100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
DSAC ANNEX E QUESTIONS AND ANSWERS $10.99   Add to cart

Exam (elaborations)

DSAC ANNEX E QUESTIONS AND ANSWERS

 3 views  0 purchase
  • Course
  • DSAC 25 ANNEX
  • Institution
  • DSAC 25 ANNEX

DSAC ANNEX E QUESTIONS AND ANSWERS

Preview 2 out of 5  pages

  • November 3, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • DSAC 25 ANNEX
  • DSAC 25 ANNEX
avatar-seller
GEEKA
DSAC ANNEX E QUESTIONS AND ANSWERS

A ________ is an ID that can authenticate your identity in order to access the DoD's
unclassified computer networks, applications, and websites, as well as to digitally sign,
encrypt, and decrypt unclassified email messages and forms. - Answers- CAC

Identify the components of a Two Tier PKI Model by placing (dragging) a term onto the
provided blank spaces.
_______ are kept offline to prevent its Private Key from being compromised. They will
then issue certificates for __________which are responsible for issuing certificates for
___________.
OPTIONS:
Root CA, Subordinate CA, Computers and Users, Object and Services - Answers- Root
CA, Subordinate CA, Object and Services

contain IP Address and vulnerability information obtained via network synchronization
with a second (off-site) Security Center. - Answers- Remote Repositories

are active repositories of Security Center data collected via scanners attached to the
site's Security Center - Answers- Local Repositories

enables Security Center to obtain repository data via manual file export/import from a
Security Center that is not network-accessible - Answers- Offline Repositories

TRUE OR FALSE The Defense Information Systems Agency Server is responsible for
issuing and authenticating certificates and keys for PKI. - Answers- FALSE

TRUE OR FALSE Repositories are organization-specific - Answers- FALSE

PKI uses this method for digital encryption and digital signatures - Answers-
ASYMMETRIC KEY

Has a Public Key and a Private Key. One key is available to the public, and the other is
not. A message encrypted with one key can only be decrypted by the opposite key. -
Answers- ASYMMETRIC KEY

Has a Shared Secret and Private Key. Both keys are used to do the same task. The
same key that encrypts can decrypt, and vice versa. - Answers- SYMMETRIC KEY

What system is configured and managed locally on a workstation to address known
traffic exploits?
Select one:
a. HBSS
b. ACAS
c. ePO

, d. PKI - Answers- A. HBSS

Identify the five elements of a Common Access Card. Select five options from below.
Select one or more:
a. Password Elements
b. PKI Elements
c. Identification Elements
d. Personal Identification Number Elements
e. Card Management Elements
f. Organization Elements
g. Benefits Elements - Answers- B. PKI ELEMENTS,
C. IDENTIFICATION ELEMENTS,
E. CARD MANAGEMENT ELEMENTS,
F. ORGANIZATION ELEMENTS
G. BENEFITS ELEMENTS

STIGs, checklists, scripts, and other information security-related information are
available at which two of the provided locations?
Select one or more:
a. NIST Computer Security Resource Center
b. Windows Update Service Upstream Servers
c. Department of Defense Information Technology website
d. DISA's Information Assurance website - Answers- A. NIST Computer Security
Resource Center,
D. DISA's Information Assurance website

The agents will continue to enforce the ____ it pulled from the ePO as long as the agent
is running even if it has lost contact with the___. Drag the correct term to the provided
spaces to identify what happens when an Agent loses connectivity.
OPTIONS:
the ePO Server, the HBSS Server, last policy, STIG Policy - Answers- LAST POLICY,
EPO SERVER

TRUE OR FALSE Software, such as Microsoft Outlook, does not need to be public key
enabled to realize the securities that PKI provides. - Answers- FALSE

_______reside on the Security Center and store scan results.
OPTIONS:
NETWORK ATTACHED STORAGE
REPOSITORIES
CERTIFICATE AUTHORITIES
STORAGE AREA NETWORK - Answers- REPOSITORIES

This is a type of malicious software that disguises itself as a regular piece of software. It
works as the intended program would normally
Select one:

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart