Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

DSAC ANNEX E TEST QUESTIONS 2022 (VERIFIED) COMPLETE SOLUTION

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
31-10-2022
Written in
2022/2023

Identify two ways to properly uninstall the McAfee Agent. Select one or more: a. Uninstall the Agent from the ePO System Tree b. Uninstall the Agent from the Client c. Run the Installation Repair tool for the Agent d. Uninstalling the ePO Server to remove all Agents - a. Uninstall the Agent from the ePO System Tree b. Uninstall the Agent from the Client _______ is/are located on the individual workstation or the host and uses multiple different modules to monitor, detect, and counter against known cyber threats. (Type in the correct answer in the given blank space. You may type the full correct name, or the acronym.) - HBSS There are two different types of cryptographic methods used to decrypt and encrypt data. Based on the given description, match each description to the correct term in the dropdown menus. Has a Shared Secret and Private Key. Both keys are used to do the same task. The same key that encrypts can decrypt, and vice versa

Show more Read less
Institution
Course

Content preview

DSAC ANNEX E TEST QUESTIONS 2022 (VERIFIED)
COMPLETE SOLUTION
Identify two ways to properly uninstall the McAfee Agent.
Select one or more:
a. Uninstall the Agent from the ePO System Tree
b. Uninstall the Agent from the Client
c. Run the Installation Repair tool for the Agent
d. Uninstalling the ePO Server to remove all Agents Correct Answer: a. Uninstall the Agent
from the ePO System Tree
b. Uninstall the Agent from the Client

_______ is/are located on the individual workstation or the host and uses multiple different
modules to monitor, detect, and counter against known cyber threats.
(Type in the correct answer in the given blank space. You may type the full correct name, or the
acronym.) Correct Answer: HBSS

There are two different types of cryptographic methods used to decrypt and encrypt data. Based
on the given description, match each description to the correct term in the dropdown menus.

Has a Shared Secret and Private Key. Both keys are used to do the same task. The same key that
encrypts can decrypt, and vice versa

Has a Public Key and a Private Key. One key is available to the public, and the other is not. A
message encrypted with one key can only be decrypted by the opposite key.

PKI uses this method for digital encryption and digital signatures Correct Answer: symmetric
key
asymmetric key
asymmetric key

Identify which component of HBSS provides a secure communication channel to the ePO and
manages all other modules that will be installed on the client.

a. McAfee Agent
b. Windows Server Update Service (WSUS)
c. Virtual Private Networks (VPN)
d. Super Agent Update Server (SAUS) Correct Answer: McAfee Agent

A _______ is an ID that can authenticate your identity in order to access the DoD's unclassified
computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt
unclassified email messages and forms. Correct Answer: CAC

There are different ways for an Agent to communicate with the ePO server. For each of the
methods below, identify the term used to describe that method by selecting the correct choice
from the dropdown menus.

, Occurs within a randomized interval within the first ten minutes of startup. The agent will initiate
a communication like to the

Administrators send a Wake-Up call to a machine or group of machines. The individual Agent or
group of Agents will respond in a randomized time interval.

The Agent manually sends information to the ePO server. This is accomplished through the
System Tray Icons, or through the Command Line. Correct Answer: Communication After
Agent Installation

Forcing Agent Activity from the Server

Forcing Activity from the Client

Identify who can upload Audit Files.
Select one:
a. Anyone with the right permissions
b. Only administrators.
c. Only authroized organizational users
d. Any users can upload Audit Files Correct Answer: Anyone with the right permissions

Identify what concept provides a framework that consists of Hardware, Software, People,
Processes, and Policies, that together help identify/solve Information Security problems.
Select one:
a. Public Key Infrastructure (PKI)
b. DISA Cyber Security Solutions (CSS)
c. Information Assurance (IA)
d. The Department of Defense Correct Answer: a. Public Key Infrastructure (PKI)

Identify the four major components of HBSS.
Select one or more:
a. ePolicy Orchestrator (ePO) Server
b. McAfee Agents
c. Distributed Repositories
d. Registered Servers
e. Update Servers
f. Local Repositories
g. Network Monitors Correct Answer: a. ePolicy Orchestrator (ePO) Server
b. McAfee Agents
c. Distributed Repositories
d. Registered Servers

______are kept offline to prevent its Private Key from being compromised. They will then issue
certificates for _____________ which are responsible for issuing certificates for __________.
Correct Answer: Root CA

Written for

Institution
Course

Document information

Uploaded on
October 31, 2022
Number of pages
6
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
Follow You need to be logged in order to follow users or courses
Sold
4875
Member since
4 year
Number of followers
3232
Documents
55424
Last sold
4 hours ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1185 reviews

5
624
4
216
3
196
2
40
1
109

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions