Annex E Practice Test 2022 (answered & verified) COMPLETE SOLUTION
0 view 0 purchase
Course
Annex E
Institution
Liberty University
_____ are similar to a virus in that is modifies another compute program, injecting its own code. The main difference is that a worm will self-replicate without the users knowledge. - Worms The STIG community includes representatives from___________? - DISA Any message that is encrypted using a pri...
annex e practice test 2022 answered amp verified complete solution
Written for
Liberty University
Annex E
All documents for this subject (2)
Seller
Follow
Classroom
Reviews received
Content preview
Annex E Practice Test 2022 (answered & verified)
COMPLETE SOLUTION
____________ are similar to a virus in that is modifies another compute program, injecting its
own code. The main difference is that a worm will self-replicate without the users knowledge.
Correct Answer: Worms
The STIG community includes representatives from___________? Correct Answer: DISA
Any message that is encrypted using a private key can only be decrypted using a __________?
Correct Answer: Public key
You can request a copy of an HBSS image from DISA who maintains the latest image of HBSS.
Under what resource can you find step-by-step instructions for installing HBSS? Correct
Answer: DOD Patch Repository
T or F. In terms of ACAS, Scan Zones and Repositories are directly connected to each other.
Correct Answer: False
In terms of PKI, select the TWO different types of cryptographic methods used to decrypt and
encrypt data. Correct Answer: Asymmetric-Key Method
Symmetric-Key Method
Asymmetric-Key Method Correct Answer: It includes two keys one is public key and the other
one is private key
Symmetric-Key Method Correct Answer: works exactly the same way your door lock works.
You have one key to lock or open the door
Identify the guidelines used for securing a specific system or application in accordance with DoD
requirements. Correct Answer: STIG
T or F PKI is heavily based on the Single-Tier Model since if PKI was compromised, all of the
issuing certificates would need to be manually removed from the devices. Correct Answer: False
The STIG community includes representatives from________? Correct Answer: DISA
Which component of PKI must be public key enabled instead of using previous technologies,
such as user ID and password? Correct Answer: Systems
You're using a WAN and you have part of your network that is at a remote site. Instead of all the
machines trying to pull new policies across a WAN-link, they instead access a specific machine
on the network that is downloading these updates alone. Correct Answer: SuperAgent
, When a client first initiates communication with the ePO server, the call to the server is at a
randomized interval within the first ________ minutes of startup. Correct Answer: 10 min
When it comes to creating repositories the _____________ assigns scan zones and repositories to
organizations as appropriate. Identify who assigns scan zones by typing in the role into the
provided space. Correct Answer: Administrator
T or F DISA-configured servers will have the SQL server on the same machine as the ePO
application server. Correct Answer: True
STIGs are accompanied by TWO items used to check a system for compliance or automatically
generate reports based on guidelines. Select both items used during this process. Correct Answer:
Scripts
Checklist
If PKI was compromised, all of the issuing certificates need to be manually removed from the
devices. Correct Answer: Single-Tier Mode
If PKI was compromised, you would need to revoke the certificates issued by the compromised
CA and then publish a Certificate Revocation List, and then reissue the certificates. Correct
Answer: Two-Tier Mode
There are TWO ways to issue a wake-up call from an ePO server to a client. The first is directly
from the server, and other way is: Correct Answer: On a Schedule
____________ is a uniform way for different organizations to identify people through their
digital certificates containing public keys. Correct Answer: PKI
Identify the source used to obtain Audit Files for the Security Center
Identify how often the default Agent to Server Communication Interval (ASCI) occurs by typing
the time (in minutes) into the provided space. Correct Answer: 60 min
In a PKI Two-Tier Model, when the Subordinate CA's certificates expired, which CA is brought
online to renew the certificate? Correct Answer: The Root CA
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.