Iase Disa Mil Cyber Awareness
20 community-sourced questions and answers. Free — no login.
What is the Marine Corps order for establishing a Cyber Security Program
MCO 5239.2B
Name the primary roles with IA/Cyber Security:
-Authorizing Offical(AO)/Designated Accrediting Authority(DAA) -Commanding Officers & CG's -Certifying Authority Representative(CAR) -ISSM -ISSO
What are the three environments that must be considered when performing system hardening?
Computing Environment Network Environment Enclave Environment
Name the site where you can locate STIGs
-IASE.DISA.MIL OR -DISA
Name a free software patching solution provided by DISA ?
WSUS
What is the name of the hardware based network firewall employed by the Marine Corps:
800 and 1000 FortiNET
What kind of IPS does the Marine Corps utilize?
MCAFEE Intrushield
What is the primary tool utilized for vulnerability scanning?
ACAS
What are the components of ACAS?
-Security Center -Nessus User Interface -Passive Vulnerability Scanner -3D Tool -xTool
What product does the DoD utilize as a Host Based Security System?
ePolicy Orchestrator Server
What directive mandated the implementation of HBSS?
FRAGO 13 - DOD Implementation of HBSS
Name the modules of McAfee ePO:
•Host Intrusion Prevention •Virus Scan Enterprise •Policy Auditor •Asset Baseline Monitor •Device Control Module •Rogue System Detection •Asset Configuration Compliance Module
What is the definition of PKI?
A set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificate
Explain two factor or dual factor authentication?
Something you have & something you know or CAC + PIN
What directive will you follow when reporting incidents?
MC ECSD001
What directive will you follow for vulnerability management?
MC ECSD020
Understand the differences between signature and anomaly.
Signature Based - Signature-Based IDS use a rule set to identify intrusions by watching for patterns of events specific to known and documented attacks. It is typically connected to a large database which houses attack signatures. Anomaly-Based IDS examines ongoing traffic, activity, transactions and behavior in order to identify intrusions by detecting anomalies. Requires an established baseline of normal behavior.
Different ways to implement STIGs(Hardening)
-GPO -Manually -STIG Viewer
Which HBSS module is used to gather info and events and sends it to EPO server.(HBSS)
ePolicy Orchestrator
Lowest level of the training Continuum?
Awareness
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials