Practice Test 2022|Annex Answered and verified COMPLETE SOLUTION
____________ are similar to a virus in that is modifies another compute program, injecting its own code. The main difference is that a worm will self-replicate without the users knowledge. Correct Answer: Worms The STIG community includes representatives from___________? Correct Answer: DISA Any message that is encrypted using a private key can only be decrypted using a __________? Correct Answer: Public key You can request a copy of an HBSS image from DISA who maintains the latest image of HBSS. Under what resource can you find step-by-step instructions for installing HBSS? Correct Answer: DOD Patch Repository T or F. In terms of ACAS, Scan Zones and Repositories are directly connected to each other. Correct Answer: False In terms of PKI, select the TWO different types of cryptographic methods used to decrypt and encrypt data. Correct Answer: Asymmetric-Key Method Symmetric-Key Method Asymmetric-Key Method Correct Answer: It includes two keys one is public key and the other one is private key Symmetric-Key Method Correct Answer: works exactly the same way your door lock works. You have one key to lock or open the door Identify the guidelines used for securing a specific system or application in accordance with DoD requirements. Correct Answer: STIG T or F PKI is heavily based on the Single-Tier Model since if PKI was compromised, all of the issuing certificates would need to be manually removed from the devices. Correct Answer: False The STIG community includes representatives from________? Correct Answer: DISA Which component of PKI must be public key enabled instead of using previous technologies, such as user ID and password? Correct Answer: Systems You're using a WAN and you have part of your network that is at a remote site. Instead of all the machines trying to pull new policies across a WAN-link, they instead access a specific machine on the network that is downloading these updates alone. Correct Answer: SuperAgent
Written for
- Institution
- ANNEX
- Course
- ANNEX
Document information
- Uploaded on
- November 8, 2022
- Number of pages
- 7
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
are similar to a virus in that is modifies another compute program
-
injecting its own code the main difference is that a worm will self replicate without the users knowledge correct ans