dsac annex e questions with correct answers
The STIG configuration settings are converted to _____, imported into ____ , and used by ____________ to audit asset configurations for ____ Answer SCRAP content Security Center Nessus Scanners Compliance malware Answer type of sofewware that is designed to attack a system used to damage system files, provide access to systems, disable or even take control of computers spyware Answer software that keeps track of a users activity on a computer. then it sends the info to another entity without th user's consent virus Answer most common type of malware. it modifies another computer program and inserts its own code. The affected area are then considered "infected" worms Answer similar to virus; it modifies another computer program, injecting its own code. social engineering Answer when a person pretends to be someone else in order to get info about a network or system. info is then used t attack the system to steal data STIG Answer Security Technical Information
Written for
- Institution
- Dsac
- Course
- Dsac
Document information
- Uploaded on
- July 29, 2023
- Number of pages
- 16
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
dsac annex e questions with correct answers
Also available in package deal