100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyber Security

Rating
-
Sold
-
Pages
2
Grade
A+
Uploaded on
03-12-2023
Written in
2023/2024

Cyber Security What is the Marine Corps order for establishing a Cyber Security Program - ANS MCO 5239.2B Name the primary roles with IA/Cyber Security: - ANS -Authorizing Offical(AO)/Designated Accrediting Authority(DAA) -Commanding Officers & CG's -Certifying Authority Representative(CAR) -ISSM -ISSO What are the three environments that must be considered when performing system hardening? - ANS Computing Environment Network Environment Enclave Environment Name the site where you can locate STIGs - ANS -IASE.DISA.MIL OR -DISA Name a free software patching solution provided by DISA ? - ANS WSUS What is the name of the hardware based network firewall employed by the Marine Corps: - ANS 800 and 1000 FortiNET What kind of IPS does the Marine Corps utilize? - ANS MCAFEE Intrushield What is the primary tool utilized for vulnerability scanning? - ANS ACAS What are the components of ACAS? - ANS -Security Center -Nessus User Interface -Passive Vulnerability Scanner -3D Tool -xTool What product does the DoD utilize as a Host Based Security System? - ANS ePolicy Orchestrator Server What directive mandated the implementation of HBSS? - ANS FRAGO 13 - DOD Implementation of HBSS Name the modules of McAfee ePO: - ANS •Host Intrusion Prevention •Virus Scan Enterprise •Policy Auditor •Asset Baseline Monitor •Device Control Module •Rogue System Detection •Asset Configuration Compliance Module What is the definition of PKI? - ANS A set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificate Explain two factor or dual factor authentication? - ANS Something you have & something you know or CAC + PIN What directive will you follow when reporting incidents? - ANS MC ECSD001 What directive will you follow for vulnerability management? - ANS MC ECSD020 Understand the differences between signature and anomaly. - ANS Signature Based - Signature-Based IDS use a rule set to identify intrusions by watching for patterns of events specific to known and documented attacks. It is typically connected to a large database which houses attack signatures. Anomaly-Based IDS examines ongoing traffic, activity, transactions and behavior in order to identify intrusions by detecting anomalies. Requires an established baseline of normal behavior. Different ways to implement STIGs(Hardening) - ANS -GPO -Manually -STIG Viewer Which HBSS module is used to gather info and events and sends it to EPO server.(HBSS) - ANS ePolicy Orchestrator Lowest level of the training Continuum? - ANS Awareness

Show more Read less
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course
Unknown

Document information

Uploaded on
December 3, 2023
Number of pages
2
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DocLaura Galen College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
146
Member since
2 year
Number of followers
38
Documents
6487
Last sold
2 days ago

4.2

44 reviews

5
27
4
4
3
10
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions