Computer Science > EXAM > Annex E Practice Test 2022 (answered & verified) COMPLETE SOLUTION (All)
are similar to a virus in that is modifies another compute program, injecting its own code. The main difference is that a worm will self-replicate without the users knowledge. - ✔✔Worms The STIG... community includes representatives from___________? - ✔✔DISA Any message that is encrypted using a private key can only be decrypted using a __________? - ✔✔Public key You can request a copy of an HBSS image from DISA who maintains the latest image of HBSS. Under what resource can you find step-by-step instructions for installing HBSS? - ✔✔DOD Patch Repository T or F. In terms of ACAS, Scan Zones and Repositories are directly connected to each other. - ✔✔False In terms of PKI, select the TWO different types of cryptographic methods used to decrypt and encrypt data. - ✔✔Asymmetric-Key Method Symmetric-Key Method Asymmetric-Key Method - ✔✔It includes two keys one is public key and the other one is private key Symmetric-Key Method - ✔✔works exactly the same way your door lock works. You have one key to lock or open the door Identify the guidelines used for securing a specific system or application in accordance with DoD requirements. - ✔✔STIG T or F PKI is heavily based on the Single-Tier Model since if PKI was compromised, all of the issuing certificates would need to be manually removed from the devices. - ✔✔False [Show More]
Last updated: 1 year ago
Preview 1 out of 9 pages
Connected school, study & course
About the document
Uploaded On
May 21, 2022
Number of pages
9
Written in
This document has been written for:
Uploaded
May 21, 2022
Downloads
0
Views
21
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·