Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ANNEX E DSAC 13 STUDY GUIDE 2022 (VERIFIED ANSWERS)

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
31-10-2022
Written in
2022/2023

STIGs are accompanied by two items used to check a system for compliance or automatically generate reports based on guidelines. Select both items used during this process. - Checklists and Scripts To be sure you know with whom you are communicating. - Authenticity The act of keeping secrets secret. - Confidentiality To be sure nothing is modified behind your back. - Integrity Having the evidence in the event of a dispute. - Non-Repudiation BLANK is a uniform way for different organizations to identify people through their digital certificates containing public keys. - PKI

Show more Read less
Institution
Course

Content preview

ANNEX E DSAC 13 STUDY GUIDE 2022
(VERIFIED ANSWERS)
STIGs are accompanied by two items used to check a system for compliance or automatically
generate reports based on guidelines. Select both items used during this process. Correct Answer:
Checklists and Scripts

To be sure you know with whom you are communicating. Correct Answer: Authenticity

The act of keeping secrets secret. Correct Answer: Confidentiality

To be sure nothing is modified behind your back. Correct Answer: Integrity

Having the evidence in the event of a dispute. Correct Answer: Non-Repudiation

BLANK is a uniform way for different organizations to identify people through their digital
certificates containing public keys. Correct Answer: PKI

As Data Systems Administrators, you will need to be informed on the types of threats we will
face and the tools we have to defend our systems from them. An example of these cyber threats
is: BLANK Correct Answer: Malware

What is the central console for ACAS? Correct Answer: Security Center

When a client first initiates communication with the ePO server, the call to the server is at a
randomized interval within the first BLANK minutes of startup Correct Answer: 10

T or F? You create policies on how each product will behave through the ePO's Group Policy
Management Console. Correct Answer: False

In the DISA builds the ePO contains the BLANK that stores logs, events, and policies. It is also
contains the BLANK which stores all products as well as software that is deployable to the
clients. Correct Answer: SQL Database/Master Respository

T or F? McAfee Agent provides full system protection even without an ePO server. Correct
Answer: False

Can upload Audit Files for Security Center-wide usage. Correct Answer: Administrator

Can upload Audit Files for use amongst a defined user group. Correct Answer: Authorized
Organizational Users

Tenable Network Security Templates Correct Answer: SC 5

DISA STIG Automated Benchmark Correct Answer: .ZIP

, NIST SCAP Checklists Correct Answer: .XCCDF

T or F? In terms of ACAS, Scan Zones and Repositories are directly connected to each other.
Correct Answer: False

The STIG configuration settings are converted to BLANK,, imported into BLANK , and used by
BLANK to audit asset configurations for BLANK Correct Answer: SCAP Content/Security
Center/Nessus Scanners/Compliance

Identify the three sources used to obtain Audit Files for the Security Center. Correct Answer:
DISA STIG Automated Benchmarks
Tenable Network Security Templates (TNST)
NIST SCAP Compliant Checklists

A CAC for an unclassified system may only be used to authenticate your identity in order to
access which network? Correct Answer: NIPR

Which component of PKI must be public key enabled instead of using previous technologies,
such as user ID and password? Correct Answer: Systems

A BLANK reader is the device that reads the information on a CAC. Correct Answer: Smart
Card

If PKI was compromised, all of the issuing certificates need to be manually removed from the
devices. Correct Answer: Singel-Tier Model

If PKI was compromised, you would need to revoke the certificates issued by the compromised
CA and then publish a Certificate Revocation List, and then reissue the certificates. Correct
Answer: Two-Tier Model

The BLANK determines how often the agent checks in with the ePO server. Correct Answer:
Communication Interval(ASCI)

In terms of PKI, select the two different types of cryptographic methods used to decrypt and
encrypt data. Correct Answer: Symmetric-Key Method And Asymmetric-Key Method

Used to obtain Audit Files for the Security Center Correct Answer: DISA STIG Automated
Benchmarks

Identify the two types of encryption when information is sent during a server's ASCI. Correct
Answer: Secure Socket Layer (SSL) And Transport Layer Security (TLS)

Every time a scan is initiated, the scan results are imported into one repository. For how long is
this scan data retained in a repository? Correct Answer: Administrator-defined expirations

Written for

Institution
Course

Document information

Uploaded on
October 31, 2022
Number of pages
5
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$7.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
Follow You need to be logged in order to follow users or courses
Sold
4881
Member since
4 year
Number of followers
3232
Documents
55439
Last sold
12 hours ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1185 reviews

5
624
4
216
3
196
2
40
1
109

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions