Week 6 Flashcards

(61 cards)

1
Q

What are the ePO compliance checks?

A
  • McAfee Agent Version
  • virus scan
  • anti spyware
  • HIP
  • PA
  • Assets
  • DAT files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FIM allows you to do what? 4 things.

A
  1. Define which files should be tracked
  2. Define what files should not be checked
  3. Specify the frequency for detecting file change
  4. See and receive notification about changes to file or file attributes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Two types of scans for ABM

A
  • baseline

- activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ABM has how many policy categories?

What are they?

A

3

  • file permissions
  • registry permissions
  • Trusted activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If there is a suspected attack, who do you inform?

A

IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What log details all actions of the ePO Application Server?

A

EpoApSvr.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What log file is a more detailed version of the log available through the McAfee Agent GUI?

A

Agent_.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What log provides detailed information of all actions performed by Rogue System Sensors?

A

RSDSensor_out.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How often does the RSS log communicate with ePO?

A

Every 5 minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the common logs contained on all Windows machines?

A
  • Application
  • Security
  • System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the boot order?

A
  • MSSQL
  • ACAS (SSCVI)
  • HBSS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two services on MSSQL that are required to run?

A
  • SQL Server (MSSQLSERVER)

- SQL Server Agent (MSSQLSERVER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When is MSSQL backed up?

A

Daily at 0030

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When is ACAS/SCCVI backed up?

A

Weekly on Sunday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CANES she’s what for cross domain services?

A

Thin client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What VMs are used on DHCP in the UNCLAS and Secret enclaves?

A
  • IAEXET

- WEB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is DHCP allowed on SCI?

A

No!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is used to restrict data flow from applications and users in each enclave?

A

-virtual routing and forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is CANES providing data-at-rest protection?

A

Hard drive encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Net IQ is used for?

A

Analyze siem log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Are CANES logging standards the same as DISA, what we currently use?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

EMET can be used to prevent?

A

PKI based man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is he module that applies local security to servers on COMPOSE networks?

A

SCM-security configuration module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Where is Symantec Endpoint Protection Manager installed?

A

EX001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
What are the 4 enforcers for COMPOSE Security Architecture?
- gateway - LAN - DHCP - Integrated
18
What are the Symantec Mail Security policies?
- general - antivirus - anti spam
19
What stage of CCRI asks for documentation?
Stage 1
20
How do you make system changes after a CCRI?
Coordinate with the SYSCOM
21
What system service migrates events from an old database to a new database?
Event migration
22
What system service takes systems older than 14 days, moves them to the inactive group, and hen deletes after 30 days?
Inactive agent cleanup
23
What system service syncs select Windows NT domains in Active Directory containers that are mapped to system groups?
NT domain active directory sync task
24
What system service retrieved packages from the source site and places them in the master repository?
Repository pull
25
What system service updates distributed repository from master repository?
Repository replication
26
What system service imports summary compliance far from other registered ePO servers?
Roll up data compliance
27
What system service imports summary data from other registered ePO servers?
Roll up managed systems
28
What system service evaluated all managed systems against selected tag criteria?
Run tag criteria
29
What system service runs selected query?
Run query
30
What is the type of auditor that PA functions as because it evaluates against both government and industry standards?
Independent auditor
31
What is a benchmark? How do you get them?
- a file dictating what checks to run - third party - DISA - supplied by McAfee
32
What will a waiver do on a system?
-it will not include it in audit scanning
33
Is ABM active or passive?
Passive
34
How far apart should NIPR and SIPR workstations be?
1 meter
35
Agent_.log
Detailed version of the log available through the McAfee Agent GUI
36
EpoApSvr.log
All actions of the ePO Application Server
37
Server.log
Details all actions of ePO server
38
RSDSensor_out.log
All actions performed by Rogue System Sensor
39
Eventparser.log
All info regarding event parser
40
Debug_sycit.log
SCCVI, used to troubleshoot retina issues
41
What log is used to investigate USB events?
DLP log
42
What services allow hardware and software access in information transferred to different security domains or levels of classification?
Cross domain/multi-layer System
43
What do we use PKI certificates for?
- authentication | - email signing
44
What service is the first layer of firewall protection for wireless access to CANES?
NAC
45
What protects Windows/OS/workstations from host and network based intrusions?
IPS/HBSS
46
COMPOSE has automated hardening
True
47
GPO is used to ensure what?
- policy settings - user rights - computer behavior
48
The TMG server will be deployed as a member server of what domain?
COMPOSE
49
When blue team comes onboard, what must you do?
Create exceptions in the HBSS suite
50
What must IPS protection status on all systems be set to?
Enabled
51
Block high severity set to?
Prevent
52
Block medium severity set to?
Prevent
53
Block/log low severity set to?
Prevent/log