ANNEX E DSAC 13 STUDY GUIDE 2022 (VERIFIED ANSWERS)
1 view 0 purchase
Course
ANNEX E DSAC 13
Institution
Liberty University
STIGs are accompanied by two items used to check a system for compliance or automatically generate reports based on guidelines. Select both items used during this process. - Checklists and Scripts To be sure you know with whom you are communicating. - Authenticity The act of keeping secrets secret....
ANNEX E DSAC 13 STUDY GUIDE 2022
(VERIFIED ANSWERS)
STIGs are accompanied by two items used to check a system for compliance or automatically
generate reports based on guidelines. Select both items used during this process. Correct Answer:
Checklists and Scripts
To be sure you know with whom you are communicating. Correct Answer: Authenticity
The act of keeping secrets secret. Correct Answer: Confidentiality
To be sure nothing is modified behind your back. Correct Answer: Integrity
Having the evidence in the event of a dispute. Correct Answer: Non-Repudiation
BLANK is a uniform way for different organizations to identify people through their digital
certificates containing public keys. Correct Answer: PKI
As Data Systems Administrators, you will need to be informed on the types of threats we will
face and the tools we have to defend our systems from them. An example of these cyber threats
is: BLANK Correct Answer: Malware
What is the central console for ACAS? Correct Answer: Security Center
When a client first initiates communication with the ePO server, the call to the server is at a
randomized interval within the first BLANK minutes of startup Correct Answer: 10
T or F? You create policies on how each product will behave through the ePO's Group Policy
Management Console. Correct Answer: False
In the DISA builds the ePO contains the BLANK that stores logs, events, and policies. It is also
contains the BLANK which stores all products as well as software that is deployable to the
clients. Correct Answer: SQL Database/Master Respository
T or F? McAfee Agent provides full system protection even without an ePO server. Correct
Answer: False
Can upload Audit Files for Security Center-wide usage. Correct Answer: Administrator
Can upload Audit Files for use amongst a defined user group. Correct Answer: Authorized
Organizational Users
DISA STIG Automated Benchmark Correct Answer: .ZIP
, NIST SCAP Checklists Correct Answer: .XCCDF
T or F? In terms of ACAS, Scan Zones and Repositories are directly connected to each other.
Correct Answer: False
The STIG configuration settings are converted to BLANK,, imported into BLANK , and used by
BLANK to audit asset configurations for BLANK Correct Answer: SCAP Content/Security
Center/Nessus Scanners/Compliance
Identify the three sources used to obtain Audit Files for the Security Center. Correct Answer:
DISA STIG Automated Benchmarks
Tenable Network Security Templates (TNST)
NIST SCAP Compliant Checklists
A CAC for an unclassified system may only be used to authenticate your identity in order to
access which network? Correct Answer: NIPR
Which component of PKI must be public key enabled instead of using previous technologies,
such as user ID and password? Correct Answer: Systems
A BLANK reader is the device that reads the information on a CAC. Correct Answer: Smart
Card
If PKI was compromised, all of the issuing certificates need to be manually removed from the
devices. Correct Answer: Singel-Tier Model
If PKI was compromised, you would need to revoke the certificates issued by the compromised
CA and then publish a Certificate Revocation List, and then reissue the certificates. Correct
Answer: Two-Tier Model
The BLANK determines how often the agent checks in with the ePO server. Correct Answer:
Communication Interval(ASCI)
In terms of PKI, select the two different types of cryptographic methods used to decrypt and
encrypt data. Correct Answer: Symmetric-Key Method And Asymmetric-Key Method
Used to obtain Audit Files for the Security Center Correct Answer: DISA STIG Automated
Benchmarks
Identify the two types of encryption when information is sent during a server's ASCI. Correct
Answer: Secure Socket Layer (SSL) And Transport Layer Security (TLS)
Every time a scan is initiated, the scan results are imported into one repository. For how long is
this scan data retained in a repository? Correct Answer: Administrator-defined expirations
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.