100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ANNEX D: SECURITY (HBSS + ACAS) QUESTIONS AND ANSWERS 2023

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
16-12-2023
Written in
2023/2024

ANNEX D: SECURITY (HBSS + ACAS) QUESTIONS AND ANSWERS 2023 Security Technical Information Guide (STIG) A carefully crafted document that includes not only DoD policies and security regulations, but also up-todate best practices and configuration guidelines. These guidelines are used for securing a specific system or application in accordance with DoD requirements. Host-Based Security Systems (HBSS) A host based security system, which means it is located on the individual workstation or the host. Uses multiple different modules to monitor, detect, and counter against known cyber threats. Assured Compliance Assessment Solution (ACAS) Consists of a suite of products to include Red Hat Enterprise Linux, Security Center, Nessus Scanner and the Nessus Network Monitor (formerly the Passive Vulnerability Scanner) which is provided by DISA to DoD Customers. Public Key Infrastructure (PKI) A framework that consists of hardware, software, people, processes, and policies, that together helps identify and solve information security problems for you by establishing safe and reliable environment for electronic transactions in the internet. Public Key Encryption Protects the confidentiality, integrity, authenticity and non-repudiation of data. Why do we use HBSS US Cyber Command (USCYBERCOM) mandates that HBSS be installed on every DoD system. HBSS Components ePolicy Orchestrator Server, the McAfee Agent, the distributed repositories, and the registered servers. McAfee Agent Its job is to provide a secure communication channel to the ePO and manages all of the other modules that will be installed on the client machine (VSE, HIPS, etc.). Agent to Server Communication Interval (ASCI) Determines how often the agent checks in with the ePO. Default is 60 minutes. Agent to Server Communication (ASCI) Encrypted communication using Secure Sockets Layer (SSL) or Transport Layer Security (TLS). All encryption is 128-bit strength and, except for Mac OS X, is FIPS 140-2 compliant. Wake-up calls When the ePO forces the managed machine to initiate an ASCI outside of its normal interval. ACAS Repositories Proprietary data files, residing on the security center, that store scan results. Every time a scan is initiated, the scan results are imported into one repository. ACAS Repository Types Local, Remote, and Offline Repositories Local Repository Active repositories of Security Center data collected via scanners attached to the local Security Center. Remote Repository Contain IP address and vulnerability information obtained via network synchronization with a second (remote) Security Center. Offline Repository Enable Security Center to obtain repository data via manual file export/import from a remote Security Center that is not network-accessible. Audit Files Text files that contain the specific configuration, file permission, and access control tests to be performed. They are an attachment to a scan policy used with credentials to audit a host's configuration. Public Key Infrastructure (PKI) A framework that consists of hardware, software, people, processes, and policies, that together helps identify and solve information security problems for you by establishing safe and reliable environment for electronic transactions in the internet. Importance of PKI Allows us to take advantage of the speed and immediacy of the Internet while assuring that we will be alerted if sensitive information has been tampered with and preventing unauthorized disclosure. PKI Components AUTHENTICATION - Proof that senders are who they claim to be CONFIDENTIALITY - Assurance that the person receiving is intended recipient AUTHORIZATION - Protection against unauthorized use DATA INTEGRITY - Verification that no unauthorized modification of data has occurred NON-REPUDIATION - Assurance for the legal community that the person sending cannot deny participation (DOD Consent) Types of cryptographic methods Symmetric & Asymmetric Symmetric-key This type of encryption uses the same key to encrypt and decrypt Asymmetric-key Uses a key pair to do the encryption and decryption. It includes two keys one is public key and the other one is private key. Active Directory Certificate Service The Microsoft solution for PKI. It is collection of role services to use to design the PKI for your organization. Common Access Card (CAC) A Smart Card which is the standard ID card for DoD military, civilian, and eligible contractor personnel. Elements of the CAC Indentification elements, organization elements, card management elements, benefit elements, and PKI elements. Nessus Network Monitor (NNM) Monitors network traffic in real-time. It determines server and client side vulnerabilities and sends these to Security Center in real-time. It continuously looks for new hosts, new applications, and new vulnerabilities without requiring the need for active scanning. 80 Agent to Server communication (TCP) Inbound TCP. The ePO server listens for requests from McAfee Agents 443 Agent to Server secure communication (TLS) 591 Agent Wakeup Call 8005 Agent Handler Communication 8007 Console-to-application (HTTPS) 8443 Rogue system detection sensor (HTTPS) 1433 (Outbound) SQL Server TCP Port 389 Default LDAP server port 636 Default LDAP server port 1433 (Inbound) Default for SQL communication 1434 Default for SQL port negotiation (TCP and UDP) Two ways to categorize a repository IP Address, MDM (Master Data Management Tool) Primary function of repositories Stores scan results What users can create new repositories in Assured Compliance Assessment Solution. (ACAS) Administrators 4 primary reasons to use multiple repositories 1. Restrict access to data 2. Improve reporting time (Smaller data set) 3. Separate compliance & vulnerability of data 4. Resolve technical issues When is a remote repository is used? To replicate a security center's repository data How does DISA determine its STIGS? Security recommendations from software vendors (ei: Microsoft, Cisco, etc.)

Show more Read less
Institution
HBSS
Course
HBSS








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
HBSS
Course
HBSS

Document information

Uploaded on
December 16, 2023
Number of pages
4
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
jw638729 Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
294
Member since
2 year
Number of followers
187
Documents
15833
Last sold
2 days ago
NURSING VIEW

In my shop you will find documents, package deals, nursing courses, assigments,flashcards and all revision materials .You are welcome

4.0

59 reviews

5
38
4
3
3
5
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions