 140-2 compliant.
Wake-up calls - ANSWER✔✔ When the ePO forces the managed machine to
initiate an ASCI outside of its normal interval.
ACAS Repositories - ANSWER✔✔ Proprietary data files, residing on the security
center, that store scan results. Every time a scan is initiated, the scan results are
imported into one repository.
ACAS Repository Types - ANSWER✔✔ Local, Remote, and Offline Repositories
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller classhub. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R213,45. You're not tied to anything after your purchase.