1. What are STIGs?Contain technical guidance to "lock down" information systems/software that might otherwise be vulnerable to attackMinimally acceptable configuration standards for systems that store, process or transmit DoD informationConfiguration standards for DoD IA and IA-enabled devices. All of these define STIGs 2. Who Develops STIGs?DoD CIODISANISTVendors 3. Roughly how often are STIGs updated?QuarterlyWeeklyMonthlyAnnually 4. Where are STIGS published to/downloaded from?checklists.miliase.disa.milnvd.govnist.gov/stigs 5. Which STIGs require a CAC to download?Enclave & DMZ, General Purpose Operating System, WirelessJIE Network, Apache, WirelessBackbone Transport, Enclave & DMZs, JIE NetworkBackbone Transport, General Purpose Operating System, Apache 6. What are sunset products?STIGs that are currently supported by DISANone of the aboveSTIGs for older product that are no longer supported by DISASTIGS that are unavailable for older products 7. What authoritative documents dictate that DoD organizations use security technical implementation guidance?NSIT SP 800-53 and NIST SP 800-37DoDI 8510.01 and NIST SP 800-53DoDI 8500.01 and DoDI 8510.01DoDI 8500.01 and NIST SP 800-53 8. What is XCCDF?Extensible Checklist Configuration Description FormatExtendable Configuration Checklist Description FormatExtensible Configuration Checklist Description Format 9. What is a CAT 1 finding?Recommendations that will improve IA posture but are not required for an authorization to operateAllows primary security protections to be bypassed, allowing immediate access by unauthorized personnel or unauthorized assumption of super-user privilegesFindings that have the potential to lead to unauthorized system access or activity 10. Which software tool generates a manual review checklist?ACASSCAP Compliance CheckereMASSSTIG Viewer 11. What is the definition of 'Not Applicable'?Does not meet, not configurable and does not meet the requirementThe feature does not exist in the product and therefore cannot be exploitedConfigurable, may or may not meet requirements based on settingsInherently meets, not configurable, but meets the requirement by default 12. Other than STIG Viewer, how can you view the STIG file?Open the .pdf file in Adobe ReaderOpen the .xml file in a browserYou can't. It can only be viewed in STIG Viewer.Open the .doc file in Word 13. What is SCAP in terms of SCC?Security Certification and Authorization PackageSecurity Certification and Authorization ProcessSecurity Content Automation ProtocolSpecialty Coffee Association of Panama 14. Does SCC Scan for all configuration settings?Depends on the benchmark usedYesNo 15. Which requires a CAC to download?SCC install filesSTIG ViewerSCC benchmark contentOperating System STIG content Loading...