DoD Annual TrainingAnswer Key

Iase Disa Mil Cyber Awareness

20 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What is the Marine Corps order for establishing a Cyber Security Program

ANSWER

MCO 5239.2B

QUESTION 2

Name the primary roles with IA/Cyber Security:

ANSWER

-Authorizing Offical(AO)/Designated Accrediting Authority(DAA) -Commanding Officers & CG's -Certifying Authority Representative(CAR) -ISSM -ISSO

QUESTION 3

What are the three environments that must be considered when performing system hardening?

ANSWER

Computing Environment Network Environment Enclave Environment

QUESTION 4

Name the site where you can locate STIGs

ANSWER

-IASE.DISA.MIL OR -DISA

QUESTION 5

Name a free software patching solution provided by DISA ?

ANSWER

WSUS

QUESTION 6

What is the name of the hardware based network firewall employed by the Marine Corps:

ANSWER

800 and 1000 FortiNET

QUESTION 7

What kind of IPS does the Marine Corps utilize?

ANSWER

MCAFEE Intrushield

QUESTION 8

What is the primary tool utilized for vulnerability scanning?

ANSWER

ACAS

QUESTION 9

What are the components of ACAS?

ANSWER

-Security Center -Nessus User Interface -Passive Vulnerability Scanner -3D Tool -xTool

QUESTION 10

What product does the DoD utilize as a Host Based Security System?

ANSWER

ePolicy Orchestrator Server

QUESTION 11

What directive mandated the implementation of HBSS?

ANSWER

FRAGO 13 - DOD Implementation of HBSS

QUESTION 12

Name the modules of McAfee ePO:

ANSWER

•Host Intrusion Prevention •Virus Scan Enterprise •Policy Auditor •Asset Baseline Monitor •Device Control Module •Rogue System Detection •Asset Configuration Compliance Module

QUESTION 13

What is the definition of PKI?

ANSWER

A set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificate

QUESTION 14

Explain two factor or dual factor authentication?

ANSWER

Something you have & something you know or CAC + PIN

QUESTION 15

What directive will you follow when reporting incidents?

ANSWER

MC ECSD001

QUESTION 16

What directive will you follow for vulnerability management?

ANSWER

MC ECSD020

QUESTION 17

Understand the differences between signature and anomaly.

ANSWER

Signature Based - Signature-Based IDS use a rule set to identify intrusions by watching for patterns of events specific to known and documented attacks. It is typically connected to a large database which houses attack signatures. Anomaly-Based IDS examines ongoing traffic, activity, transactions and behavior in order to identify intrusions by detecting anomalies. Requires an established baseline of normal behavior.

QUESTION 18

Different ways to implement STIGs(Hardening)

ANSWER

-GPO -Manually -STIG Viewer

QUESTION 19

Which HBSS module is used to gather info and events and sends it to EPO server.(HBSS)

ANSWER

ePolicy Orchestrator

QUESTION 20

Lowest level of the training Continuum?

ANSWER

Awareness

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials