A ________ is an ID that can authenticate your identity in order to access the DoD's unclassified
computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt
unclassified email messages and forms. Correct Answer: CAC
Identify the components of a Two Tier PKI Model by placing (dragging) a term onto the
provided blank spaces.
_______ are kept offline to prevent its Private Key from being compromised. They will then
issue certificates for __________which are responsible for issuing certificates for ___________.
OPTIONS:
Root CA, Subordinate CA, Computers and Users, Object and Services Correct Answer: Root
CA, Subordinate CA, Object and Services
contain IP Address and vulnerability information obtained via network synchronization with a
second (off-site) Security Center. Correct Answer: Remote Repositories
are active repositories of Security Center data collected via scanners attached to the site's
Security Center Correct Answer: Local Repositories
enables Security Center to obtain repository data via manual file export/import from a Security
Center that is not network-accessible Correct Answer: Offline Repositories
TRUE OR FALSE The Defense Information Systems Agency Server is responsible for issuing
and authenticating certificates and keys for PKI. Correct Answer: FALSE
TRUE OR FALSE Repositories are organization-specific Correct Answer: FALSE
PKI uses this method for digital encryption and digital signatures Correct Answer:
ASYMMETRIC KEY
Has a Public Key and a Private Key. One key is available to the public, and the other is not. A
message encrypted with one key can only be decrypted by the opposite key. Correct Answer:
ASYMMETRIC KEY
Has a Shared Secret and Private Key. Both keys are used to do the same task. The same key that
encrypts can decrypt, and vice versa. Correct Answer: SYMMETRIC KEY
What system is configured and managed locally on a workstation to address known traffic
exploits?
Select one:
a. HBSS
b. ACAS
c. ePO
d. PKI Correct Answer: HBSS
, Identify the five elements of a Common Access Card. Select five options from below.
Select one or more:
a. Password Elements
b. PKI Elements
c. Identification Elements
d. Personal Identification Number Elements
e. Card Management Elements
f. Organization Elements
g. Benefits Elements Correct Answer: B. PKI ELEMENTS,
C. IDENTIFICATION ELEMENTS,
E. CARD MANAGEMENT ELEMENTS,
F. ORGANIZATION ELEMENTS
G. BENEFITS ELEMENTS
STIGs, checklists, scripts, and other information security-related information are available at
which two of the provided locations?
Select one or more:
a. NIST Computer Security Resource Center
b. Windows Update Service Upstream Servers
c. Department of Defense Information Technology website
d. DISA's Information Assurance website Correct Answer: A. NIST Computer Security
Resource Center,
D. DISA's Information Assurance website
The agents will continue to enforce the ____ it pulled from the ePO as long as the agent is
running even if it has lost contact with the___. Drag the correct term to the provided spaces to
identify what happens when an Agent loses connectivity.
OPTIONS:
the ePO Server, the HBSS Server, last policy, STIG Policy Correct Answer: LAST POLICY,
EPO SERVER
TRUE OR FALSE Software, such as Microsoft Outlook, does not need to be public key enabled
to realize the securities that PKI provides. Correct Answer: FALSE
_______reside on the Security Center and store scan results.
OPTIONS:
NETWORK ATTACHED STORAGE
REPOSITORIES
CERTIFICATE AUTHORITIES
STORAGE AREA NETWORK Correct Answer: REPOSITORIES
This is a type of malicious software that disguises itself as a regular piece of software. It works
as the intended program would normally
Select one:
a. Trojan
b. Ransomware