LL
Microsoft offers solution for PKI that is a collection of roles services used to design the PKI for an organization what is Microsoft PKI solution
Active Directory Certificate Service
The agent manually sends information to the ePO server. This is accomplished through the systems tray I cons, or through the command line.
Agent to server communication interval
Has a public key and a private key one key is available to the public and the other is not. A message encrypted with one key can only be decrypted by the opposite key.
Asymmetric Key
PKI uses this method for digital encryption and digital signatures Asymmetric Key
Asymmetric Key
Identify the five elements of a common access card. Select five options from below
Benefit elements, identification elements, Card management elements, organization elements, PKI elements
Occur within a randomized interval within the first ten minutes of startup. The agent will initiate a communication like to the ePO
Communication after agent installation
Installs HBSS and provides an up to date image for you use. Identify who provides you with an HBSS
DISA
STIGS checklist, script and other information security related information are available at which teo of the provided locations?
DISA,NIST
HBSS allows us to decentralize the administrator of security tools
False
Repositions are organization specific
False
Repositories are organization specific
False
Software such as Microsoft Outlook does not need to be public key enabled to realize the securities that PKI provides
False
the defense information systems agency server is responsible for issuing and authenticating certificates and keys for PKI
False
administrator sends a wake up call to a machine or group of machines. The individual agent or group of agents will respond in a randomized time interval
Forcing agent activity from the server
PKI has 5 components (people, software, tokens, certificates, and keys) that work together to ensure
Information security
are active repositories of security center data collected via scanners attached to the sites security center
Local repositories
Type of software that is designed specifically to attack a system
Malware
Identify what HBSS module initials all point products and listens for new policies and product updates.
McAfee Agent
identify which components of HBSS provides a secure communication channel to the ePO and manages all other modules that will be installed on client.
McAfee Agent
Its job is to provide a secure communication channel to the ePO
Mcfee agent
In ACAS what product monitors network traffic in real time
NESSUS network
Enable security center to obtain repository data via manual file export/import from a security center that is not network accessible
Offline Repositories
Identify what concept provides a framework that consist of hardware, Software, people, processes and policies, that together help identify/solve information security problems
Public Key infrastructure(PKI)
Contains IP address and vulnerability information obtained via network synchronized with a second of site security center
Remote repositories
_________ are kept offline to prevent its private key from being compromised. They will then issue certificate for_________Which are responsible for issuing certification________
Root CA, Subornadite CA, Objects and Services
A_______is a carefully crafted document that includes not only DOD policies and security regulations, but also up to date best practices and configuration guidelines.
STIG
Each________ DISAS_______________ decides which new STIG should be written and which existing STIGs should be updated
September, Field security operations (FSO)
The source of content on a network that's a remote site
Super agent
HAS a shared secret and private key both keys are used to do the same task. The same key that encrypts can decrypt and vice versa
Symmetric Key
This is a type of malicious software that disguises itself as a regular piece of software. it works as the intended program would normally
Trojan
This is a type of malicious software that disguises itself as regular piece of software. It works as the intended program would normally
Trojan
Malicious software that disguise itself a regular piece of sotware
Trojans
ACAS consists of a suite of products to include Red Hat Enterprise linux, Security Center, Nessus Scanner and the Nessus Network Monitor Formerly the passive vulnerability Scanner) which is provided by DISA to DoD Customers
True
identify two ways properly uninstall the Mcafee agents
Uninstall the agent from the ePO System tree
Self replicates without the users knowledge and modifies another computer program
Worms
Software that presents unwanted material based on the first users activity
adware
Identify who can upload Audit files
anyone with the right permission
Software that keeps track of a users activity on a computer
spyware
At each ASCI the agent collects and sends information it gathers from each module that installed on the client. The agent will send the events that ocurred since.
the last ASCI
The most common type of malware
virus