Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Annex E Practice Test 2022 (answered & verified) COMPLETE SOLUTION

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
31-10-2022
Written in
2022/2023

_____ are similar to a virus in that is modifies another compute program, injecting its own code. The main difference is that a worm will self-replicate without the users knowledge. - Worms The STIG community includes representatives from___________? - DISA Any message that is encrypted using a private key can only be decrypted using a __________? - Public key You can request a copy of an HBSS image from DISA who maintains the latest image of HBSS. Under what resource can you find step-by-step instructions for installing HBSS? - DOD Patch Repository T or F. In terms of ACAS, Scan Zones and Repositories are directly connected to each other. - False In terms of PKI, select the TWO different types of cryptographic methods used to decrypt and encrypt data. - Asymmetric-Key Method Symmetric-Key Method Asymmetric-Key Method - It includes two keys one is public key and the other one is private key Symmetric-Key Method - works exactly the same way your door lock works. You have one key to lock or open the door

Show more Read less
Institution
Course

Content preview

Annex E Practice Test 2022 (answered & verified)
COMPLETE SOLUTION
____________ are similar to a virus in that is modifies another compute program, injecting its
own code. The main difference is that a worm will self-replicate without the users knowledge.
Correct Answer: Worms

The STIG community includes representatives from___________? Correct Answer: DISA

Any message that is encrypted using a private key can only be decrypted using a __________?
Correct Answer: Public key

You can request a copy of an HBSS image from DISA who maintains the latest image of HBSS.
Under what resource can you find step-by-step instructions for installing HBSS? Correct
Answer: DOD Patch Repository

T or F. In terms of ACAS, Scan Zones and Repositories are directly connected to each other.
Correct Answer: False

In terms of PKI, select the TWO different types of cryptographic methods used to decrypt and
encrypt data. Correct Answer: Asymmetric-Key Method
Symmetric-Key Method

Asymmetric-Key Method Correct Answer: It includes two keys one is public key and the other
one is private key

Symmetric-Key Method Correct Answer: works exactly the same way your door lock works.
You have one key to lock or open the door

Identify the guidelines used for securing a specific system or application in accordance with DoD
requirements. Correct Answer: STIG

T or F PKI is heavily based on the Single-Tier Model since if PKI was compromised, all of the
issuing certificates would need to be manually removed from the devices. Correct Answer: False

The STIG community includes representatives from________? Correct Answer: DISA

Which component of PKI must be public key enabled instead of using previous technologies,
such as user ID and password? Correct Answer: Systems

You're using a WAN and you have part of your network that is at a remote site. Instead of all the
machines trying to pull new policies across a WAN-link, they instead access a specific machine
on the network that is downloading these updates alone. Correct Answer: SuperAgent

, When a client first initiates communication with the ePO server, the call to the server is at a
randomized interval within the first ________ minutes of startup. Correct Answer: 10 min

When it comes to creating repositories the _____________ assigns scan zones and repositories to
organizations as appropriate. Identify who assigns scan zones by typing in the role into the
provided space. Correct Answer: Administrator

T or F DISA-configured servers will have the SQL server on the same machine as the ePO
application server. Correct Answer: True

STIGs are accompanied by TWO items used to check a system for compliance or automatically
generate reports based on guidelines. Select both items used during this process. Correct Answer:
Scripts
Checklist

If PKI was compromised, all of the issuing certificates need to be manually removed from the
devices. Correct Answer: Single-Tier Mode

If PKI was compromised, you would need to revoke the certificates issued by the compromised
CA and then publish a Certificate Revocation List, and then reissue the certificates. Correct
Answer: Two-Tier Mode

There are TWO ways to issue a wake-up call from an ePO server to a client. The first is directly
from the server, and other way is: Correct Answer: On a Schedule

____________ is a uniform way for different organizations to identify people through their
digital certificates containing public keys. Correct Answer: PKI

Identify the source used to obtain Audit Files for the Security Center

NIST SCAP Compliant Checklists Correct Answer: .xccdf

Identify the source used to obtain Audit Files for the Security Center

DISA STIG Automated Benchmarks Correct Answer: .zip

Identify the source used to obtain Audit Files for the Security Center

Tenable Network Security Templates (TNST) Correct Answer: SC 5

Identify how often the default Agent to Server Communication Interval (ASCI) occurs by typing
the time (in minutes) into the provided space. Correct Answer: 60 min

In a PKI Two-Tier Model, when the Subordinate CA's certificates expired, which CA is brought
online to renew the certificate? Correct Answer: The Root CA

Written for

Institution
Course

Document information

Uploaded on
October 31, 2022
Number of pages
7
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
Follow You need to be logged in order to follow users or courses
Sold
4874
Member since
4 year
Number of followers
3232
Documents
55394
Last sold
1 day ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1185 reviews

5
624
4
216
3
196
2
40
1
109

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions