LL

¡Supera tus tareas y exámenes ahora con Quizwiz!

Microsoft offers solution for PKI that is a collection of roles services used to design the PKI for an organization what is Microsoft PKI solution

Active Directory Certificate Service

The agent manually sends information to the ePO server. This is accomplished through the systems tray I cons, or through the command line.

Agent to server communication interval

Has a public key and a private key one key is available to the public and the other is not. A message encrypted with one key can only be decrypted by the opposite key.

Asymmetric Key

PKI uses this method for digital encryption and digital signatures Asymmetric Key

Asymmetric Key

Identify the five elements of a common access card. Select five options from below

Benefit elements, identification elements, Card management elements, organization elements, PKI elements

Occur within a randomized interval within the first ten minutes of startup. The agent will initiate a communication like to the ePO

Communication after agent installation

Installs HBSS and provides an up to date image for you use. Identify who provides you with an HBSS

DISA

STIGS checklist, script and other information security related information are available at which teo of the provided locations?

DISA,NIST

HBSS allows us to decentralize the administrator of security tools

False

Repositions are organization specific

False

Repositories are organization specific

False

Software such as Microsoft Outlook does not need to be public key enabled to realize the securities that PKI provides

False

the defense information systems agency server is responsible for issuing and authenticating certificates and keys for PKI

False

administrator sends a wake up call to a machine or group of machines. The individual agent or group of agents will respond in a randomized time interval

Forcing agent activity from the server

PKI has 5 components (people, software, tokens, certificates, and keys) that work together to ensure

Information security

are active repositories of security center data collected via scanners attached to the sites security center

Local repositories

Type of software that is designed specifically to attack a system

Malware

Identify what HBSS module initials all point products and listens for new policies and product updates.

McAfee Agent

identify which components of HBSS provides a secure communication channel to the ePO and manages all other modules that will be installed on client.

McAfee Agent

Its job is to provide a secure communication channel to the ePO

Mcfee agent

In ACAS what product monitors network traffic in real time

NESSUS network

Enable security center to obtain repository data via manual file export/import from a security center that is not network accessible

Offline Repositories

Identify what concept provides a framework that consist of hardware, Software, people, processes and policies, that together help identify/solve information security problems

Public Key infrastructure(PKI)

Contains IP address and vulnerability information obtained via network synchronized with a second of site security center

Remote repositories

_________ are kept offline to prevent its private key from being compromised. They will then issue certificate for_________Which are responsible for issuing certification________

Root CA, Subornadite CA, Objects and Services

A_______is a carefully crafted document that includes not only DOD policies and security regulations, but also up to date best practices and configuration guidelines.

STIG

Each________ DISAS_______________ decides which new STIG should be written and which existing STIGs should be updated

September, Field security operations (FSO)

The source of content on a network that's a remote site

Super agent

HAS a shared secret and private key both keys are used to do the same task. The same key that encrypts can decrypt and vice versa

Symmetric Key

This is a type of malicious software that disguises itself as a regular piece of software. it works as the intended program would normally

Trojan

This is a type of malicious software that disguises itself as regular piece of software. It works as the intended program would normally

Trojan

Malicious software that disguise itself a regular piece of sotware

Trojans

ACAS consists of a suite of products to include Red Hat Enterprise linux, Security Center, Nessus Scanner and the Nessus Network Monitor Formerly the passive vulnerability Scanner) which is provided by DISA to DoD Customers

True

identify two ways properly uninstall the Mcafee agents

Uninstall the agent from the ePO System tree

Self replicates without the users knowledge and modifies another computer program

Worms

Software that presents unwanted material based on the first users activity

adware

Identify who can upload Audit files

anyone with the right permission

Software that keeps track of a users activity on a computer

spyware

At each ASCI the agent collects and sends information it gathers from each module that installed on the client. The agent will send the events that ocurred since.

the last ASCI

The most common type of malware

virus


Conjuntos de estudio relacionados

Midterm Study concepts. chap 1-14

View Set

RHIA (Domain I) Data Content Structure and Standards

View Set

Marketing Chapter 5 (Test Bank Questions)

View Set

Hunter Safety Chapter 6-9 Lucieo E.

View Set

Anatomy- Female Internal Genitalia

View Set

Cybersecurity Management I - Strategic - C727 PreAssessment Test

View Set