100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Annex E - Practice Written Exam UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
11-06-2025
Written in
2024/2025

Annex E - Practice Written Exam UPDATED ACTUAL Exam Questions and CORRECT Answers PKI uses public key encryption techniques to protect the confidentiality, integrity, authenticity and non-repudiation of data. (T/F) - CORRECT ANSWER - True When you upload ________ _____ content, the Security Center will create a _________ for each of the audit checks in the audit file. - CORRECT ANSWER - Audit File, Plugin After a STIG is released, DISA releases checklists to help you implement the requirements and recommendations in the STIG. Those checklists are updated yearly to incorporate the latest vulnerability notices and security patches. (T/F) - CORRECT ANSWER - False

Show more Read less
Institution
HBSS
Course
HBSS









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
HBSS
Course
HBSS

Document information

Uploaded on
June 11, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • annex e

Content preview

Annex E - Practice Written Exam UPDATED
ACTUAL Exam Questions and CORRECT
Answers
PKI uses public key encryption techniques to protect the confidentiality, integrity, authenticity
and non-repudiation of data. (T/F) - CORRECT ANSWER - True


When you upload ________ _____ content, the Security Center will create a _________ for each
of the audit checks in the audit file. - CORRECT ANSWER - Audit File, Plugin


After a STIG is released, DISA releases checklists to help you implement the requirements and
recommendations in the STIG. Those checklists are updated yearly to incorporate the latest
vulnerability notices and security patches. (T/F) - CORRECT ANSWER - False



Modifies another computer program and inserts its own code. - CORRECT ANSWER -
Virus


Can be disguised as anything from a game, to anti-virus software. - CORRECT
ANSWER - Trojan


It can be used to damage system files, provide access to systems, disable, or even take control of
computers. - CORRECT ANSWER - Malware



Replicates itself without the user's knowledge. - CORRECT ANSWER - Worm


Sends information that it tracked on a user's activity to another entity without the user's consent. -
CORRECT ANSWER - Spyware


Uses spyware to obtain information that creates unwanted popups and other advertisements
based on information gathered. - CORRECT ANSWER - Adware

, Two ways of deploying agents to you client machines. - CORRECT ANSWER - ePO
Server's System Tree, Install Package


You're using a WAN and you have part of your network that is at a remote site. Instead of all the
machines trying to pull new policies across a WAN-link, they instead access a specific machine
on the network that is downloading these updates alone. What type of agent is being used? -
CORRECT ANSWER - SuperAgent


Identify the two types of encryption when information is sent during a server's ASCI. -
CORRECT ANSWER - Secure Socket Layer (SSL), Transport Layer Security (TLS)


Nessus is a fully capable scanner covers a breadth of checks, including unique ________, and
successfully operates across different environments. - CORRECT ANSWER - CVEs


Some reasons for issuing a _____________ ______ is to force a _______ _________
___________ to the network immediately instead of waiting until the machine checks in on its
own. You may also have a ________ _________ that is out of compliance and you want to test
status for troubleshooting. - CORRECT ANSWER - Wake-Up Call, New Policy Change,
HBSS Client


The three goals of HBSS products. - CORRECT ANSWER - Monitor, Detect, Counter


DISA-configured servers will have the SQL server on the same machine as the ePO application
server. (T/F) - CORRECT ANSWER - True


The major components of HBSS are the ePolicy Orchestrator Server, the McAfee Agent, the
distributed repositories, and the registered servers. The ePO server is an application server that: -
CORRECT ANSWER - Manages the suite of products in HBSS


Guidelines used for securing a specific system or application in accordance with DoD
requirements. - CORRECT ANSWER - STIG

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1111
Member since
1 year
Number of followers
103
Documents
68972
Last sold
13 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

177 reviews

5
75
4
31
3
47
2
9
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions