A ________ is an ID that can authenticate your identity in order to access the DoD's
unclassified computer networks, applications, and websites, as well as to digitally sign,
encrypt, and decrypt unclassified email messages and forms. - Answers- CAC
Identify the components of a Two Tier PKI Model by placing (dragging) a term onto the
provided blank spaces.
_______ are kept offline to prevent its Private Key from being compromised. They will
then issue certificates for __________which are responsible for issuing certificates for
___________.
OPTIONS:
Root CA, Subordinate CA, Computers and Users, Object and Services - Answers- Root
CA, Subordinate CA, Object and Services
contain IP Address and vulnerability information obtained via network synchronization
with a second (off-site) Security Center. - Answers- Remote Repositories
are active repositories of Security Center data collected via scanners attached to the
site's Security Center - Answers- Local Repositories
enables Security Center to obtain repository data via manual file export/import from a
Security Center that is not network-accessible - Answers- Offline Repositories
TRUE OR FALSE The Defense Information Systems Agency Server is responsible for
issuing and authenticating certificates and keys for PKI. - Answers- FALSE
TRUE OR FALSE Repositories are organization-specific - Answers- FALSE
PKI uses this method for digital encryption and digital signatures - Answers-
ASYMMETRIC KEY
Has a Public Key and a Private Key. One key is available to the public, and the other is
not. A message encrypted with one key can only be decrypted by the opposite key. -
Answers- ASYMMETRIC KEY
Has a Shared Secret and Private Key. Both keys are used to do the same task. The
same key that encrypts can decrypt, and vice versa. - Answers- SYMMETRIC KEY
What system is configured and managed locally on a workstation to address known
traffic exploits?
Select one:
a. HBSS
b. ACAS
c. ePO
, d. PKI - Answers- A. HBSS
Identify the five elements of a Common Access Card. Select five options from below.
Select one or more:
a. Password Elements
b. PKI Elements
c. Identification Elements
d. Personal Identification Number Elements
e. Card Management Elements
f. Organization Elements
g. Benefits Elements - Answers- B. PKI ELEMENTS,
C. IDENTIFICATION ELEMENTS,
E. CARD MANAGEMENT ELEMENTS,
F. ORGANIZATION ELEMENTS
G. BENEFITS ELEMENTS
STIGs, checklists, scripts, and other information security-related information are
available at which two of the provided locations?
Select one or more:
a. NIST Computer Security Resource Center
b. Windows Update Service Upstream Servers
c. Department of Defense Information Technology website
d. DISA's Information Assurance website - Answers- A. NIST Computer Security
Resource Center,
D. DISA's Information Assurance website
The agents will continue to enforce the ____ it pulled from the ePO as long as the agent
is running even if it has lost contact with the___. Drag the correct term to the provided
spaces to identify what happens when an Agent loses connectivity.
OPTIONS:
the ePO Server, the HBSS Server, last policy, STIG Policy - Answers- LAST POLICY,
EPO SERVER
TRUE OR FALSE Software, such as Microsoft Outlook, does not need to be public key
enabled to realize the securities that PKI provides. - Answers- FALSE
_______reside on the Security Center and store scan results.
OPTIONS:
NETWORK ATTACHED STORAGE
REPOSITORIES
CERTIFICATE AUTHORITIES
STORAGE AREA NETWORK - Answers- REPOSITORIES
This is a type of malicious software that disguises itself as a regular piece of software. It
works as the intended program would normally
Select one:
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.