Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

DSAC ANNEX E STUDY GUIDE 2022 (VERIFIED)

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
31-10-2022
Geschreven in
2022/2023

A ________ is an ID that can authenticate your identity in order to access the DoD's unclassified computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt unclassified email messages and forms. - CAC Identify the components of a Two Tier PKI Model by placing (dragging) a term onto the provided blank spaces. _______ are kept offline to prevent its Private Key from being compromised. They will then issue certificates for __________which are responsible for issuing certificates for ___________. OPTIONS: Root CA, Subordinate CA, Computers and Users, Object and Services - Root CA, Subordinate CA, Object and Services contain IP Address and vulnerability information obtained via network synchronization with a second (off-site) Security Center. - Remote Repositories are active repositories of Security Center data collected via scanners attached to the site's Security Center - Local Repositories

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

DSAC ANNEX E STUDY GUIDE 2022 (VERIFIED)
A ________ is an ID that can authenticate your identity in order to access the DoD's unclassified
computer networks, applications, and websites, as well as to digitally sign, encrypt, and decrypt
unclassified email messages and forms. Correct Answer: CAC

Identify the components of a Two Tier PKI Model by placing (dragging) a term onto the
provided blank spaces.
_______ are kept offline to prevent its Private Key from being compromised. They will then
issue certificates for __________which are responsible for issuing certificates for ___________.
OPTIONS:
Root CA, Subordinate CA, Computers and Users, Object and Services Correct Answer: Root
CA, Subordinate CA, Object and Services

contain IP Address and vulnerability information obtained via network synchronization with a
second (off-site) Security Center. Correct Answer: Remote Repositories

are active repositories of Security Center data collected via scanners attached to the site's
Security Center Correct Answer: Local Repositories

enables Security Center to obtain repository data via manual file export/import from a Security
Center that is not network-accessible Correct Answer: Offline Repositories

TRUE OR FALSE The Defense Information Systems Agency Server is responsible for issuing
and authenticating certificates and keys for PKI. Correct Answer: FALSE

TRUE OR FALSE Repositories are organization-specific Correct Answer: FALSE

PKI uses this method for digital encryption and digital signatures Correct Answer:
ASYMMETRIC KEY

Has a Public Key and a Private Key. One key is available to the public, and the other is not. A
message encrypted with one key can only be decrypted by the opposite key. Correct Answer:
ASYMMETRIC KEY

Has a Shared Secret and Private Key. Both keys are used to do the same task. The same key that
encrypts can decrypt, and vice versa. Correct Answer: SYMMETRIC KEY

What system is configured and managed locally on a workstation to address known traffic
exploits?
Select one:
a. HBSS
b. ACAS
c. ePO
d. PKI Correct Answer: HBSS

, Identify the five elements of a Common Access Card. Select five options from below.
Select one or more:
a. Password Elements
b. PKI Elements
c. Identification Elements
d. Personal Identification Number Elements
e. Card Management Elements
f. Organization Elements
g. Benefits Elements Correct Answer: B. PKI ELEMENTS,
C. IDENTIFICATION ELEMENTS,
E. CARD MANAGEMENT ELEMENTS,
F. ORGANIZATION ELEMENTS
G. BENEFITS ELEMENTS

STIGs, checklists, scripts, and other information security-related information are available at
which two of the provided locations?
Select one or more:
a. NIST Computer Security Resource Center
b. Windows Update Service Upstream Servers
c. Department of Defense Information Technology website
d. DISA's Information Assurance website Correct Answer: A. NIST Computer Security
Resource Center,
D. DISA's Information Assurance website

The agents will continue to enforce the ____ it pulled from the ePO as long as the agent is
running even if it has lost contact with the___. Drag the correct term to the provided spaces to
identify what happens when an Agent loses connectivity.
OPTIONS:
the ePO Server, the HBSS Server, last policy, STIG Policy Correct Answer: LAST POLICY,
EPO SERVER

TRUE OR FALSE Software, such as Microsoft Outlook, does not need to be public key enabled
to realize the securities that PKI provides. Correct Answer: FALSE

_______reside on the Security Center and store scan results.
OPTIONS:
NETWORK ATTACHED STORAGE
REPOSITORIES
CERTIFICATE AUTHORITIES
STORAGE AREA NETWORK Correct Answer: REPOSITORIES

This is a type of malicious software that disguises itself as a regular piece of software. It works
as the intended program would normally
Select one:
a. Trojan
b. Ransomware

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
31 oktober 2022
Aantal pagina's
5
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$7.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Classroom NURSING
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4875
Lid sinds
4 jaar
Aantal volgers
3232
Documenten
55421
Laatst verkocht
5 uur geleden
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Lees meer Lees minder
4.0

1185 beoordelingen

5
624
4
216
3
196
2
40
1
109

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen