Part 5 Flashcards
What are the options for VM Ware right click on a machine?
Power off
Shutdown guest
Restart guest
Reset
What does the CNDOSE server use to host and manage its virtual machines?
VMware ESX
What provides database services for HBSS and record systems info, log info, and reports for all HBSS functions within managed computers?
MSSQL microsoft sql
What proactively guards against intrusion by regularly testing the integrity of the network to uncover and fix potential security weaknesses
SCCVI
Used by the DoD to scan assets for compliance
ACAS
A GUI is available for easy configuration and management of ESX as well as the virtual machines within
vSphere client
Console Tab
To access a virtual machine via vSphere client select the virtual machine from the left pane and click the console tab
To allow full screen view of a virtual machine within the vSphere client select the virtual machine from the left pane and select the console icon (computer with a green arrow)
Console window
What is the prefered method of accessing the virtual machines as it is less resource intensive?
Microsoft RDP
What is the automatic startup process?
MSSQL
Then ACAS/SCCVI
Then HBSS
What are two primary services?
SQL Server
SQL Server Agent
What is necessary for HBSS
MSSQL is required or ePO wont start
What provides protection against known virus and malware attacks in the real time, protection from blended attacks and on-demand virus scanning and monitoring capabilities
McAffee VSE
T or F
McAffee VSE is active, it puts files found into Quarentine
True
What gives admins the ability to know when a wodespread infection may be occuring so they will be able to stop the proliferation of a virus on their networks?
Consolidated reporting of events detected by VSE
Where are VSE logs inside ePO?
Menu > Reporting > Threat Event Log
What provides network admins and security personnel with tools to prevent, detect, track, report, and remediate malicious computer related activities and incidents across all DoD networks and information systems?
HBSS - Host Based Security System
What occurs when a program or process stores more data in memory than is provided for, forcing excess data to overflow into adjacent memory areas?
Buffer overflow
What is when a user or organization is deprived of a resource that they would normally expect to have?
Denial of Service
What occurs on a network where the attacker captures or redirects the communications between two computers?
Man In The Middle MITM
What is designed to protect your environment from viruses, worms, and Trojan horses?
VSE
What are the four default permission sets?
Executive reviewer
Global reviewer
Group admin
Group reviewer