1. What are STIGs?Minimally acceptable configuration standards for systems that store, process or transmit DoD informationContain technical guidance to "lock down" information systems/software that might otherwise be vulnerable to attackConfiguration standards for DoD IA and IA-enabled devices. All of these define STIGs 2. Who Develops STIGs?DISANISTDoD CIOVendors 3. Roughly how often are STIGs updated?WeeklyMonthlyQuarterlyAnnually 4. Where are STIGS published to/downloaded from?iase.disa.milchecklists.milnvd.govnist.gov/stigs 5. Which STIGs require a CAC to download?Enclave & DMZ, General Purpose Operating System, WirelessJIE Network, Apache, WirelessBackbone Transport, General Purpose Operating System, ApacheBackbone Transport, Enclave & DMZs, JIE Network 6. What are sunset products?STIGS that are unavailable for older productsSTIGs for older product that are no longer supported by DISANone of the aboveSTIGs that are currently supported by DISA 7. What authoritative documents dictate that DoD organizations use security technical implementation guidance?DoDI 8500.01 and DoDI 8510.01DoDI 8510.01 and NIST SP 800-53NSIT SP 800-53 and NIST SP 800-37DoDI 8500.01 and NIST SP 800-53 8. What is XCCDF?Extendable Configuration Checklist Description FormatExtensible Configuration Checklist Description FormatExtensible Checklist Configuration Description Format 9. What is a CAT 1 finding?Findings that have the potential to lead to unauthorized system access or activityAllows primary security protections to be bypassed, allowing immediate access by unauthorized personnel or unauthorized assumption of super-user privilegesRecommendations that will improve IA posture but are not required for an authorization to operate 10. Which software tool generates a manual review checklist?STIG ViewereMASSACASSCAP Compliance Checker 11. What is the definition of 'Not Applicable'?Inherently meets, not configurable, but meets the requirement by defaultConfigurable, may or may not meet requirements based on settingsDoes not meet, not configurable and does not meet the requirementThe feature does not exist in the product and therefore cannot be exploited 12. Other than STIG Viewer, how can you view the STIG file?Open the .xml file in a browserOpen the .doc file in WordYou can't. It can only be viewed in STIG Viewer.Open the .pdf file in Adobe Reader 13. What is SCAP in terms of SCC?Security Content Automation ProtocolSpecialty Coffee Association of PanamaSecurity Certification and Authorization PackageSecurity Certification and Authorization Process 14. Does SCC Scan for all configuration settings?NoDepends on the benchmark usedYes 15. Which requires a CAC to download?SCC install filesSCC benchmark contentOperating System STIG contentSTIG Viewer Loading...