ACTUAL Exam Questions and CORRECT
Answers
PKI uses public key encryption techniques to protect the confidentiality, integrity, authenticity
and non-repudiation of data. (T/F) - CORRECT ANSWER - True
When you upload ________ _____ content, the Security Center will create a _________ for each
of the audit checks in the audit file. - CORRECT ANSWER - Audit File, Plugin
After a STIG is released, DISA releases checklists to help you implement the requirements and
recommendations in the STIG. Those checklists are updated yearly to incorporate the latest
vulnerability notices and security patches. (T/F) - CORRECT ANSWER - False
Modifies another computer program and inserts its own code. - CORRECT ANSWER -
Virus
Can be disguised as anything from a game, to anti-virus software. - CORRECT
ANSWER - Trojan
It can be used to damage system files, provide access to systems, disable, or even take control of
computers. - CORRECT ANSWER - Malware
Replicates itself without the user's knowledge. - CORRECT ANSWER - Worm
Sends information that it tracked on a user's activity to another entity without the user's consent. -
CORRECT ANSWER - Spyware
Uses spyware to obtain information that creates unwanted popups and other advertisements
based on information gathered. - CORRECT ANSWER - Adware
, Two ways of deploying agents to you client machines. - CORRECT ANSWER - ePO
Server's System Tree, Install Package
You're using a WAN and you have part of your network that is at a remote site. Instead of all the
machines trying to pull new policies across a WAN-link, they instead access a specific machine
on the network that is downloading these updates alone. What type of agent is being used? -
CORRECT ANSWER - SuperAgent
Identify the two types of encryption when information is sent during a server's ASCI. -
CORRECT ANSWER - Secure Socket Layer (SSL), Transport Layer Security (TLS)
Nessus is a fully capable scanner covers a breadth of checks, including unique ________, and
successfully operates across different environments. - CORRECT ANSWER - CVEs
Some reasons for issuing a _____________ ______ is to force a _______ _________
___________ to the network immediately instead of waiting until the machine checks in on its
own. You may also have a ________ _________ that is out of compliance and you want to test
status for troubleshooting. - CORRECT ANSWER - Wake-Up Call, New Policy Change,
HBSS Client
The three goals of HBSS products. - CORRECT ANSWER - Monitor, Detect, Counter
DISA-configured servers will have the SQL server on the same machine as the ePO application
server. (T/F) - CORRECT ANSWER - True
The major components of HBSS are the ePolicy Orchestrator Server, the McAfee Agent, the
distributed repositories, and the registered servers. The ePO server is an application server that: -
CORRECT ANSWER - Manages the suite of products in HBSS
Guidelines used for securing a specific system or application in accordance with DoD
requirements. - CORRECT ANSWER - STIG